Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog20 June 2019Increasing Abused Emails – How bad is it for your company’s brand reputeOn an average 75 % of the bulk emails reach the Inbox...
-
Blog13 June 2019Defending the New Generation phishing attacksSocial engineering is an attack vector that relies heavily on human interaction...
-
Blog13 June 2019Are we still lagging behind the attack vendors? Stack Overflow and Canva attacked by hackers!Last month, 2 major data breaches took place showing how companies are...
-
Blog5 June 2019Andheri Advertisement firm looses 12 lakh INR to cyber criminalsAn advertising company in Andheri was cheated of Rs.12 Lakh in a...
-
Blog5 June 2019Office 365 users combat targeted phishing attacks better with Cisco’s Email SecurityMicrosoft Office 365 has become the most widely used e-mail service in...
-
Blog27 May 2019India ranks second in cyber attacks with 38 attacks per secondIndia is a country with the second-largest number of account take-over logins...
-
Blog15 May 2019Top 7 tips to prevent Email Phishing and Email Spoofing AttacksEmail Spoofing and Email phishing attacks are more rampant than ever. Phishing...
-
Blog6 May 2019Ransomware hits Telangana and AP’s power utilitiesThe websites of Telangana State Southern Power Distribution Company Ltd (TSSPDCL) and...
-
Blog15 April 2019Dark Web Exposes Computer-Server Data Transfer to HackersAs startling as it may sound but cybercriminals now have access to...
-
Blog10 April 2019IMAP is the most exploited protocol. Office 365 and G Suite cloud accounts hackedOne thing leads to another like a domino, with access to leaked...
-
SSL Certificates – 7 Best Practices You Must Follow
In an earlier blog on SSL Certificates we went over the reasons...
-
4 Ways Microsoft Collaboration Tools Go the Extra Mile
A business can only succeed when its resources work together cohesively towards...
-
Your Guide to Choosing a Network Firewall
Firewall options and deployments are very flexible. They can be configured as...
-
Oil India HQ Gets Ransom Demand of Rs 60 Crore
The registered headquarters of Oil India Limited (OIL) at Duliajan in Assam...
-
Securing hybrid IT environments
When cloud technologies had first emerged, several businesses had jumped on the...
-
Logix Offers Multiple Upgrade Options for Office 365 Kiosk / F1 Plan Users
Microsoft recently disabled support for POP / IMAP for its Office 365...
-
Blog 13 December 2021 SBI customers lose money to a novel bank phishing attack -
Blog 8 December 2021 Do your best work with Microsoft 365 Solutions -
Blog 3 December 2021 Russian threat group after 14,000 Gmail accounts -
Blog 2 December 2021 The 7 worst data breaches of 2021 -
Blog 26 November 2021 Ransomware trends in 2021 -
Blog 25 November 2021 Ransomware attacks rise by 64%
-
SBI customers lose money to a novel bank phishing attackSeveral customers of the State Bank of India have started filing complaints...
-
Do your best work with Microsoft 365 SolutionsMicrosoft 365 is here to provide the best integrate experience for your...
-
Russian threat group after 14,000 Gmail accountsA Russian-linked hacker group, APT28, purported to have been on a month-long...
-
The 7 worst data breaches of 2021Because every business is now online, it generates plenty more data than...
-
Ransomware trends in 2021Ransomware attacks have been on a steady rise in 2021, both in number of ransomware attacks and also...
-