Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog13 October 2018Smart Strategies for an end-to-end network securityNetwork is the lifeline of any operating business. Almost 99% of the...
-
Blog8 October 2018India Inc desperately needs to upgrade its cyber security- know why?There has been a massive push from the government to digitize the...
-
Blog1 October 2018How can you save your business from being the next hacker’s destination with VA?Periodic Vulnerability assessment can be a strong step in the entire effort...
-
Blog24 September 2018New Phishing Attack , old trick. Steals Login And Payment DataPhishing is old hacking trick, but is still very lucrative and works...
-
Blog24 September 2018Protect your Domain reputation with DMARCToday the world is highly connected. People recognize brands more so than...
-
Blog19 September 20185 common Cybersecurity mistakes that can put you in jeopardyCyberattacks, data breaches are amongst the most pressing problems CISO face across...
-
Blog11 September 2018How much is “enough budget” for cybersecurity?As the year comes to an end, now is the time to...
-
Blog4 September 20185 biggest threats for CTOs in 2018Nations run on digital infrastructure. Fire-sale, from the Die-Hard movie reminds of...
-
Blog31 August 2018How will AI change cybersecurity by 2023?Codes are evolving, so are malware. Attacks have become more fluid, more...
-
Blog29 August 2018Hospitality Sector Under the threat of AdvisorsBot malwareA new malware downloader, AdvisorsBot, has been spotted affecting hospitality sector via...
-
Logix Hosts a Webinar on imMail Collaboration Components in Cloud Zimbra
Setting the stage The precursor to this imMail webinar was the complete...
-
Why Professional Email for Small Businesses Is a Necessity
Mailing goes with business operations like hand and glove. Today, sending and...
-
G Suite Legacy Free Edition No Longer Available
Google Cloud puts an end to its G Suite Legacy Free...
-
Password Strength Can Tighten Your Cybersecurity
Following the best cyber safety practices in your organization can go a...
-
Ikea Email Server Attacks
Ikea, popular furnishing company, faces the heat of cybercrime as Ikea email...
-
Proofpoint Phishing Attack Harvests Email Logins
In a recent Proofpoint phishing attack, email logins for Microsoft and Google...
-
Blog 14 June 2021 Effective Endpoint Security -
Blog 3 June 2021 Office365 Phishing Scam -
Blog 25 May 2021 Microsoft Email Users Fall Prey to FedEx Phishing Emails -
Blog 21 May 2021 Celsius Data Breach – Phishing Claims More Victims -
Blog 20 May 2021 Ransomware Attack At Realty Firm– Possible Data Loss -
Blog 12 May 2021 Banking Customers Fall Prey to Phishing Scams
-
Effective Endpoint SecurityEndpoint security is a tricky subject, especially considering all the many devices...
-
Office365 Phishing ScamWhen your go-to productivity applications start getting caught up in phishing scams,...
-
Microsoft Email Users Fall Prey to FedEx Phishing EmailsMicrosoft email users seem to be repeatedly be targeted by one phishing...
-
Celsius Data Breach – Phishing Claims More VictimsCelsius, a crypto lending service, recently learned of a security break at...
-
Ransomware Attack At Realty Firm– Possible Data LossA realty firm called Ansal Housing recently fell prey to a ransomware...
-
Banking Customers Fall Prey to Phishing ScamsSensitive banking information is always a matter of great anxiety for us...