Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog24 September 2018Protect your Domain reputation with DMARCToday the world is highly connected. People recognize brands more so than...
-
Blog19 September 20185 common Cybersecurity mistakes that can put you in jeopardyCyberattacks, data breaches are amongst the most pressing problems CISO face across...
-
Blog11 September 2018How much is “enough budget” for cybersecurity?As the year comes to an end, now is the time to...
-
Blog4 September 20185 biggest threats for CTOs in 2018Nations run on digital infrastructure. Fire-sale, from the Die-Hard movie reminds of...
-
Blog31 August 2018How will AI change cybersecurity by 2023?Codes are evolving, so are malware. Attacks have become more fluid, more...
-
Blog29 August 2018Hospitality Sector Under the threat of AdvisorsBot malwareA new malware downloader, AdvisorsBot, has been spotted affecting hospitality sector via...
-
Blog27 August 2018World’s largest companies have adopted to DMARCs reject policyLarge companies across the world receive phishing emails every day. There are...
-
Blog26 August 2018Cyber security basics are must for all. Be it Sales, HR or Engineer!All the departments of the organization have access to different kinds of...
-
Blog16 August 2018Cyber criminals siphoned Rs 94 crore off a co-operative bank in PuneCyber criminals stole over Rs 94 crore from a Pune headquartered Cosmos...
-
Blog8 August 2018Mitre ATT&CK Framework: A boon to your company’s Red TeamThe MITRE ATT&CK Framework has become increasingly popular over the last few...
-
Email Security Best Practices for Small Businesses
In a previous blog, we discussed why professional email is a necessity...
-
A Recap of our imMail Webinar
Logix, in partnership with imMail, recently conducted a joint webinar that turned...
-
Logix Hosts a Webinar on imMail Collaboration Components in Cloud Zimbra
Setting the stage The precursor to this imMail webinar was the complete...
-
Why Professional Email for Small Businesses Is a Necessity
Mailing goes with business operations like hand and glove. Today, sending and...
-
G Suite Legacy Free Edition No Longer Available
Google Cloud puts an end to its G Suite Legacy Free...
-
Password Strength Can Tighten Your Cybersecurity
Following the best cyber safety practices in your organization can go a...
-
Blog 28 June 2021 Security Threats in Banking and How to Handle Them -
Blog 22 June 2021 Reasons India Needs Better Cybersecurity in Banking -
Blog 14 June 2021 Effective Endpoint Security -
Blog 7 June 2021 Adaptive Cloud Security & Why You Need It -
Blog 3 June 2021 Office365 Phishing Scam -
Blog 25 May 2021 Microsoft Email Users Fall Prey to FedEx Phishing Emails
-
Security Threats in Banking and How to Handle ThemSecurity threats in banking are becoming much more dangerous. Especially considering how...
-
Reasons India Needs Better Cybersecurity in BankingBanking in India is a very structured and regulated. Banks realize they're...
-
Effective Endpoint SecurityEndpoint security is a tricky subject, especially considering all the many devices...
-
Adaptive Cloud Security & Why You Need ItCloud computing brought with it an “always on” world. You can work...
-
Office365 Phishing ScamWhen your go-to productivity applications start getting caught up in phishing scams,...
-
Microsoft Email Users Fall Prey to FedEx Phishing EmailsMicrosoft email users seem to be repeatedly be targeted by one phishing...