Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog29 August 2018Hospitality Sector Under the threat of AdvisorsBot malwareA new malware downloader, AdvisorsBot, has been spotted affecting hospitality sector via...
-
Blog27 August 2018World’s largest companies have adopted to DMARCs reject policyLarge companies across the world receive phishing emails every day. There are...
-
Blog26 August 2018Cyber security basics are must for all. Be it Sales, HR or Engineer!All the departments of the organization have access to different kinds of...
-
Blog16 August 2018Cyber criminals siphoned Rs 94 crore off a co-operative bank in PuneCyber criminals stole over Rs 94 crore from a Pune headquartered Cosmos...
-
Blog8 August 2018Mitre ATT&CK Framework: A boon to your company’s Red TeamThe MITRE ATT&CK Framework has become increasingly popular over the last few...
-
Blog1 August 2018CFOs need to work closely with CIOs to stay Cyber Secure2017 was an eventful year with high profile data breaches and notable...
-
Blog20 July 2018Are your website images secured?Malware can enter your machine through corrupted images on any website. Malware...
-
Blog17 July 2018Why you must switch to HTTPS right now?It is high time to switch to HTTPS. The most important question...
-
Blog14 July 2018Avoiding the rising DNS Binding Attacks for the smart devicesWhat is a DNS Rebinding Attack? DNS Rebinding Attacks are where the...
-
Blog12 July 2018FelixRoot Backdoor Malware Resurfaced in a recent CampaignFelixroot Backdoor was first spotted in September 2017 in Ukraine spreading through...
-
A Recap of our imMail Webinar
Logix, in partnership with imMail, recently conducted a joint webinar that turned...
-
Logix Hosts a Webinar on imMail Collaboration Components in Cloud Zimbra
Setting the stage The precursor to this imMail webinar was the complete...
-
Why Professional Email for Small Businesses Is a Necessity
Mailing goes with business operations like hand and glove. Today, sending and...
-
G Suite Legacy Free Edition No Longer Available
Google Cloud puts an end to its G Suite Legacy Free...
-
Password Strength Can Tighten Your Cybersecurity
Following the best cyber safety practices in your organization can go a...
-
Ikea Email Server Attacks
Ikea, popular furnishing company, faces the heat of cybercrime as Ikea email...
-
Blog 22 June 2021 Reasons India Needs Better Cybersecurity in Banking -
Blog 14 June 2021 Effective Endpoint Security -
Blog 7 June 2021 Adaptive Cloud Security & Why You Need It -
Blog 3 June 2021 Office365 Phishing Scam -
Blog 25 May 2021 Microsoft Email Users Fall Prey to FedEx Phishing Emails -
Blog 21 May 2021 Celsius Data Breach – Phishing Claims More Victims
-
Reasons India Needs Better Cybersecurity in BankingBanking in India is a very structured and regulated. Banks realize they're...
-
Effective Endpoint SecurityEndpoint security is a tricky subject, especially considering all the many devices...
-
Adaptive Cloud Security & Why You Need ItCloud computing brought with it an “always on” world. You can work...
-
Office365 Phishing ScamWhen your go-to productivity applications start getting caught up in phishing scams,...
-
Microsoft Email Users Fall Prey to FedEx Phishing EmailsMicrosoft email users seem to be repeatedly be targeted by one phishing...
-
Celsius Data Breach – Phishing Claims More VictimsCelsius, a crypto lending service, recently learned of a security break at...