Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog30 September 2017Zimbra Collaboration Two-factor Authentication: Be more SecureTwo-factor authentication, or 2FA as it is commonly abbreviated, is a technology...
-
Blog25 September 2017Why Zimbra 8.8 ?A well crafted collaboration platform can increase productivity of your company significantly....
-
Blog23 September 2017Advanced email security for e-mail hoax. Be safe!Email are the lifeline of business communication and have been an important...
-
Blog21 September 2017CIO Strategies for selecting the best-in-class Collaboration ToolImagine working on a new software launch where the designers, engineers and...
-
Blog20 September 2017How to avoid Equifax breach with regular Vulnerability Assessments ?Ever higher than before, the frequency and scale of cyber breaches continue...
-
Blog15 September 2017[Infographic] 5 Stages of RansomwareAdvanced Ransomware Threats are well planned by cyber criminals in order to...
-
Blog11 September 2017Xafecopy Trojan widespread in Android mobile devicesA new mobile malware Xafecopy Trojan has been detected in India, Kaspersky...
-
Blog5 September 2017711 million e-mails snared in largest spam-botA Paris-based security researcher, going by the pseudonymous handle ‘Benkow’, discovered an...
-
Blog4 September 2017Red Alert ! Bring Locky Ransomware turbulence under control before it causes havoc !Indian government issued a warning about Locky ransomware attack on September 2,...
-
Blog31 August 2017Why SMBs are the best target for latest cyber attacks?Small and medium scale businesses (SMBs) of all streaks are at higher...
-
Email archives VS email backups
Hassles of email management The volume of email data a business generates...
-
Blocking bots – The role of an Advanced WAF
These days, we don’t go online. We are online. All the time....
-
Microsoft Teams Essentials – bringing progress closer to you
Collaboration is the demand of today and is an essential part of...
-
Logix Turns 22 – Over Two Decades of Quality Services and Customer Satisfaction
Logix InfoSecurity is proud to announce that we have crossed another milestone...
-
5 business benefits of Cloud-to-Cloud Backup
Barracuda recently undertook a global IT survey to address the changing needs...
-
The State of Office365 Backup – Barracuda’s Cloud to Cloud Backup
Research in recent cybersecurity and IT trends has demonstrates that the shift...
-
Blog 20 July 2020 Microsoft Office 365 Partner in Kolkata with Hybrid Mail Solutions -
Blog 20 July 2020 If I have an Anti-Virus, Do I need a firewall? -
Blog 20 July 2020 Save Disk Space and Improve Performance with Zimbra 8.8 HSM Technology -
Blog 18 July 2020 The Value of Mass Email Marketing Tools -
Blog 15 July 2020 Fraudster impersonated a prominent bank’s email domain to commit fraud -
Blog 7 July 2020 The Threat Of Business Email Compromise
-
Microsoft Office 365 Partner in Kolkata with Hybrid Mail SolutionsIf you are looking for Microsoft office 365 partner in Kolkata, your...
-
If I have an Anti-Virus, Do I need a firewall?Well, Antivirus and Firewalls are both designed to keep your system safe...
-
Save Disk Space and Improve Performance with Zimbra 8.8 HSM TechnologyWith Zimbra 8.8 HSM technology you can easily compress items and save...
-
The Value of Mass Email Marketing ToolsWhat is the value of Mass Email Marketing? If you’re a business...
-
Fraudster impersonated a prominent bank’s email domain to commit fraudBank's Email Domains Impersonated to Commit Fraud Against Prothious Engineering Services An...
-
The Threat Of Business Email CompromiseBusiness Email Compromise Becomes the Most Common Cyber Attack Webinars are part...