Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog7 February 2018What is SSL and why do I need it?An SSL certificate is basically a piece of software(read codes) that you...
-
-
Blog22 January 2018Email security in 20182017 had a long list of email attacks, spear phishing, whaling, phishing,...
-
Blog28 December 2017HC7 Gotya RansomwareAnother Ransomware, another day, another danger in the cyber space! To bring...
-
Blog30 November 2017Cyber security predictions for 20182017 kept the information security officers on toes. Something or the other...
-
Blog28 November 2017Keep your information secured without hindering sharing operationsInformation rights management gives you the power to control information within the...
-
Blog8 November 2017Locky Ransomware- Why this malware just won’t perish? Ykcol and Asasin- 2 more variantsWithin less than a month, 2 new version of Locky ransomware have...
-
Blog23 October 2017Email security with Office 365!Business communication is synonymous to e-mails. A lot of sensitive and crucial...
-
Blog20 October 2017Cyber-Security Awareness Month. Things you need to be aware ofSince 2003, October every year is recognized as the cyber security awareness...
-
Buy Microsoft Office 365 Online
The Pareto Principle states that 80% results come from 20% of the...
-
Become a part of NCSAM 2021
Being #CyberResponsible With NCSAM 2021 Every year, October is celebrated as National...
-
Logix Cloud Zimbra Suite – A Complete Business Tool for Communication & Collaboration
Cloud Zimbra has always enjoyed the trust and patronage of millions of...
-
How Cisco endpoint security offers enhanced protection
With the introduction to cloud technologies and remote collaboration, there was a...
-
Logix InfoSecurity Receives the 2021 Ingram Micro Cloud Partner Award
Ingram Micro Cloud honors Logix InfoSecurity Pvt. Ltd for its ability to...
-
Update for Logix Cloud Email ATP customers
We recently upgraded our email security functionality with new enhancements for our...
-
Blog 26 October 2020 This Pharma Lab Data Breach Caused Multiple Plants to Shut Down -
Blog 23 October 2020 These two companies are favourites for spoofed emails -
Blog 18 October 2020 Business Email Compromise: A Complete Guide -
Blog 10 October 2020 Why Web Application Firewall Is a Must In Your Security Arsenal -
Blog 7 October 2020 Credentials Theft: A Case Study -
Blog 23 September 2020 Major Data Breach of Government Computers
-
This Pharma Lab Data Breach Caused Multiple Plants to Shut DownA successful data breach at Dr Reddy’s, a well-known pharmaceutical company, caused...
-
These two companies are favourites for spoofed emailsA quarterly report for cyber statistics has stated that two companies in...
-
Business Email Compromise: A Complete GuideEmail has become an inseparable part of any business. Sending invoices, making...
-
Why Web Application Firewall Is a Must In Your Security ArsenalIf your organization is cyber aware, you doubtless have procured some services...
-
Credentials Theft: A Case StudyCyber criminals keep creatively upping their game and this new phishing attack...
-
Major Data Breach of Government ComputersThe National Informatics Center (NIC) and the Ministy of Electronics & Information...