Received a new job offer? Beware- Genuine or Fake? Scammers are on the rise with more and more fictitious job offers appearing on job boards. More job seekers are […] Read more
Which is the best choice for your organization- Shared or Dedicated web hosting? Running a mid-sized business; choosing between a shared and dedicated web hosting can be a big challenge. Even when companies […] Read more
Why do companies need responsive web design? Responsive web design is an approach to creating web sites which can be viewed on any device; a mobile, a […] Read more
Matrix Ransomware: Spreading to PCs through Malicious Shortcuts The latest addition to the growing threat of ransomware is the Matrix Ransomware. Though the ransomware has been active for […] Read more
What is Penetration Testing? And Why is it important for your organization? Penetration testing or commonly known as pen testing is another important way of testing your company’s preparedness for a cyber-attack. […] Read more
Dangers of Crypto-Ransomware and ways companies can avoid it! Money makes ransomware the lucrative cyber theft option. Crypto-Ransomware is a type of ransomware that encrypts files on a user’s […] Read more
Red-team Exercise: Explore your companies Vulnerabilities to Cyber-attack in 2017! Red-team cyber security testing is optimally designed to measure how well your company’s defense and response capabilities will hold under […] Read more
A classic ICICI Bank Email phishing in 2017 Are you using internet banking ? How secure are your financial transactions ? Do you scan your bank emails thoroughly ? How can you know […] Read more
How are Locky and Cerber Ransomware Skilled at hiding themselves? 2 of the 3 major ransomware families responsible for 90% of ransomware attacks are Locky and Cerber Ransomware families. They […] Read more
Staying ahead of the Cyber Security curve IoT devices are set to revolutionize our lives. Companies are using IoT devices more than ever with automation and more […] Read more