Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog17 July 2017Current Cyber-heist- Not just personal or corporate!Yes, you read that right. Cyber criminals are not just after your...
-
Blog10 July 2017Website leaks data of 120 million Reliance Jio users, Telco claims data is safe?This could be the biggest data breach in India. The data is...
-
Blog4 July 20175 ways to monitor DNS traffic for security threatsMonitoring DNS traffic can reveal a lot about Botnets on your network....
-
Blog4 July 2017Cyber Security Lessons to learn from the latest RNC Data LeakImportant lessons are learned the hard way. Republican National Committee (RNC) hired...
-
Blog4 July 2017SMBv1- a very old protocol causing Wanna-Cry: should it be disabled?SMBv1 isn’t safe and what-so-ever update you run or patch you update...
-
Blog3 July 2017Steps to stop targeted and advanced threatsTargeted attacks reap big rewards. Large organizations and institutions have faced a...
-
Blog28 June 2017Petya Ransomware is back to cause havocThe world suffered another wreaking nightmare on Tuesday with the attack of...
-
Blog19 June 2017How to protect your Cloud Files on Office 365Cloud computing has been around for quite some time now and it...
-
Blog15 June 2017How to select best email archiving solution for your company?A very important task is selecting an e-mail archiving product. Since archiving...
-
Blog12 June 2017Why do companies need Sandboxing?A sandbox gives you a chance to look into the future. It...
-
Effective Endpoint Security
Endpoint security is a tricky subject, especially considering all the many devices...
-
Adaptive Cloud Security & Why You Need It
Cloud computing brought with it an “always on” world. You can work...
-
Office365 Phishing Scam
When your go-to productivity applications start getting caught up in phishing scams,...
-
Microsoft Email Users Fall Prey to FedEx Phishing Emails
Microsoft email users seem to be repeatedly be targeted by one phishing...
-
Celsius Data Breach – Phishing Claims More Victims
Celsius, a crypto lending service, recently learned of a security break at...
-
Ransomware Attack At Realty Firm– Possible Data Loss
A realty firm called Ansal Housing recently fell prey to a ransomware...
-
Blog 21 May 2020 The Phone Provider Phishing Scam – What is it and how to prevent it? -
Blog 15 May 2020 Office 365 and Cloud Zimbra | Hybrid Mail Solution -
Blog 12 May 2020 Cyber Attack Cases Rocket During The Pandemic -
Blog 8 May 2020 This Email Extortion Campaign Is Demanding Fake Ransom -
Blog 4 May 2020 10 Steps For Ransomware Protection -
Blog 2 May 2020 Cyber Cell Recovers Rs 65 Lakhs Lost To Invoice Fraud
-
The Phone Provider Phishing Scam – What is it and how to prevent it?Don’t Trust Those Emails from Your Phone Providers In this age of...
-
Office 365 and Cloud Zimbra | Hybrid Mail SolutionLogix’s Hybrid Collaboration Solution: The Power of Two Giants at Your Disposal...
-
Cyber Attack Cases Rocket During The PandemicCyber Attack Cases Grow at A Worrisome Rate During the Pandemic The...
-
This Email Extortion Campaign Is Demanding Fake RansomPhishers resort to perverted email extortion Internet users beware. There is a...
-
10 Steps For Ransomware ProtectionIt is uncanny, the resemblance of a ransomware’s working to the ongoing...
-
Cyber Cell Recovers Rs 65 Lakhs Lost To Invoice FraudCyber Cell Recovers 65 lakhs Lost To Invoice Fraud With all the...