Do you know, if there is an intruder in your network! You need to believe that you are being compromised before you start helping your organization stay secure. Intruders can very […] Read more
Current Cyber-heist- Not just personal or corporate! Yes, you read that right. Cyber criminals are not just after your personal or corporate data of the companies but […] Read more
Website leaks data of 120 million Reliance Jio users, Telco claims data is safe? This could be the biggest data breach in India. The data is supposedly leaked on a website called magicapk. The […] Read more
5 ways to monitor DNS traffic for security threats Monitoring DNS traffic can reveal a lot about Botnets on your network. Botnet-assisted Distributed denial of service (DDoS) attacks are […] Read more
Cyber Security Lessons to learn from the latest RNC Data Leak Important lessons are learned the hard way. Republican National Committee (RNC) hired Deep Root Analytics, a data analytics firm to […] Read more
SMBv1- a very old protocol causing Wanna-Cry: should it be disabled? SMBv1 isn’t safe and what-so-ever update you run or patch you update the problem is- you are still running SMB1. […] Read more
Steps to stop targeted and advanced threats Targeted attacks reap big rewards. Large organizations and institutions have faced a sophisticated attacks and millions of customer data has […] Read more
Petya Ransomware is back to cause havoc The world suffered another wreaking nightmare on Tuesday with the attack of a new NotPetya ransomware. Using the same malicious […] Read more
How to protect your Cloud Files on Office 365 Cloud computing has been around for quite some time now and it has changed the way we work. The productivity […] Read more
How to select best email archiving solution for your company? A very important task is selecting an e-mail archiving product. Since archiving is a long-term proposition, so it’s crucial to […] Read more