Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog4 July 2017Cyber Security Lessons to learn from the latest RNC Data LeakImportant lessons are learned the hard way. Republican National Committee (RNC) hired...
-
Blog4 July 2017SMBv1- a very old protocol causing Wanna-Cry: should it be disabled?SMBv1 isn’t safe and what-so-ever update you run or patch you update...
-
Blog3 July 2017Steps to stop targeted and advanced threatsTargeted attacks reap big rewards. Large organizations and institutions have faced a...
-
Blog28 June 2017Petya Ransomware is back to cause havocThe world suffered another wreaking nightmare on Tuesday with the attack of...
-
Blog19 June 2017How to protect your Cloud Files on Office 365Cloud computing has been around for quite some time now and it...
-
Blog15 June 2017How to select best email archiving solution for your company?A very important task is selecting an e-mail archiving product. Since archiving...
-
Blog12 June 2017Why do companies need Sandboxing?A sandbox gives you a chance to look into the future. It...
-
Blog5 June 2017Chinese Fireball Malware affects 250 Mn computers. India most affected.Possibly the largest malware infection operation in the history is on its...
-
Blog19 May 2017UIWIX Ransomware. The threat of WannaCry is not over yet.The evolved version of Wannacry ransomware; UIWIX Ransomware continues to shock the...
-
Blog17 May 2017WannaCry Ransomware: How it affected India? What could be done to keep safe? What is next?The Ransomware that shock the world started on 12th May as a...
-
Buy Email Archival Solution Online
With the volume of data every business generates, email management has started...
-
Security Threats in Banking and How to Handle Them
Security threats in banking are becoming much more dangerous. Especially considering how...
-
Make Your Business Communication Simpler with Bulk Mail SMTP
Emails have become the bedrock of business. Sharing critical information within your...
-
Buy Microsoft 365 Business Online
Focus on the things that matter with our Microsoft 365 Business plans....
-
Reasons India Needs Better Cybersecurity in Banking
Banking in India is a very structured and regulated. Banks realize they're...
-
Buy Cloud Zimbra from the Logix eShop
We have the perfect solution on our eShop to help you boost...
-
Blog 18 June 2020 Mumbai Firm Loses 1.6CR to a Dodgy Invoice -
Blog 10 June 2020 The Fake HR Email Phishing Scam -
Blog 2 June 2020 The Aramco-ONGC Fake Invoice Case -
Blog 29 May 2020 This New Phishing Scam Contains A Password Protected File -
Blog 24 May 2020 Logix Launches A Unique Service to Fight Against Invoice Fraud -
Blog 21 May 2020 The Phone Provider Phishing Scam – What is it and how to prevent it?
-
Mumbai Firm Loses 1.6CR to a Dodgy InvoiceDodgy Invoices On The Rise Yet another case of a dodgy invoice...
-
The Fake HR Email Phishing ScamWork from Home may have become tiresome; but don’t let your guard...
-
The Aramco-ONGC Fake Invoice CaseFake Invoices: The New Monster Indian Companies Have to Face? As we...
-
This New Phishing Scam Contains A Password Protected FileThe Password Protected File: Added Security or Phishing Attack? A new phishing...
-
Logix Launches A Unique Service to Fight Against Invoice FraudSecure Your Billing Process From Invoice Fraud Invoice Fraud is a type...
-
The Phone Provider Phishing Scam – What is it and how to prevent it?Don’t Trust Those Emails from Your Phone Providers In this age of...