Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog15 May 2017The latest global cyberattack – Wannacry Ransomware.On May 12th 2017, a ransomware of WannaCry or Wcry started spreading...
-
Blog2 May 2017Received a new job offer? Beware- Genuine or Fake?Scammers are on the rise with more and more fictitious job offers...
-
Blog28 April 2017Which is the best choice for your organization- Shared or Dedicated web hosting?Running a mid-sized business; choosing between a shared and dedicated web hosting...
-
Blog10 April 2017Why do companies need responsive web design?Responsive web design is an approach to creating web sites which can...
-
Blog10 April 2017Matrix Ransomware: Spreading to PCs through Malicious ShortcutsThe latest addition to the growing threat of ransomware is the Matrix...
-
Blog9 April 2017What is Penetration Testing? And Why is it important for your organization?Penetration testing or commonly known as pen testing is another important way...
-
Blog9 April 2017Dangers of Crypto-Ransomware and ways companies can avoid it!Money makes ransomware the lucrative cyber theft option. Crypto-Ransomware is a type...
-
Blog7 April 2017Red-team Exercise: Explore your companies Vulnerabilities to Cyber-attack in 2017!Red-team cyber security testing is optimally designed to measure how well your...
-
Blog5 April 2017A classic ICICI Bank Email phishing in 2017Are you using internet banking ? How secure are your financial transactions ? Do you scan...
-
Blog5 April 2017How are Locky and Cerber Ransomware Skilled at hiding themselves?2 of the 3 major ransomware families responsible for 90% of ransomware...
-
Effective Endpoint Security
Endpoint security is a tricky subject, especially considering all the many devices...
-
Adaptive Cloud Security & Why You Need It
Cloud computing brought with it an “always on” world. You can work...
-
Office365 Phishing Scam
When your go-to productivity applications start getting caught up in phishing scams,...
-
Microsoft Email Users Fall Prey to FedEx Phishing Emails
Microsoft email users seem to be repeatedly be targeted by one phishing...
-
Celsius Data Breach – Phishing Claims More Victims
Celsius, a crypto lending service, recently learned of a security break at...
-
Ransomware Attack At Realty Firm– Possible Data Loss
A realty firm called Ansal Housing recently fell prey to a ransomware...
-
Blog 15 May 2020 Office 365 and Cloud Zimbra | Hybrid Mail Solution -
Blog 12 May 2020 Cyber Attack Cases Rocket During The Pandemic -
Blog 8 May 2020 This Email Extortion Campaign Is Demanding Fake Ransom -
Blog 4 May 2020 10 Steps For Ransomware Protection -
Blog 2 May 2020 Cyber Cell Recovers Rs 65 Lakhs Lost To Invoice Fraud -
Blog 30 April 2020 Delhi Police Imitated For Phishing Campaigns
-
Office 365 and Cloud Zimbra | Hybrid Mail SolutionLogix’s Hybrid Collaboration Solution: The Power of Two Giants at Your Disposal...
-
Cyber Attack Cases Rocket During The PandemicCyber Attack Cases Grow at A Worrisome Rate During the Pandemic The...
-
This Email Extortion Campaign Is Demanding Fake RansomPhishers resort to perverted email extortion Internet users beware. There is a...
-
10 Steps For Ransomware ProtectionIt is uncanny, the resemblance of a ransomware’s working to the ongoing...
-
Cyber Cell Recovers Rs 65 Lakhs Lost To Invoice FraudCyber Cell Recovers 65 lakhs Lost To Invoice Fraud With all the...
-
Delhi Police Imitated For Phishing CampaignsThe Enforcer Becomes the Victim It is a mark of shameful arrogance...