Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog14 October 2016Choosing Office 365? Think – How to handle Office 365 email archivingIf you are choosing Office 365? Re-Think - How you will handle...
-
Blog8 October 2016Email Phishing Vs Spoofed Email Vs Email HackingWe often get confused with Email Phishing Vs Spoofed Email Vs Email Hacking....
-
Blog7 October 2016Redefining backup strategies for ransomware attacksRedefining backup strategies for ransomware attacks is the first step to protect yourself or...
-
Blog7 October 2016How does Advanced Threat Protection provide malware, ransomware free clean mails?Advanced threat protection provides advanced solution to handle smarter attacks. Let's now look...
-
Blog30 September 2016Logix Infosecurity : Microsoft Office 365 partner in IndiaIf you are looking for Microsoft Office 365 partner in India, your...
-
Blog30 September 2016Logix Infosecurity : Microsoft office 365 partner in BangaloreIf you are looking for Microsoft office 365 partner in Bangalore, your...
-
Blog30 September 2016Gain Office 365 Security through multi factor authenticationSecurity being a biggest concern in cloud, lets look at how can...
-
Blog29 September 20165 Reasons why you should consider Microsoft Office 365 over Hosted ExchangePicking the right cloud answer for your business email can be hard,...
-
Blog29 September 2016Logix Infosecurity : Microsoft Office 365 reseller in MumbaiAre you looking for Microsoft Office 365 reseller in Mumbai? Your search ends...
-
Blog28 September 2016Logix Infosecurity : Microsoft office 365 partner in MumbaiIf you are looking for Microsoft office 365 partner in Mumbai, your...
-
Logix Fortinet Support
With Logix Support, Get Assured Assistance for your Fortinet products No company...
-
Look out for Covid-19 Related Cyber Scams
While regulations have lifted the restrictions of strict lockdowns, common sense and...
-
Email Invoice Fraud Prevention – A Concise Guide
Business owners are now growing increasingly aware of cyber security concerns hanging...
-
Logix is a Microsoft Gold Partner in India
What are our offerings as a Microsoft Gold Partner? For some time...
-
Nykaa Email Spoofing Case
Nykaa Loses 62Lakh To Cyber Fraud Most of the times, it is...
-
4 Ways Fraud Invoices Can Affect Your Business
Why Worry About Fraud Invoices? Fraud Invoices could victimize any business. Invoice...
-
Blog 20 November 2019 Beware – A Phishing Attack through IT Refund Message -
Blog 19 November 2019 Fake voicemail notifications targetting credentials -
Blog 15 November 2019 Phishing goes beyond email -
Blog 11 November 2019 The Dangers of Identity Theft -
Blog 7 November 2019 Third Party VPN services under threat of attack by the infamous APT5 Team -
Blog 4 November 2019 Checkpoint Security reports a shocking rise in Sextortion Emails
-
Beware – A Phishing Attack through IT Refund MessageSmishing, a variant of phishing, attacks through SMS usually target individuals or...
-
Fake voicemail notifications targetting credentialsFake voicemail notifications aid scammers to collect Office 365 login credentials Heard...
-
Phishing goes beyond emailWhile phishing expands its horizons, should your security? Expanding its customer base...
-
-
Third Party VPN services under threat of attack by the infamous APT5 TeamVPN Compromised — Are you Safe? State sponsored hacking has been around...
-
Checkpoint Security reports a shocking rise in Sextortion EmailsThere’re no lines cybercriminals won’t cross. Now they’ve resorted to sextortion! Malware...