Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog17 October 2016Email Phishing Vs Email Spoofing Vs Email HackingEmail Phishing Vs Email Spoofing Vs Email Hacking : Are you confused...
-
Blog16 October 2016Email Backup Vs Email Archiving : Which one to select?Email Backup Vs. Email Archiving is the common confusion that holds true...
-
Blog14 October 2016Choosing Office 365? Think – How to handle Office 365 email archivingIf you are choosing Office 365? Re-Think - How you will handle...
-
Blog8 October 2016Email Phishing Vs Spoofed Email Vs Email HackingWe often get confused with Email Phishing Vs Spoofed Email Vs Email Hacking....
-
Blog7 October 2016Redefining backup strategies for ransomware attacksRedefining backup strategies for ransomware attacks is the first step to protect yourself or...
-
Blog7 October 2016How does Advanced Threat Protection provide malware, ransomware free clean mails?Advanced threat protection provides advanced solution to handle smarter attacks. Let's now look...
-
Blog30 September 2016Logix Infosecurity : Microsoft Office 365 partner in IndiaIf you are looking for Microsoft Office 365 partner in India, your...
-
Blog30 September 2016Logix Infosecurity : Microsoft office 365 partner in BangaloreIf you are looking for Microsoft office 365 partner in Bangalore, your...
-
Blog30 September 2016Gain Office 365 Security through multi factor authenticationSecurity being a biggest concern in cloud, lets look at how can...
-
Blog29 September 20165 Reasons why you should consider Microsoft Office 365 over Hosted ExchangePicking the right cloud answer for your business email can be hard,...
-
This Pharma Lab Data Breach Caused Multiple Plants to Shut Down
A successful data breach at Dr Reddy’s, a well-known pharmaceutical company, caused...
-
These two companies are favourites for spoofed emails
A quarterly report for cyber statistics has stated that two companies in...
-
Business Email Compromise: A Complete Guide
Email has become an inseparable part of any business. Sending invoices, making...
-
Why Web Application Firewall Is a Must In Your Security Arsenal
If your organization is cyber aware, you doubtless have procured some services...
-
Credentials Theft: A Case Study
Cyber criminals keep creatively upping their game and this new phishing attack...
-
Grow Your Business with the Logix Partnership Program
We believe stronger networks are key for the overall growth of business....
-
Blog 16 December 2019 Ukraine Targeted by a Russian APT Hacker Team -
Blog 12 December 2019 Defence Ministry Targeted For Phishing -
Blog 9 December 2019 Most Likely Phishing Targets -
Blog 2 December 2019 Corporate Email Hijacking -
Blog 28 November 2019 Protection Against Online Scams -
Blog 25 November 2019 Cybercriminals target Windows 10 Update through Fake Emails
-
Ukraine Targeted by a Russian APT Hacker TeamRussian APT Hacker Team Strikes Out The Military and the Government are...
-
Defence Ministry Targeted For PhishingWarning Issued for Defence Personnel The defence ministry has issued an emergency...
-
Most Likely Phishing TargetsOrganizations Most at Risk of Phishing Phishing is a rapidly damaging cybercrime...
-
Corporate Email HijackingCorporate Email Hijacking: Know how it’s done Businesses contribute heavily to the...
-
Protection Against Online ScamsGuidelines to protect yourself against cyber-scamming Digitisation has seeped into virtually all...
-
Cybercriminals target Windows 10 Update through Fake EmailsRansomware targets Windows 10 Update TrustWave SpiderLabs security researchers have uncovered a...