Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Defending the New Generation phishing attacks
Social engineering is an attack vector that relies heavily on human interaction...
-
Are we still lagging behind the attack vendors? Stack Overflow and Canva attacked by hackers!
Last month, 2 major data breaches took place showing how companies are...
-
Andheri Advertisement firm looses 12 lakh INR to cyber criminals
An advertising company in Andheri was cheated of Rs.12 Lakh in a...
-
Office 365 users combat targeted phishing attacks better with Cisco’s Email Security
Microsoft Office 365 has become the most widely used e-mail service in...
-
India ranks second in cyber attacks with 38 attacks per second
India is a country with the second-largest number of account take-over logins...
-
Top 7 tips to prevent Email Phishing and Email Spoofing Attacks
Email Spoofing and Email phishing attacks are more rampant than ever. Phishing...
-
Blog 25 April 2018 Smartly defining RPO and RTO for Disaster Recovery Plans -
Blog 25 April 2018 Formbook Malware spreading widely by clicking Microsoft URL shortcut files in your emails -
Blog 25 April 2018 CIOs must run a customer centric business -
Blog 20 April 2018 Indian Government needs to give cyber security an equal priority to border security -
Blog 19 April 2018 Rarog – A cryptomining Trojan is out in the wild -
Blog 17 April 2018 Private Cloud vs Public Cloud. Making the perfect choice!
-
Smartly defining RPO and RTO for Disaster Recovery PlansRecovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most...
-
Formbook Malware spreading widely by clicking Microsoft URL shortcut files in your emailsBe careful when you receive attachments to an email, it can be...
-
CIOs must run a customer centric businessIt is high time for CIOs to run a customer centric business....
-
Indian Government needs to give cyber security an equal priority to border securityDigital India is no more a dream but carving into an absolute...
-
Rarog – A cryptomining Trojan is out in the wildA malware family Rarog is out in the internet and being excessively...
-
Private Cloud vs Public Cloud. Making the perfect choice!Embracing cloud technology is no longer a choice but an inevitable business...