It is of prime importance to any organization to identify sensitive information and control access to it. Data Protection is […]
It is of prime importance to any organization to identify sensitive information and control access to it. Data Protection is […]
A lot of scams are happening via fake email IDs. Whether you are an IT employee, bank employee or a […]
Technology is evolving rapidly and so are the cyber risks. It is a big responsibility on the shoulders of CXO […]
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could […]
A big cryptojacking attack took place first time in the country last month. The target was the Aditya Birla Group […]
The DNS is essentially a phonebook for the Internet’s domain names. When any device makes the first request over the […]
Microsoft’s Advanced Threat Protection (ATP) includes a feature called Safe Links. Office 365 Safe Links basically curb all the malicious […]
Cyber criminals seem to have hacked the EPFO data which holds information like name, Aadhar card number, bank details of […]
Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most important parameters for a disaster recovery and business […]
Be careful when you receive attachments to an email, it can be an entry point to Formbook Malware. Formbook malware […]