Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog15 November 2019Phishing goes beyond emailWhile phishing expands its horizons, should your security? Expanding its customer base...
-
Blog11 November 2019The Dangers of Identity TheftIdentity Theft - what and how to stay safe? With cloud storages...
-
Blog7 November 2019Third Party VPN services under threat of attack by the infamous APT5 TeamVPN Compromised — Are you Safe? State sponsored hacking has been around...
-
Blog4 November 2019Checkpoint Security reports a shocking rise in Sextortion EmailsThere’re no lines cybercriminals won’t cross. Now they’ve resorted to sextortion! Malware...
-
Blog31 October 2019FakeNarrator Malware launches an all-out attack in the South-East Asian regionBeware of FakeNarrator Malware Accessibility and Productivity play a key role in...
-
Blog24 October 2019NCSAM – Where Industries and the Government team up to raise Cybersecurity AwarenessIt’s National Cybersecurity Awareness Month NCSAM is an internationally acclaimed awareness drive...
-
Blog21 October 2019The ABCs of Malware – An informative Blog Series (Part 3 of 3)All About Malware – Safeguarding Against Malware This is Part Three of...
-
Blog18 October 2019The ABCs of Malware – An informative Blog Series (Part 2 of 3)All About Malware – Types of Malware This is Part Two of the...
-
Blog14 October 2019The ABCs of Malware – An informative Blog Series (Part 1 of 3)All About Malware – Introduction & Working This is Part One of...
-
Blog11 October 2019Amazon Prime Phishing Scam – Don’t fall for the “Account Frozen” Act!Don’t Panic Online Shoppers, Amazon Prime is NOT Locked If you’re an...
-
Preventing Data Breaches – Best Practices for Businesses
If you are a business with an online presence – which in...
-
Strengthening the human element for better cybersecurity
Businesses tend to be a bit apprehensive about proper cybersecurity training for...
-
Paying Ransomware Amounts
Ransomware is a nasty problem to have. With one mindless click or...
-
Microsoft Solutions for Hybrid Work
The recent past is an indicator that businesses undeniably need a digital...
-
The Benefits of BIMI for Email Marketers
About BIMI (Brand Indicators for Message Identification) BIMI is an emerging email...
-
2022 Cloud Security Reports
Understanding cloud security insights Recent trends of remote working and off-site collaboration...
-
Blog 28 March 2022 Secure Microsoft 365 Email with Cisco Cloud Mailbox Defense -
Blog 9 March 2022 Ukraine faces cyber trouble – Ukrainian bank and State websites hit -
Blog 4 March 2022 Corporate email server breach – activities of Squirrelwaffle -
Blog 10 February 2022 A phishing attack through spoofed Amazon orders -
Blog 5 February 2022 Statistics to prepare you for cybersecurity in 2022 -
Blog 1 February 2022 The biggest internet scams – and how to stop them
-
Secure Microsoft 365 Email with Cisco Cloud Mailbox DefenseIn this blog, we are going over ways you can improve your...
-
Ukraine faces cyber trouble – Ukrainian bank and State websites hitGlobal situations with respect to Ukraine are dire. But along with geopolitical...
-
Corporate email server breach – activities of SquirrelwaffleAn email server breach at Microsoft’s Exchange servers was detected by a...
-
A phishing attack through spoofed Amazon ordersThis phishing attack takes brand impersonation to the next level. Not only...
-
Statistics to prepare you for cybersecurity in 2022Everyone was just waiting for the calendar to turn on 31st December...
-
The biggest internet scams – and how to stop themPhishing is a popular internet scam that has been claiming victims by...