Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog27 May 2018Top 3 cyber security concepts for 2018Cyber security is taking a new turn every year. Its very crucial...
-
Blog26 May 2018Maintaining Control is vital to Data ProtectionIt is of prime importance to any organization to identify sensitive information...
-
Blog23 May 2018Beware of Fake Email IDsA lot of scams are happening via fake email IDs. Whether you...
-
Blog19 May 2018Cyber Security challenges for CXOTechnology is evolving rapidly and so are the cyber risks. It is...
-
Blog17 May 2018Internet Explorer Zero-day “Double-kill”A remote code execution vulnerability exists in the way that the VBScript...
-
Blog15 May 2018Cryptojacking Attack hits Aditya Birla GroupA big cryptojacking attack took place first time in the country last...
-
Blog11 May 2018ODNS would be an internet security breakthroughThe DNS is essentially a phonebook for the Internet’s domain names. When...
-
Blog11 May 2018Cyber criminals have discovered a new way to bypass Office 365 Safe LinksMicrosoft’s Advanced Threat Protection (ATP) includes a feature called Safe Links. Office...
-
Blog4 May 2018Data hacked during EPFO-Aadhar seedingCyber criminals seem to have hacked the EPFO data which holds information...
-
Blog25 April 2018Smartly defining RPO and RTO for Disaster Recovery PlansRecovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most...
-
Ransomware attacks rise by 64%
Between August 2020 and July 2021, there has been a 64% increase...
-
GoDaddy data breach – data of 1.2 million customers at risk
A popular web hosting provider and domain registrar, GoDaddy, recently fell prey...
-
Indian organizations face rise in cyber security attacks
Several organizations in India, belonging to an eclectic group of industry sectors...
-
Bank data breach costs RS 29 crore
The renowned SVC bank has registered a cyber case of criminal breach...
-
Azure network security – reduce cost and risk
With the surge towards cloud computing, more and more organizations are shifting...
-
Zimbra Open Source End of Life – Switch to Zimbra Network Edition
Are you one of the 1000s of people starting a new business...
-
Blog 15 February 2021 What are the types of Network Security Devices? -
Blog 10 February 2021 Understanding Network Security -
Blog 8 February 2021 Features of Cisco Email ATP -
Blog 1 February 2021 Your Guide To Prevent Phishing – Know How Hackers Think -
Blog 7 January 2021 Pune-based Engineering Company Duped Out Of 50 lakhs -
Blog 31 December 2020 Why you shouldn’t ignore email security in 2021
-
What are the types of Network Security Devices?In a previous blog, we explored various concepts associated with network security....
-
Understanding Network SecurityCommunication to and from devices essentially happens via networks. That network can...
-
Features of Cisco Email ATPCisco provides one of the strongest email security solutions available today. In...
-
Your Guide To Prevent Phishing – Know How Hackers ThinkCyber criminals are getting creative with their ways and organizations have to...
-
Pune-based Engineering Company Duped Out Of 50 lakhsIt’s cyber fraud cases like these that remind us of the gravity...
-
Why you shouldn’t ignore email security in 2021We can all agree this year has been a roller coaster ride....