Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog22 January 2018Email security in 20182017 had a long list of email attacks, spear phishing, whaling, phishing,...
-
Blog28 December 2017HC7 Gotya RansomwareAnother Ransomware, another day, another danger in the cyber space! To bring...
-
Blog30 November 2017Cyber security predictions for 20182017 kept the information security officers on toes. Something or the other...
-
Blog28 November 2017Keep your information secured without hindering sharing operationsInformation rights management gives you the power to control information within the...
-
Blog8 November 2017Locky Ransomware- Why this malware just won’t perish? Ykcol and Asasin- 2 more variantsWithin less than a month, 2 new version of Locky ransomware have...
-
Blog23 October 2017Email security with Office 365!Business communication is synonymous to e-mails. A lot of sensitive and crucial...
-
Blog20 October 2017Cyber-Security Awareness Month. Things you need to be aware ofSince 2003, October every year is recognized as the cyber security awareness...
-
Blog13 October 2017ANUBI Ransomware, new danger ready to strike!ANUBI is another malicious code making rounds, infecting machines. Not much is...
-
Blog30 September 2017Zimbra Collaboration Two-factor Authentication: Be more SecureTwo-factor authentication, or 2FA as it is commonly abbreviated, is a technology...
-
Logix Turns 22 – Over Two Decades of Quality Services and Customer Satisfaction
Logix InfoSecurity is proud to announce that we have crossed another milestone...
-
5 business benefits of Cloud-to-Cloud Backup
Barracuda recently undertook a global IT survey to address the changing needs...
-
The State of Office365 Backup – Barracuda’s Cloud to Cloud Backup
Research in recent cybersecurity and IT trends has demonstrates that the shift...
-
Fortify your security with Microsoft Security Solutions
Microsoft Security Solutions are here to provide greater security but at a...
-
Widespread Ransomware 2.0 attacks
Last year saw a hike in not just the number of ransomware...
-
Government domains breached – official government data at risk
Government officials are under threat of a phishing campaign as ids of...
-
Blog 20 July 2020 Cloud Email Security Vs Advanced Threat Protection -
Blog 20 July 2020 Microsoft Office 365 Partner in Kolkata with Hybrid Mail Solutions -
Blog 20 July 2020 Save Disk Space and Improve Performance with Zimbra 8.8 HSM Technology -
Blog 20 July 2020 If I have an Anti-Virus, Do I need a firewall? -
Blog 18 July 2020 The Value of Mass Email Marketing Tools -
Blog 15 July 2020 Fraudster impersonated a prominent bank’s email domain to commit fraud
-
Microsoft Office 365 Partner in Kolkata with Hybrid Mail SolutionsIf you are looking for Microsoft office 365 partner in Kolkata, your...
-
Save Disk Space and Improve Performance with Zimbra 8.8 HSM TechnologyWith Zimbra 8.8 HSM technology you can easily compress items and save...
-
If I have an Anti-Virus, Do I need a firewall?Well, Antivirus and Firewalls are both designed to keep your system safe...
-
The Value of Mass Email Marketing ToolsWhat is the value of Mass Email Marketing? If you’re a business...
-
Fraudster impersonated a prominent bank’s email domain to commit fraudBank's Email Domains Impersonated to Commit Fraud Against Prothious Engineering Services An...