Zimbra Collaboration Two-factor Authentication: Be more Secure

Two-Factor Authentication

Two-factor authentication, or 2FA as it is commonly abbreviated, is a technology that provides identification of users with the combination of 2 different components. It adds an extra step to your basic log-in procedure. Without 2FA, only username and password are required for login. The second factor adds more security to your account. 2FA requires […]

Continue reading


5 cybersecurity question every CIO must ask in 2017

cyber security questions

There has been a far greater responsibility on the Chief Information Officers(CIOs) to understand the challenges, solutions and trade-offs in terms of the organizations they are a part of. It is equally crucial that CIO’s understand the plans and programs companies undertake to address the issues so that a better representation of the entire breadth […]

Continue reading


Why Zimbra 8.8 ?

Zimbra 8.8

A well crafted collaboration platform can increase productivity of your company significantly. Team cannot collaborate if they cannot communicate efficiently leaving aside the location and time-zone factors. Everyday new collaboration tools are coming up in the market and the existing ones are constantly improving and adding new features to their products. Zimbra is an up […]

Continue reading


Advanced email security for e-mail hoax. Be safe!

Advanced email security for email hoax

Email are the lifeline of business communication and have been an important vehicle for cyber intrusion for cyber criminals.The sheer volume of emails being opened makes them a very easy and vulnerable target spots. A Symantec report suggests that there were about 198 billion emails in circulation each day in 2016. Also, another study suggests […]

Continue reading


CIO Strategies for selecting the best-in-class Collaboration Tool

Selecting Best-in-class Collaboration Tool

Imagine working on a new software launch where the designers, engineers and marketing teams are spread across different countries and hence different time zones. In this scenario to get everybody on the same page and ensuring each one has the access to the latest files is a real challenge. A smart collaboration tool is The […]

Continue reading


How to avoid Equifax breach with regular Vulnerability Assessments ?

equifax

Ever higher than before, the frequency and scale of cyber breaches continue to startle everyone. In this case, cyber thieves, via Equifax breach, made off with highly sensitive personal information including social security and credit card numbers of about 143 million users. However, one interesting information has surfaced that Equifax knew about the breach much […]

Continue reading