How much is “enough budget” for cybersecurity?

Investing in cybersecurity

As the year comes to an end, now is the time to start preparing for budgets and fighting for departmental budgets is never easy, and when the case is for company’s cyber security, it feels all the more vital. It is very hard to make-believe the management the benefits of something so intangible as Cybersecurity. […]

Continue reading


5 common Cybersecurity mistakes that can put you in jeopardy

Common CyberSecurity mistakes that can cause Havoc

Cyberattacks, data breaches are amongst the most pressing problems CISO face across the companies (small, medium or large) around the world. Yet despite the incidents being reported more frequently and more awareness about the danger there usually is a lacuna which causes havoc. There are simple protocols which must be followed all the time to […]

Continue reading


5 cybersecurity question every CIO must ask in 2017

cyber security questions

There has been a far greater responsibility on the Chief Information Officers(CIOs) to understand the challenges, solutions and trade-offs in terms of the organizations they are a part of. It is equally crucial that CIO’s understand the plans and programs companies undertake to address the issues so that a better representation of the entire breadth […]

Continue reading


Why Zimbra 8.8 ?

Zimbra 8.8

A well crafted collaboration platform can increase productivity of your company significantly. Team cannot collaborate if they cannot communicate efficiently leaving aside the location and time-zone factors. Everyday new collaboration tools are coming up in the market and the existing ones are constantly improving and adding new features to their products. Zimbra is an up […]

Continue reading


CIO Strategies for selecting the best-in-class Collaboration Tool

Selecting Best-in-class Collaboration Tool

Imagine working on a new software launch where the designers, engineers and marketing teams are spread across different countries and hence different time zones. In this scenario to get everybody on the same page and ensuring each one has the access to the latest files is a real challenge. A smart collaboration tool is The […]

Continue reading


How to avoid Equifax breach with regular Vulnerability Assessments ?

equifax

Ever higher than before, the frequency and scale of cyber breaches continue to startle everyone. In this case, cyber thieves, via Equifax breach, made off with highly sensitive personal information including social security and credit card numbers of about 143 million users. However, one interesting information has surfaced that Equifax knew about the breach much […]

Continue reading


Xafecopy Trojan widespread in Android mobile devices

Android Users Be cautions from Xafecopy Trojan

A new mobile malware Xafecopy Trojan has been detected in India, Kaspersky said in a report. It steals money from victim’s mobile phones via Wireless Application Protocol (WAP) billing payment method. Victim’s mobile currency is used without his knowledge. Around 40 % audience of this malware has been detected in India. Xafecopy Trojan is disguised […]

Continue reading