Zimbra Collaboration Two-factor Authentication: Be more Secure

Two-Factor Authentication

Two-factor authentication, or 2FA as it is commonly abbreviated, is a technology that provides identification of users with the combination of 2 different components. It adds an extra step to your basic log-in procedure. Without 2FA, only username and password are required for login. The second factor adds more security to your account. 2FA requires […]

Continue reading


5 cybersecurity question every CIO must ask in 2017

cyber security questions

There has been a far greater responsibility on the Chief Information Officers(CIOs) to understand the challenges, solutions and trade-offs in terms of the organizations they are a part of. It is equally crucial that CIO’s understand the plans and programs companies undertake to address the issues so that a better representation of the entire breadth […]

Continue reading


Why Zimbra 8.8 ?

Zimbra 8.8

A well crafted collaboration platform can increase productivity of your company significantly. Team cannot collaborate if they cannot communicate efficiently leaving aside the location and time-zone factors. Everyday new collaboration tools are coming up in the market and the existing ones are constantly improving and adding new features to their products. Zimbra is an up […]

Continue reading


Advanced email security for e-mail hoax. Be safe!

Advanced email security for email hoax

Email are the lifeline of business communication and have been an important vehicle for cyber intrusion for cyber criminals.The sheer volume of emails being opened makes them a very easy and vulnerable target spots. A Symantec report suggests that there were about 198 billion emails in circulation each day in 2016. Also, another study suggests […]

Continue reading


CIO Strategies for selecting the best-in-class Collaboration Tool

Selecting Best-in-class Collaboration Tool

Imagine working on a new software launch where the designers, engineers and marketing teams are spread across different countries and hence different time zones. In this scenario to get everybody on the same page and ensuring each one has the access to the latest files is a real challenge. A smart collaboration tool is The […]

Continue reading


711 million e-mails snared in largest spam-bot

email spam-bot

A Paris-based security researcher, going by the pseudonymous handle ‘Benkow’, discovered an open and accessible web server hosted in the Netherlands. The server stores dozens of text files containing a huge batch of email addresses, passwords, and email servers frequently used to send spam. This nefarious act is actually very smart move by the cyber […]

Continue reading


Beware of Income Tax Returns Email Phishing Hack

income tax returns

Beware of email phishing attacks from hackers while filing your Income Tax Returns. In email phishing attacks, hackers smartly replace some characters of email address with other look-alike characters. Observe the below given E-mail addresses: DONOTREPLY@incometaxindiaefiling.gov.in DONOTREPLY@incometaxindiafilling.gov.in First one is correct E-mail ID from the IT Dept. but if you observe properly the second one […]

Continue reading


Securing your email and network requires a paradigm shift in Mindset

cyber security

Nearly every day a successful digital breach is reported. Major organizations, government bodies, hospitals, companies, public offices have been victims of massive-sophisticated attacks all over the world. Last decade the pace of digitization and technology building has been tremendous and the coming decades promise even more high-end technology in day-to-day activities. Given that resources aren’t […]

Continue reading