CIO Strategies for selecting the best-in-class Collaboration Tool

Selecting Best-in-class Collaboration Tool

Imagine working on a new software launch where the designers, engineers and marketing teams are spread across different countries and hence different time zones. In this scenario to get everybody on the same page and ensuring each one has the access to the latest files is a real challenge. A smart collaboration tool is The […]

Continue reading


711 million e-mails snared in largest spam-bot

email spam-bot

A Paris-based security researcher, going by the pseudonymous handle ‘Benkow’, discovered an open and accessible web server hosted in the Netherlands. The server stores dozens of text files containing a huge batch of email addresses, passwords, and email servers frequently used to send spam. This nefarious act is actually very smart move by the cyber […]

Continue reading


Beware of Income Tax Returns Email Phishing Hack

income tax returns

Beware of email phishing attacks from hackers while filing your Income Tax Returns. In email phishing attacks, hackers smartly replace some characters of email address with other look-alike characters. Observe the below given E-mail addresses: DONOTREPLY@incometaxindiaefiling.gov.in DONOTREPLY@incometaxindiafilling.gov.in First one is correct E-mail ID from the IT Dept. but if you observe properly the second one […]

Continue reading


Securing your email and network requires a paradigm shift in Mindset

cyber security

Nearly every day a successful digital breach is reported. Major organizations, government bodies, hospitals, companies, public offices have been victims of massive-sophisticated attacks all over the world. Last decade the pace of digitization and technology building has been tremendous and the coming decades promise even more high-end technology in day-to-day activities. Given that resources aren’t […]

Continue reading


Do you know, if there is an intruder in your network!

intruder

You need to believe that you are being compromised before you start helping your organization stay secure. Intruders can very well lay low in the company’s network for weeks or months before they would actually cause any damage. Let us take you through a situation- Via the system of marketing head of you company an […]

Continue reading


How to protect your Cloud Files on Office 365

Office 365

Cloud computing has been around for quite some time now and it has changed the way we work. The productivity has no doubt improved but has security improved at the same pace? One of the great product from MS has been Office 365. It has grown tremendously since its launch. There are various other cloud […]

Continue reading


How to select best email archiving solution for your company?

email archiving solution

A very important task is selecting an e-mail archiving product. Since archiving is a long-term proposition, so it’s crucial to evaluate the available solutions. The solution you choose must be flexible enough to adapt the company needs. A powerful archiving solution can help boost productivity levels and improve company performance. Few factors on which the […]

Continue reading


The latest global cyberattack – Wannacry Ransomware.

WannaCry

On May 12th 2017, a ransomware of WannaCry or Wcry started spreading like wildfire starting from NHS system in UK. It spread to dozens of hospitals from where it spread to 6 continents affecting more than 100,000 machines! It caused chaos at hospitals, schools and universities, manufacturing shutdowns, and overtime for cybersecurity professionals.  Reports have confirmed malicious […]

Continue reading


Received a new job offer? Beware- Genuine or Fake?

Fake Job Offers

Scammers are on the rise with more and more fictitious job offers appearing on job boards. More job seekers are being conned into traps to part with some amount of money or are becoming victims of identity theft. However, there are certain trends which can help user identify an email if it is fake job […]

Continue reading