Zimbra Vulnerabilities and Security Patches

Zimbra Vulnerabilities and Security Patches

( 2 min read ) Share this:   Are you a Zimbra email user? Then you need to get your Zimbra server patched. New Zimbra vulnerabilities have been discovered in the Zimbra software, which could open up your systems to infiltration and hacking. At this point, only Zimbra 8.8.15 users with Patch 24 and Zimbra 9.0 users with Patch 17 are secured. […]

Continue reading


Cisco Secure Email Cloud Mailbox – Simplified Email Security for Small Businesses

Cisco Secure Email Cloud Mailbox For Simplified Email Security

( 2 min read ) Share this:   When it comes to email security, small businesses especially have to follow the ‘Do It Right the First Time’ mantra. Enterprises of this scale need to concentrate on growing their businesses, boosting their productivity, and adapting to remote collaboration. Not only can they not afford to fall prey to an email attack, they also […]

Continue reading


Cisco Reports On Rising Crypto Mining Activites

Rising Crypto Mining Activites

( 2 min read ) Share this:   Microsoft Exchange servers have been targeted time and again for crypto mining ever since Bitcoin and cryptocurrency gained footing in the digital transaction world. The good news for our Logix Cisco Email ATP customers is that they’re protected against Lemon Duck Crypto Mining Malware. Why is crypto mining dangerous? The term crypto mining means […]

Continue reading


Email Archives VS Email Backups

Email Archives VS Email Backups

( 4 min read ) Share this:   Hassles of email management The volume of email data a business generates is humongous. This can cause problems of storage optimization and also legal compliance if you are planning to become or already are a certified business (ISO and other industry standards). For audits, you need to furbish email trails and past emails. In […]

Continue reading


Blocking Bots – The Role of an Advanced WAF

Blocking Bots with Advanced WAF

( 4 min read ) Share this:   These days, we don’t go online. We are online. All the time. Especially with a majority of the population working from home and being “always-on”. Traffic to websites has grown exponentially. Be it work, entertainment, information, or reading articles lazily because you are bored… Add to that the fact that most of our activities […]

Continue reading


5 Business Benefits of Cloud-to-Cloud Backup

Business Benefits of Cloud-To-Cloud Backup

( 2 min read ) Share this:   Barracuda recently undertook a global IT survey to address the changing needs of remote collaboration, cloud computing, cloud data security, backups, and recovery. From the survey, it was made clear that the traditional methods of data backups and recovery were unsuitable for the current times. To handle the transition to the cloud, Barracuda introduced […]

Continue reading


Achieve a lower Google Workspace Ownership Cost with Google Workspace Coexistence

Lower Google Workspace Ownership Cost

( 2 min read ) Share this:   A unique Google Workspace + Cloud Zimbra coexistence model An organisation’s IT budgeting is usually decided in early financial year stages. Throughout the year, organisations abide by this amount (naturally considering slight deviations). Now, when vendors introduce a sudden change in their plans and structure, it puts IT departments in a jam. Something similar […]

Continue reading


The State of Office365 Backup – Barracuda’s Cloud to Cloud Backup

Cloud To Cloud Backup

( 2 min read ) Share this:   Research in recent cybersecurity and IT trends has demonstrates that the shift to remote work and offsite collaboration has intensified the challenges of data protection and backups. With more and more data and applications being served from the cloud, Barracuda commissioned a survey with global IT decision makers (titled, ‘The State of Office365 backup’) […]

Continue reading


Government Domains Breached – Official Government Data At Risk

Government Domains Breached

( 3 min read ) Share this:   Government officials are under threat of a phishing campaign as ids of official government domains such as @nic.in and @gov.in fell into the wrong hands. However, these government domains were not breached directly; the hackers got to the IDs of these domains through separate data breaches at Air India, Big Basket, and Dominos. These […]

Continue reading