The 4 Challenges of Data Protection – With Pro Tips

The Challenges of Data Protection

( 4 min read ) Today, along with monetary transactions, every business also conducts data transactions. These are in terms of acquiring customers, chasing leads, solutioning, invoicing, and customer support queries. Data is collected and disbursed at almost every process of the business servicing process, no matter what kind of company you run. All in all, data has become almost […]

Continue reading

Blocking Bots – The Role of an Advanced WAF

Blocking Bots with Advanced WAF

( 4 min read ) These days, we don’t go online. We are online. All the time. Especially with a majority of the population working from home and being “always-on”. Traffic to websites has grown exponentially. Be it work, entertainment, information, or reading articles lazily because you are bored… Add to that the fact that most of our activities like […]

Continue reading

5 Business Benefits of Cloud-to-Cloud Backup

Business Benefits of Cloud-To-Cloud Backup

( 2 min read ) Barracuda recently undertook a global IT survey to address the changing needs of remote collaboration, cloud computing, cloud data security, backups, and recovery. From the survey, it was made clear that the traditional methods of data backups and recovery were unsuitable for the current times. To handle the transition to the cloud, Barracuda introduced their […]

Continue reading

The State of Office365 Backup – Barracuda’s Cloud to Cloud Backup

Cloud To Cloud Backup

( 2 min read ) Research in recent cybersecurity and IT trends has demonstrates that the shift to remote work and offsite collaboration has intensified the challenges of data protection and backups. With more and more data and applications being served from the cloud, Barracuda commissioned a survey with global IT decision makers (titled, ‘The State of Office365 backup’) about […]

Continue reading

Microsoft Email Users Fall Prey to FedEx Phishing Emails

FedEx Phishing Emails

( 3 min read ) Microsoft email users seem to be repeatedly be targeted by one phishing scam after another. One curious observation is that when Microsoft email users are targeted, the attacks are geared more towards the theft of credentials than performing malicious activities on the victim’s system. In a previous case involving SolarWinds, a similar password theft attempted […]

Continue reading

Celsius Data Breach – Phishing Claims More Victims

Celsius Data Breach

( 3 min read ) Celsius, a crypto lending service, recently learned of a security break at one of their third-party service providers, leading to a data breach at their own company. All of its customers faced serious complications as they had their entire personal data exposed. Hackers infiltrated through Celsius’s third-party email distribution system, and thus were able to […]

Continue reading

Server Hack Costs 1.5 Crore in Losses

Server Hack Costs 1.5 Crore

( 3 min read ) Case Specifics A private company based in Pune recently suffered from a server hack. The hackers, who remain as of yet unidentified, were able to get to sensitive financial credentials. Using these, the hackers were able to authorize the transfer of a jaw-dropping 1.5 crore rupees to their own bank accounts. The company officials didn’t […]

Continue reading

Major Data Breach of Government Computers

Major Data Breach

( 2 min read ) The National Informatics Center (NIC) and the Ministy of Electronics & Information Technology (MeitY) suffered a data breach in early September. The NIC is a governmental body responsible for quality information and communications technology (ICT). MeitY, in turn, promotes e-Governance for modern citizens, working towards continuous growth of the Electronics, IT & ITeS industries. A malware […]

Continue reading

Young Techie Creates An Android App That Can Spoof Emails

Email Spoofer app

( 2 min read ) Dangers of the Email Spoofer App App-savvy people beware. A new app is on the market that can launch a spoofing attack on you. 22-year-old Rupesh Bhandari was recently arrested for developing and deploying a Google Play Store App called Email Spoofer that can forge sender signatures on fake emails and steal money. The news […]

Continue reading