Office 365 users combat targeted phishing attacks better with Cisco’s Email Security

Increasing email security threats call for a better email security solution.

Share this:    Microsoft Office 365 has become the most widely used e-mail service in the market. Being the most popular and most used, it is also most abused by the hackers for stealing private data and enterprise information via phishing attacks. Based on a recent study conducted by ESG on behalf of Cisco, more than 80 percent […]

Continue reading


India ranks second in cyber attacks with 38 attacks per second

the-rising-and-falling-cyber-security-trends-in-2018.png

Share this:    India is a country with the second-largest number of account take-over logins – close to 1.38 lakh login’s per hour in 2018 cited by ‘Credential Stuffing: Attacks and Economies’, a 2018 Akamai report. An Account Take Over (ATO) occurs when a stolen login and password combination is used to access multiple accounts using bots. […]

Continue reading


Top 7 tips to prevent Email Phishing and Email Spoofing Attacks

Email Spoofing Prevention

Share this:    Email Spoofing and Email phishing attacks are more rampant than ever. Phishing Emails flow right into your Mailbox all around the year. Here are some tips on identifying a phishing or spoofed email. Follow 7 Email Phishing and Email Spoofing Prevention Tips and keep your inbox as well as business safe: 1. Watch Out before […]

Continue reading


Dark Web Exposes Computer-Server Data Transfer to Hackers

Dark Web Exposes Computer-Server Data Transfer to Hackers

Share this:    As startling as it may sound but cybercriminals now have access to the most-secured data files used to facilitate confidential communication between organisations’ servers and clients’ computers on the Dark Web. Although Ransomware have been available in the dark web as a service for quite some time now but security certificates is a new […]

Continue reading


IMAP is the most exploited protocol. Office 365 and G Suite cloud accounts hacked

IMAP 1

Share this:    One thing leads to another like a domino, with access to leaked credentials dumps, the speed and efficiency of brute-force attacks has improved significantly. Hackers have been targeting legacy protocols with these stolen credentials dumps. IMAP (Internet Message Access Protocol) is the most abused protocol, IMAP is the protocol that bypasses Multi-Factor Authentication and […]

Continue reading


Why should government entities adopt DMARC? And help get rid of suspicious emails!

government DMARC

Share this:    If you think confirmation of name of the sender of the mail is enough to assure its genuineness, think again! spammers can now forge the “From” address on email messages to make messages appear to come from someone in your domain. This leads to reduction in the domain quality. People who get the forged […]

Continue reading


Logix SupportDesk Android App- Providing 24 x 7 support to all our customers

support desk3

Share this:    We believe in serving our customers without any delay. In order to provide complete and unhindered support to our 2200+ customers, we are glad to launch our SupportDesk mobile ticketing app on Google Play for an unmatched 24 x 7 Support at your fingertips! Logix SupportDesk Highlights: First-of-its-kind by any IT service provider. For […]

Continue reading


In the Tax Filing Season, beware of phishing attacks

income tax returns

Share this:    Beware of email phishing attacks from hackers while filing your Income Tax Returns. In email phishing attacks, hackers smartly replace some characters of email address with other look-alike characters. Observe the below given E-mail addresses: DONOTREPLY@incometaxindiaefiling.gov.in DONOTREPLY@incometaxindiafilling.gov.in First one is correct E-mail ID from the IT Dept. but if you observe properly the second […]

Continue reading