CXO BytesWhy organisations must adopt Wi-Fi 6 nowDebasish Mukherjee2 months agoNovember 21, 2022Organisations have had to undergo a tremendous digital evolution in a short number of years — some quickly, others with...
Corner OfficeCXO BytesProtecting against customisable RansomwareDebasish Mukherjee5 months agoSeptember 12, 2022All sorts of Cybercrimes have grown tremendously in recent years. SonicWall’s Cyber Threat Report published in early 2022, details a...
CXO BytesThe Evolution of Email Security for Greater Business SafetyDebasish Mukherjee7 months agoJune 30, 2022 Work from home compels a new approach for email security as businesses try to stay ahead of mounting cybersecurity threats...
CXO BytesBest Practices for Protecting Against Phishing, Ransomware and Email FraudDebasish Mukherjee8 months agoJune 15, 2022Security teams and the organizations they support live in difficult times: they increasingly are the targets of sophisticated threats developed...
Corner OfficeCXO BytesToday’s Firewall is More Important in a Multi-Perimeter World New cornerstone for enterprise securityDebasish Mukherjee10 months agoApril 19, 2022Cloud computing, virtualization, mobility and now expansive work-from-home policies have dramatically changed how organizations conduct business. Anywhere, anytime access fosters...
Corner OfficeCXO BytesBusiness Email Compromise: All you need to knowDebasish Mukherjee11 months agoMarch 10, 2022Business email compromise (BEC) attacks have not engendered the same level of notoriety as ransomware attacks but rank in combination...
Corner OfficeCXO BytesSecurityFighting the Phish: How to Protect Your Business from Phishing AttackDebasish Mukherjee12 months agoFebruary 8, 2022While the basic pattern is much the same as the first phishing campaigns, the scammers have added new twists with both the script and the payoff.