Consulting with a Conscience™

A cruciallogics blog

Amol Joshi

23 Jun 2022

Cloudy with a Chance of Data Leakage Part II – Protection and Prevention

Data leakages can happen unintentionally, or they can be caused by mal...

21 Feb 2022

The Top 7 Threats in Mobile Device Security

There are more than 4.3 billion active mobile internet users worldwide...

09 Feb 2022

The Importance of Penetration Testing and 6 Reasons Why It Should Be Outsourced

Cybercrime cost the global economy $6 trillion in 2021, up from $3 tri...

06 Dec 2021

Hack Me If You Can

Cybercrime is now considered to be the most serious economic and secur...

19 Jul 2021
Security Cybercrime | 6 min read

4 Most Common Hacks Today and How to Mitigate Against Them

Cybercrime is on the rise around the world, and hackers are getting bo...

01 Jun 2021
Security Microsoft | 3 min read

Augment Your Pentest with a Comprehensive Office 365 Assessment

While the Covid-19 crisis is “moving the world toward increased techno...

17 Feb 2021
Security | 3 min read

How the Hackers Stole Christmas

Since the Covid-19 pandemic began, most of our business activities hav...

05 Dec 2019
Office 365 | 2 min read

How Microsoft 365 Enables Global Teamwork with Multi-Geo

Today’s enterprises are facing a challenging paradox: How can we encou...

03 Oct 2019
Data Security | 2 min read

Download our FREE Infographic: 8 Ways to Control Data Sharing

Do you know how valuable your data is? Not just valuable to you, but v...

20 Jun 2019
Data Security | 3 min read

Phishing and Ransomware: How Safe Are You?

In the old days, thieves would hold up their victims while waiting in ...