This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
How to avoid unprotected cyberdating?
Part III: Swipe Right on your own risk: When your digital pen pal stabs you with toxic ink.
As the popularity of dating apps continues to rise...

Blog
How to avoid unprotected cyberdating?
Part II: When Confusing Passion with Red Flags
Online dating has become a popular way to meet new people...


Blog
How to avoid unprotected cyberdating?
Part I: Protecting Your Private information while using dating apps
Cold February is THE month to search for love. As the online dating scene...


Announcement
odix launches the FileDiligence Service, a unique Due Diligence process to secure files
The FileDiligence service provides an on-demand advanced file sanitization process designed for large-scale...


Blog
How to avoid calendar invite cyber-attacks?
File-based cyber-attacks are common practice for hackers to snick into companies’ data centers and networks. With research reporting over 10 billion malware attacks yearly...


Blog
23 Tips for Malware-Free 2023
odix invited 23 leaders to provide their tips, insight, and best practice for safe and malware-free 2023


Blog
How to prevent the next CyDemic?
PART IV
Cyber hygiene is as important as medical hygiene. Neglecting it possesses potentially dangerous outcomes for the mass patients...

odix Newsletter
Subscribe to odix newsletter and get cyber content to your inbox