written by Piyush Mittal Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used by […]

Chapter 3: Configuring Your Data Loss Prevention Solution At this point, any trepidation you might have felt earlier is history, and you’re feeling like a pro—because you are. The planning and deployment phases of your DLP implementation are behind you, and now you’re ready to tackle configuration and policy setup for monitoring and enforcement. In […]

The best way to protect yourself from the malicious programs (often called malware) hidden across the Internet, is to have the latest and greatest tools at your disposal. That includes your Web browser, the very software application you’re using right now to read this blog. Now not all web browsers are created equally. Some are […]

Ever thought about a detox for Easter? Now don’t be alarmed, I am not referring to chocolate – I am thinking technology. With most Aussie school kids on holidays over the Easter break, Easter is a perfect time to take some genuine time out from our technology-based lives. No need to worry about homework, the […]

Spring is here (at least in some parts of the world in the northern hemisphere)! The bees are buzzing, the flowers are blooming, and the accountants are working late because for those in the U.S., it’s tax season! Scammers love tax season—there is a lot of money moving around as people pay taxes and receive […]