There’s no doubt the threat landscape is a complex one. Each month brings a new example of a targeted attack against an organization that was previously considered “invulnerable.” This begs the question, “What went wrong?” With today’s targeted attacks, there’s more importance than ever before to review your infrastructure to ensure you have a comprehensive […]

Expelliarmus!  Wouldn’t it be nice if that worked in the real world? Unfortunately, there’s no magic charm that can be used as ‘Defense Against the Dark Arts’ against cyberthreats and malware. Every minute there are 307 new cyberthreats and according to a recent report by McAfee Labs, the number of malware exploits increased by 76 […]

Written by Piyush Mittal. Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used by […]

Chapter 3: Configuring Your Data Loss Prevention Solution At this point, any trepidation you might have felt earlier is history, and you’re feeling like a pro—because you are. The planning and deployment phases of your DLP implementation are behind you, and now you’re ready to tackle configuration and policy setup for monitoring and enforcement. In […]

The best way to protect yourself from the malicious programs (often called malware) hidden across the Internet, is to have the latest and greatest tools at your disposal. That includes your Web browser, the very software application you’re using right now to read this blog. Now not all web browsers are created equally. Some are […]