Being a parent in a socially networked world is likely one of the toughest challenges you will face. In the thick of this challenge, I’ve shifted my parenting approach significantly over the past several years. I’ve evolved, as many of you have witnessed on this blog, from being a panicked protector to a full-time preparer. A key shift for me personally has been […]

There’s no doubt the threat landscape is a complex one. Each month brings a new example of a targeted attack against an organization that was previously considered “invulnerable.” This begs the question, “What went wrong?” With today’s targeted attacks, there’s more importance than ever before to review your infrastructure to ensure you have a comprehensive […]

Expelliarmus!  Wouldn’t it be nice if that worked in the real world? Unfortunately, there’s no magic charm that can be used as ‘Defense Against the Dark Arts’ against cyberthreats and malware. Every minute there are 307 new cyberthreats and according to a recent report by McAfee Labs, the number of malware exploits increased by 76 […]

Written by Piyush Mittal. Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used by […]

Chapter 3: Configuring Your Data Loss Prevention Solution At this point, any trepidation you might have felt earlier is history, and you’re feeling like a pro—because you are. The planning and deployment phases of your DLP implementation are behind you, and now you’re ready to tackle configuration and policy setup for monitoring and enforcement. In […]