Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

Patrick Grubbs Security Threats

Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

Your users have strong, unique passwords, your networks are protected with WPA2-Enterprise encryption, and you use 802.1x for authentication. WPA2-Enterprise is the gold standard when it comes to security, so you should be safe right? Think again. Our experience helping ...
public certificate authority vs. private certificate authority

Reduce the Risks of a Certificate Authority

Jake Ludin Security Threats

Reduce the Risks of a Certificate Authority

Recently, cybercriminals have begun targeting public Certificate Authorities (CA) to obtain legitimate certificates and then sell them on the black market. Because these are verified and signed certificates obtained by unjust means, it can be exceedingly difficult to identify them. …

PEAP-MSCHAPv2 Vulnerability Allows For Credential Theft

News Security Threats

PEAP-MSCHAPv2 Vulnerability Allows For Credential Theft

In 2013, Microsoft released a report of a known security vulnerability present within Wi-Fi authentication. The 802.1x authentication protocol known as PEAP-MSCHAPv2, a widely supported standard, can be exploited to gain user login information from devices which are not properly ...
How MFA was broken by a hacker group

Stronger Multi-Factor Authentication With Certificates

Jake Ludin Consumer Protection, Security Threats

Stronger Multi-Factor Authentication With Certificates

It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploited by hackers. Many organizations recognize this and utilize Multi-Factor Authentication (MFA) to an extra layer of protection. Each additional …

Digital Certificates vs Password Authentication

Samuel Metzler Education, Security Threats

Digital Certificates vs Password Authentication

Businesses understand the importance of passwords for private data security, but might not realize that using a network with passwords poses many security threats. Every advancement in security technology is followed by more sophisticated hacking techniques. Credentials require password change …

private key

What is Public Key Cryptography?

Patrick Grubbs Security Threats

What is Public Key Cryptography?

Public key cryptography, a synonym for asymmetric cryptography, is a clever cryptographic system that allows two parties to exchange encrypted information publicly without worry of interception. Many cryptographic systems are symmetric. Two or more parties share a private key, then …

How to gain trust back in your cybersecurity system

Man-in-the-Middle (MITM) Attacks: Explained

Samuel Metzler Data Breach, Security Threats

Man-in-the-Middle (MITM) Attacks: Explained

If you’ve ever watched this scene from Spongebob Squarepants, then you have a basic understanding of a man-in-the-middle (MITM) attack. How does a man-in-the-middle attack work? The attacker sets up rogue hardware pretending to be a trusted network, namely Wi-Fi, …

Addressing Theft Threats From All Angles

Jake Ludin Security Threats

Addressing Theft Threats From All Angles

The looming threat of a data breach has influenced many organizations to step up the security protecting their wireless network. Organizations with personnel files, financial information, and other types of valuable data are a potential target for hackers, so many …

Credential theft of an SMB

Credential Theft Threats Facing SMBs

Jake Ludin Security Threats

Credential Theft Threats Facing SMBs

Data and credential theft have become an increasingly prevalent concern for SMBs as more attackers choose to target them. It’s common to hear about large scale hacks, such as Target, Yahoo, or Equifax, but far less frequently reported are attacks …