Using VPN for Remote Work? Don’t Make this VPN Security Mistake

Micah Spady Uncategorized

Using VPN for Remote Work? Don’t Make this VPN Security Mistake

We have never been more connected with others than we are today. The workforce is quickly moving to mobile devices. Remote work has picked up dramatically due to the COVID-19 pandemic, so VPNs are needed more now than ever before. …

Many Universities make the same assupmtions concerning PEAP-MSCHAPv2

Top 3 PEAP-MSCHAPv2 Mistakes Made by Universities

Jake Ludin Consumer Protection, Education

Top 3 PEAP-MSCHAPv2 Mistakes Made by Universities

Credential-based authentication with PEAP-MSCHAPv2 is still commonly used, and for some network types it is appropriate. A home network or a small coffee shop offering free wireless can benefit from its convenience. But for any institution or university hosting valuable …

TTLS-PAP as an authentication method is weaker than others available

EAP-TTLS/PAP Authentication Protocol Is Not Secure

Jake Ludin Uncategorized

EAP-TTLS/PAP Authentication Protocol Is Not Secure

When designing a new network, there are countless features to consider that have a significant impact on the organization at large. Few functions of the network impact the users more than the authentication method chosen by decision makers. If an …

Digital Certificates vs Password Authentication

Samuel Metzler Education, Security Threats

Digital Certificates vs Password Authentication

Businesses understand the importance of passwords for private data security, but might not realize that using a network with passwords poses many security threats. Every advancement in security technology is followed by more sophisticated hacking techniques. Credentials require password change …

Streamline Your Network with a Single Sign-On Policy

Jake Ludin Uncategorized

Streamline Your Network with a Single Sign-On Policy

Organizations that seek out opportunities to improve the efficiency of their network should consider using SAML authentication to implement a Single Sign-On (SSO) policy. First and foremost, SAML is an XML-based markup language for security assertions, or statements that service …

Using incorrect certificates on your network

Stop using self-signed certificates for 802.1X

Adam Education, Uncategorized

Stop using self-signed certificates for 802.1X

When setting up 802.1X we often run into questions about using self signed certificates for WPA2-Enterprise server certificate validation.  First, we should clarify the difference between a self-signed certificate and a private Certificate Authority — this is often a point of …

LogJam- Another cryptography bug from the past

News Uncategorized

LogJam- Another cryptography bug from the past

A team of researchers recently discovered a new vulnerability that significantly weakens the encrypted connection between a user and web or email server, potentially putting your secure web information at risk. This latest flaw, named the “LogJam” bug, affects all …

Face-off server certificate validation

802.1X and HTTPS face off when it comes to server certificate validation

Adam Uncategorized

802.1X and HTTPS face off when it comes to server certificate validation

This is part 2 of our series on server certificate validation. In talking with many customers about setting up RADIUS certificates, it is clear many admins have a difficult time describing the server certification validation process to their user base. …

There’s A New Wireless Protocol In Town, Exclusively Designed For IoT Devices

News Uncategorized

There’s A New Wireless Protocol In Town, Exclusively Designed For IoT Devices

Most of today’s Internet of Things (IoT) technology relies on a single device on an existing, in-home WiFi network to communicate with products around the home. As such, it has always been difficult for multiple home automation devices to communicate …