Overcoming Support Tickets

Buried Under a Mountain of Support Tickets? We Can Help!

Jake Ludin Education

Buried Under a Mountain of Support Tickets? We Can Help!

Support tickets are an inescapable burden that many IT departments wish they could reduce. Resolving technical issues is a vital function of any IT department, but they amount to a net negative for all parties involved. Particularly at the beginning …

Mistakes made when configuring for WPA2

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

Jake Ludin Education

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

The importance of wireless security cannot be understated as the threat of data theft continues to rise. WPA2-Enterprise networks are the first line of defense – they’ve been proven time and again to keep networks secure by protecting against over-the-air …

Streamline Your Network with a Single Sign-On Policy

Jake Ludin Uncategorized

Streamline Your Network with a Single Sign-On Policy

Organizations that seek out opportunities to improve the efficiency of their network should consider using SAML authentication to implement a Single Sign-On (SSO) policy. First and foremost, SAML is an XML-based markup language for security assertions, or statements that service …

This artilce discusses some of the common questions we receive about PKIs

Public Key Infrastructure: Explained

Jake Ludin Education

Public Key Infrastructure: Explained

The use of a Public Key Infrastructure (PKI) by an organization demonstrates a dedication to the security of the network and the effectiveness of public key encryption and certificate-based networks. The purpose of a PKI is to manage the public …

Mistakes made when configuring for WPA2

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

Patrick Grubbs Uncategorized

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

The importance of wireless security cannot be understated as the threat of data theft continues to rise. WPA2-Enterprise networks are the first line of defense – they’ve been proven time and again to keep networks secure by protecting against over-the-air …

Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

Adam Security Threats

Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

Your users have strong, unique passwords, your networks are protected with WPA2-Enterprise encryption, and you use 802.1x for authentication. WPA2-Enterprise is the gold standard when it comes to security, so you should be safe right? Think again. Our experience helping …

Microsoft : PEAP-MSCHAPv2 Vulnerability Could Allow For Credential Theft

News Security Threats

Microsoft : PEAP-MSCHAPv2 Vulnerability Could Allow For Credential Theft

In 2013, Microsoft released a report of a known security vulnerability present within Wi-Fi authentication. The authentication protocol known as PEAP-MSCHAPv2, a widely supported standard, can be exploited to gain user login information from devices which are not properly configured …