image for certificate security

Launching Certificate-Based Security Shouldn’t be Intimidating

Jake Ludin Uncategorized

Launching Certificate-Based Security Shouldn’t be Intimidating

Historically, some have avoided EAP-TLS certificate-based authentication for wireless security because the overhead costs of setting up and managing this network type end up outweighing the security benefits. To properly configure the network for certificate-based authentication, you’d have to configure ...
Credential theft of an SMB

Credential Theft Threats Facing SMBs

Jake Ludin Uncategorized

Credential Theft Threats Facing SMBs

Data and credential theft have become an increasingly prevalent concern for SMBs as more attackers choose to target them. It’s common to hear about large scale hacks, such as Target, Yahoo, or Equifax, but far less frequently reported are attacks ...
Overcoming Support Tickets

Buried Under a Mountain of Support Tickets? We Can Help!

Jake Ludin Uncategorized

Buried Under a Mountain of Support Tickets? We Can Help!

Support tickets are an inescapable burden that many IT departments wish they could reduce. Resolving technical issues is a vital function of any IT department, but they amount to a net negative for all parties involved. Particularly at the beginning ...
Reducing IT support tickets

How to Efficiently Onboard Thousands of Devices

Jake Ludin Uncategorized

How to Efficiently Onboard Thousands of Devices

Each year, college campuses must navigate the trials associated with successfully connecting thousands of new students to the wireless network. This may have been moderately challenging 10 years ago, but the explosion of wireless devices in the past few years ...

Using Multi-Factor Authentication for Network Security

Micah Spady Uncategorized

Using Multi-Factor Authentication for Network Security

Many inquiries that we receive reference Multi-Factor Authentication (MFA) and how it can be used to improve the network security. MFA is a process that requires more than one form of identity to authenticate a user and approve network access. ...
Protection for when network users access applications off-site

WPA2-PSK is Not Enough

News Education

WPA2-PSK is Not Enough

In this day and age, employees are accessing their corporate resources wherever they can get a strong wireless signal, whether that’s a public hotspot, the office, or a friend’s apartment. Methods of authentication based on a pre-shared key (PSK) are …