Join Us at Oktane 2025! September 24-26 | Caesars Palace, Las Vegas | Booth S6

Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

Using VPN for Remote Work? Don’t Make this VPN Security Mistake

We have never been more connected with others than we are today. The workforce is quickly moving to mobile devices. Remote work has picked up dramatically due to the COVID-19 pandemic, so VPNs are needed more now than ever before. ... Read More

Read More
3 Best Practices for Onboarding BYODs

Bring Your Own Device (BYOD) systems can be an amazing tool for businesses or schools looking to increase productivity and reduce cost. According to a study by Forbes, 42 percent of those who use their own devices at work say ... Read More

Read More
Why Most Are Leaving LDAP With WPA2-Enterprise Behind

For years, the credential-based network authentication standard was the Lightweight Directory Access Protocol (LDAP). The security and efficiency offered by LDAP provided the necessary protection levels for everyday WPA2-Enterprise operations. But as time progressed, new methods of authentication have been ... Read More

Read More
Managed PKI VS Private PKI

Deciding between a managed PKI and a private PKI is a difficult decision. Each method of PKI management has advantages and disadvantages, and if you’re coming from a place of little experience, it can be daunting to choose one. We’ve ... Read More

Read More
Top 4 Managed PKI Use Cases

A Managed PKI is a vital part of any comprehensive network security strategy. It allows you to use digital certificates for authentication, a form of credential that’s much more secure and widely-applicable than passwords. Certificates offer the following advantages: Certificates ... Read More

Read More
It’s Time For SHA-1 Hash To End

SHA-1 is a commonly used cryptographic hash algorithm that has been used for nearly 2 decades to secure online communications. It was originally designed for government use, but an exploit was discovered and its official government use was phased out. ... Read More

Read More
Phishing Scams Are Now Capitalizing on Coronavirus

COVID-19, better known as the Coronavirus, is spreading throughout the world right now and has a lot of people concerned. This has led to scammers incorporating the virus into their phishing attacks to trick people out of their private information ... Read More

Read More
How To Address America’s Ransomware Threats

Over the course of the 2010s, ransomware attacks on city and state governments have increased in number and effectiveness. The lack of proper cybersecurity measures has highlighted a weakness in the US’s preparedness and ability to protect government data. The ... Read More

Read More
Combating Burnout in Cybersecurity

Cybersecurity professionals are highly sought-after individuals that add an immense amount of value to an organization, but that value can be difficult to pin down in terms of dollars. As a result, they tend to be under-represented within some organizations. ... Read More

Read More
PPSK Is Not an Alternative to 802.1x

Believe it or not, the aging WPA-Personal protocol has seen some innovation in the past few years. Several companies have developed unique PSK authentication protocols with varying names, though “Private PSK” (PPSK) has emerged as the commonly-accepted phrase. Here are ... Read More

Read More
Top 3 PEAP-MSCHAPv2 Mistakes Made by Universities

Credential-based authentication with PEAP-MSCHAPv2 is still commonly used, and for some network types it is appropriate. A home network or a small coffee shop offering free wireless can benefit from its convenience. But for any institution or university hosting valuable ... Read More

Read More
Best Practices For IoT Security

The explosion of Internet of Things devices (IoT) onto the technology market has revolutionized how businesses operate. The endless possible applications of these incredibly diverse devices has led to a surge in quantity over the last 5 years that is ... Read More

Read More