How to gain trust back in your cybersecurity system

Man-in-the-middle (MITM) attacks: explained

Samuel Metzler Data Breach, Security Threats

Man-in-the-middle (MITM) attacks: explained

If you’ve ever watched this scene from Spongebob Squarepants, then you have a basic understanding of a man-in-the-middle (MITM) attack. How does a man-in-the-middle attack work? The attacker sets up rogue hardware pretending to be a trusted network, namely Wi-Fi, …

Digital Certificates vs Password Authentication

Samuel Metzler Education, Security Threats

Digital Certificates vs Password Authentication

Businesses understand the importance of passwords for private data security, but might not realize that using a network with passwords poses many security threats. Every advancement in security technology is followed by more sophisticated hacking techniques. Credentials require password change …

yubikey jamf login

Configuring Yubikey Desktop Login on Jamf-Managed Devices

Patrick Grubbs Consumer Protection

Configuring Yubikey Desktop Login on Jamf-Managed Devices

Yubikeys represent an exciting opportunity to merge two features that are often at odds: security and convenience. Many organizations have purchased Yubikeys and distributed them to their employees for that extra layer of physical security. They’re commonly used to securely …

Using Multi-Factor Authentication for Network Security

Micah Spady Education

Using Multi-Factor Authentication for Network Security

Many inquiries that we receive reference Multi-Factor Authentication (MFA) and how it can be used to improve the network security. MFA is a process that requires more than one form of identity to authenticate a user and approve network access. …

Overcoming Support Tickets

Buried Under a Mountain of Support Tickets? We Can Help!

Jake Ludin Education

Buried Under a Mountain of Support Tickets? We Can Help!

Support tickets are an inescapable burden that many IT departments wish they could reduce. Resolving technical issues is a vital function of any IT department, but they amount to a net negative for all parties involved. Particularly at the beginning …

This artilce discusses some of the common questions we receive about PKIs

Public Key Infrastructure: Explained

Jake Ludin Education

Public Key Infrastructure: Explained

The use of a Public Key Infrastructure (PKI) by an organization demonstrates a dedication to the security of the network and the effectiveness of public key encryption and certificate-based networks. The purpose of a PKI is to manage the public …

Microsoft : PEAP-MSCHAPv2 Vulnerability Could Allow For Credential Theft

News Security Threats

Microsoft : PEAP-MSCHAPv2 Vulnerability Could Allow For Credential Theft

In 2013, Microsoft released a report of a known security vulnerability present within Wi-Fi authentication. The authentication protocol known as PEAP-MSCHAPv2, a widely supported standard, can be exploited to gain user login information from devices which are not properly configured …

Addressing Theft Threats From All Angles

Jake Ludin Security Threats

Addressing Theft Threats From All Angles

The looming threat of a data breach has influenced many organizations to step up the security protecting their wireless network. Organizations with personnel files, financial information, and other types of valuable data are a potential target for hackers, so many …