How to gain trust back in your cybersecurity system

What is a Man-In-The-Middle attack?

Samuel Metzler Consumer Protection, Data Breach, Security Threats

What is a Man-In-The-Middle attack?

Remember that episode of Spongebob Squarepants where the titular character and his best friend Patrick are sitting in their backyards passing messages through blowing bubbles? As usual, their antics bother their neighbor Squidward who decides to retaliate by popping their …

Addressing Theft Threats From All Angles

Jake Ludin Security Threats

Addressing Theft Threats From All Angles

The looming threat of a data breach has influenced many organizations to step up the security protecting their wireless network. Organizations with personnel files, financial information, and other types of valuable data are a potential target for hackers, so many …

Equifax security breach

Equifax’s Story: The Risks of Lax Security

Jake Ludin Case study, Data Breach

Equifax’s Story: The Risks of Lax Security

On July 29th, 2017, Equifax discovered that data was leaking out of the credit bureau’s databases and had been since approximately mid-May of that year. They publicly reported the incident on September 7th, and it quickly became known as one …

Authenticating with Server Certificate Validation

Demystifying Server Certificate Validation

Jake Ludin Education

Demystifying Server Certificate Validation

Credential theft is a high priority concern across many industries, and to combat it, many institutions have deployed WPA2-Enterprise wireless networks. This network type encrypts all network communications, as well as secures the authentication process. Often, WPA2-Enterprise is deployed in …

Credential theft of an SMB

Credential Theft Threats Facing SMBs

Jake Ludin Security Threats

Credential Theft Threats Facing SMBs

Data and credential theft have become an increasingly prevalent concern for SMBs as more attackers choose to target them. It’s common to hear about large scale hacks, such as Target, Yahoo, or Equifax, but far less frequently reported are attacks …