wpa2 enterprise protocols

WPA2-Enterprise Authentication Protocols Comparison

Jake Ludin Education

WPA2-Enterprise Authentication Protocols Comparison

Securely authenticating network users is a fundamental aspect of network security and is the source of significant challenges for many network administrators. The network authentication method is one of the first lines of defense that protect users and the network …

Reducing IT support tickets

How to Efficiently Onboard Thousands of Devices

Jake Ludin Education

How to Efficiently Onboard Thousands of Devices

Each year, college campuses must navigate the trials associated with successfully connecting thousands of new students to the wireless network. This may have been moderately challenging 10 years ago, but the explosion of wireless devices in the past few years …

How to gain trust back in your cybersecurity system

What is a Man-In-The-Middle attack?

Samuel Metzler Consumer Protection, Data Breach, Security Threats

What is a Man-In-The-Middle attack?

Remember that episode of Spongebob Squarepants where the titular character and his best friend Patrick are sitting in their backyards passing messages through blowing bubbles? As usual, their antics bother their neighbor Squidward who decides to retaliate by popping their …

Overcoming Support Tickets

Buried Under a Mountain of Support Tickets? We Can Help!

Jake Ludin Education

Buried Under a Mountain of Support Tickets? We Can Help!

Support tickets are an inescapable burden that many IT departments wish they could reduce. Resolving technical issues is a vital function of any IT department, but they amount to a net negative for all parties involved. Particularly at the beginning …

This artilce discusses some of the common questions we receive about PKIs

Public Key Infrastructure: Explained

Jake Ludin Education

Public Key Infrastructure: Explained

The use of a Public Key Infrastructure (PKI) by an organization demonstrates a dedication to the security of the network and the effectiveness of public key encryption and certificate-based networks. The purpose of a PKI is to manage the public …

image for certificate security

Launching Certificate-Based Security Shouldn’t be Intimidating

Jake Ludin Education

Launching Certificate-Based Security Shouldn’t be Intimidating

Historically, some have avoided EAP-TLS certificate-based authentication for wireless security because the overhead costs of setting up and managing this network type end up outweighing the security benefits. To properly configure the network for certificate-based authentication, you’d have to configure …