man in the middle attack

Man-in-the-Middle (MITM) Attacks: Explained

Sam Metzler Data Breach, Security Threats

Man-in-the-Middle (MITM) Attacks: Explained

If you’ve ever watched this scene from Spongebob Squarepants, then you have a basic understanding of a man-in-the-middle (MITM) attack. How Does a Man-in-the-Middle Attack Work? The attacker sets up rogue hardware pretending to be a trusted network, namely Wi-Fi, …

mitm attacks

Preventing Man-in-the-middle (MITM) Attacks: The Ultimate Guide

Sam Metzler Tech Trends

Preventing Man-in-the-middle (MITM) Attacks: The Ultimate Guide

A man-in-the-middle (MITM) attack is an incredibly dangerous type of cyber attack that involves a hacker infiltrating a private network by impersonating a rogue access point and acquiring login credentials. According to IBM’s X-Force Threat Intelligence Index, 35% of exploitation …

Many Universities make the same assupmtions concerning PEAP-MSCHAPv2

Top 3 PEAP-MSCHAPv2 Mistakes Made by Universities

Jake Ludin Consumer Protection, Education

Top 3 PEAP-MSCHAPv2 Mistakes Made by Universities

Credential-based authentication with PEAP-MSCHAPv2 is still commonly used, and for some network types it is appropriate. A home network or a small coffee shop offering free wireless can benefit from its convenience. But for any institution or university hosting valuable …

3 Mistakes Universities Make Deploying 802.1x and WPA2-Enterprise

Micah Spady Tech Trends

3 Mistakes Universities Make Deploying 802.1x and WPA2-Enterprise

Over the past decade, we’ve helped hundreds of organizations around the world secure and set up WPA2-Enterprise networks. While WPA2-Enterprise remains the golden standard for 802.1x authentication, there are many pitfalls an organization can make when they set it up. …

How MFA was broken by a hacker group

Stronger Multi-Factor Authentication With Certificates

Jake Ludin Consumer Protection, Security Threats

Stronger Multi-Factor Authentication With Certificates

It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploited by hackers. Many organizations recognize this and utilize Multi-Factor Authentication (MFA) to an extra layer of protection. Each additional …

Digital Certificates vs Password Authentication

Sam Metzler Education, Security Threats

Digital Certificates vs Password Authentication

Businesses understand the importance of passwords for private data security, but might not realize that using a network with passwords poses many security threats. Every advancement in security technology is followed by more sophisticated hacking techniques. Credentials require password change …

Addressing Theft Threats From All Angles

Jake Ludin Security Threats

Addressing Theft Threats From All Angles

The looming threat of a data breach has influenced many organizations to step up the security protecting their wireless network. Organizations with personnel files, financial information, and other types of valuable data are a potential target for hackers, so many …