Mistakes made when configuring for WPA2

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

Jake Ludin Uncategorized

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

The importance of wireless security cannot be understated as the threat of data theft continues to rise. WPA2-Enterprise networks have proven time and again to keep networks secure by protecting against over-the-air attacks. The caveat that has made many cautious ...
Authenticating with Server Certificate Validation

Demystifying Server Certificate Validation

Jake Ludin Uncategorized

Demystifying Server Certificate Validation

Credential theft is a high priority concern across many industries, and to combat it, many institutions have deployed WPA2-Enterprise wireless networks. This network type encrypts all network communications, as well as secures the authentication process. Often, WPA2-Enterprise is deployed in ...
image for certificate security

Launching Certificate-Based Security Shouldn’t be Intimidating

Jake Ludin Uncategorized

Launching Certificate-Based Security Shouldn’t be Intimidating

Historically, some have avoided EAP-TLS certificate-based authentication for wireless security because the overhead costs of setting up and managing this network type end up outweighing the security benefits. To properly configure the network for certificate-based authentication, you’d have to configure ...
Credential theft of an SMB

Credential Theft Threats Facing SMBs

Jake Ludin Uncategorized

Credential Theft Threats Facing SMBs

Data and credential theft have become an increasingly prevalent concern for SMBs as more attackers choose to target them. It’s common to hear about large scale hacks, such as Target, Yahoo, or Equifax, but far less frequently reported are attacks ...
Reducing IT support tickets

How to Efficiently Onboard Thousands of Devices

Jake Ludin Uncategorized

How to Efficiently Onboard Thousands of Devices

Each year, college campuses must navigate the trials associated with successfully connecting thousands of new students to the wireless network. This may have been moderately challenging 10 years ago, but the explosion of wireless devices in the past few years ...
Using incorrect certificates on your network

Stop using self-signed certificates for 802.1X

Adam Education, Uncategorized

Stop using self-signed certificates for 802.1X

When setting up 802.1X we often run into questions about using self signed certificates for WPA2-Enterprise server certificate validation.  First, we should clarify the difference between a self-signed certificate and a private Certificate Authority — this is often a point of …

Face-off server certificate validation

802.1X and HTTPS face off when it comes to server certificate validation

Adam Uncategorized

802.1X and HTTPS face off when it comes to server certificate validation

This is part 2 of our series on server certificate validation. In talking with many customers about setting up RADIUS certificates, it is clear many admins have a difficult time describing the server certification validation process to their user base. …

Without server certificate validation, WPA2-Enterprise isn’t secure

Adam Security Threats

Without server certificate validation, WPA2-Enterprise isn’t secure

This article is the first in a series on server certificates. Your users have strong, unique passwords, your networks are protected with WPA2-Enterprise encryption, and you use 802.1x for authentication. WPA2-Enterprise is the gold standard when it comes to security, …