man in the middle attack

Man-in-the-Middle (MITM) Attacks: Explained

Sam Metzler Data Breach, Security Threats

Man-in-the-Middle (MITM) Attacks: Explained

If you’ve ever watched this scene from Spongebob Squarepants, then you have a basic understanding of a man-in-the-middle (MITM) attack. How Does a Man-in-the-Middle Attack Work? The attacker sets up rogue hardware pretending to be a trusted network, namely Wi-Fi, …

Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

Patrick Grubbs Security Threats

Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

Your users have strong, unique passwords, your networks are protected with WPA2-Enterprise encryption, and you use 802.1x for authentication. WPA2-Enterprise is the gold standard when it comes to security, so you should be safe right? Think again. Our experience helping ...

3 Mistakes Universities Make Deploying 802.1x and WPA2-Enterprise

Micah Spady Tech Trends

3 Mistakes Universities Make Deploying 802.1x and WPA2-Enterprise

Over the past decade, we’ve helped hundreds of organizations around the world secure and set up WPA2-Enterprise networks. While WPA2-Enterprise remains the golden standard for 802.1x authentication, there are many pitfalls an organization can make when they set it up. …

TTLS-PAP as an authentication method is weaker than others available

EAP-TTLS/PAP Authentication Protocol Is Not Secure

Jake Ludin Uncategorized

EAP-TTLS/PAP Authentication Protocol Is Not Secure

When designing a new network, there are countless features to consider that have a significant impact on the organization at large. Few functions of the network impact the users more than the authentication method chosen by decision makers. If an …

PEAP-MSCHAPv2 Vulnerability Allows For Credential Theft

News Security Threats

PEAP-MSCHAPv2 Vulnerability Allows For Credential Theft

In 2013, Microsoft released a report of a known security vulnerability present within Wi-Fi authentication. The 802.1x authentication protocol known as PEAP-MSCHAPv2, a widely supported standard, can be exploited to gain user login information from devices which are not properly ...

Digital Certificates vs Password Authentication

Sam Metzler Education, Security Threats

Digital Certificates vs Password Authentication

Businesses understand the importance of passwords for private data security, but might not realize that using a network with passwords poses many security threats. Every advancement in security technology is followed by more sophisticated hacking techniques. Credentials require password change …

Reducing IT support tickets

Use WPA-2 Enterprise To Efficiently Onboard Onboard Thousands of Devices

Jake Ludin Education

Use WPA-2 Enterprise To Efficiently Onboard Onboard Thousands of Devices

Each year, college campuses must navigate the trials associated with successfully onboarding thousands of new students to the wireless network. This may have been moderately challenging 10 years ago, but the explosion of wireless devices in the past few years …

Mistakes made when configuring for WPA2

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

Jake Ludin Education

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

The importance of wireless security cannot be understated as the threat of data theft continues to rise. WPA2-Enterprise networks are the first line of defense - they’ve been proven time and again to keep networks secure by protecting against over-the-air ...
Authenticating with Server Certificate Validation

Demystifying Server Certificate Validation

Jake Ludin Education

Demystifying Server Certificate Validation

Credential theft is a high priority concern across many industries, and to combat it, many institutions have deployed WPA2-Enterprise wireless networks. This network type encrypts all network communications, as well as secures the authentication process. Often, WPA2-Enterprise is deployed in …

image for certificate security

Launching Certificate-Based Security Shouldn’t be Intimidating

Jake Ludin Education

Launching Certificate-Based Security Shouldn’t be Intimidating

Historically, some have avoided EAP-TLS certificate-based authentication for wireless security because the overhead costs of setting up and managing this network type end up outweighing the security benefits. To properly configure the network for certificate-based authentication, you’d have to configure …