Certificates Vs Credentials

Samuel Metzler Education, Security Threats

Certificates Vs Credentials

The importance of passwords and data security is self-evident; private data is extremely valuable and must be securely protected. The issue is that using a credential-based network has become obsolete and poses many security threats. Advancements in security technology produces …

Reducing IT support tickets

How to Efficiently Onboard Thousands of Devices

Jake Ludin Education

How to Efficiently Onboard Thousands of Devices

Each year, college campuses must navigate the trials associated with successfully connecting thousands of new students to the wireless network. This may have been moderately challenging 10 years ago, but the explosion of wireless devices in the past few years …

How to gain trust back in your cybersecurity system

What is a Man-In-The-Middle attack?

Samuel Metzler Consumer Protection, Data Breach, Security Threats

What is a Man-In-The-Middle attack?

Remember that episode of Spongebob Squarepants where the titular character and his best friend Patrick are sitting in their backyards passing messages through blowing bubbles? As usual, their antics bother their neighbor Squidward who decides to retaliate by popping their …

Mistakes made when configuring for WPA2

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

Jake Ludin Education

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

The importance of wireless security cannot be understated as the threat of data theft continues to rise. WPA2-Enterprise networks are the first line of defense – they’ve been proven time and again to keep networks secure by protecting against over-the-air …

Mistakes made when configuring for WPA2

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

Patrick Grubbs Uncategorized

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

The importance of wireless security cannot be understated as the threat of data theft continues to rise. WPA2-Enterprise networks are the first line of defense – they’ve been proven time and again to keep networks secure by protecting against over-the-air …

Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

Adam Security Threats

Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

Your users have strong, unique passwords, your networks are protected with WPA2-Enterprise encryption, and you use 802.1x for authentication. WPA2-Enterprise is the gold standard when it comes to security, so you should be safe right? Think again. Our experience helping …

Microsoft : PEAP-MSCHAPv2 Vulnerability Could Allow For Credential Theft

News Security Threats

Microsoft : PEAP-MSCHAPv2 Vulnerability Could Allow For Credential Theft

In 2013, Microsoft released a report of a known security vulnerability present within Wi-Fi authentication. The authentication protocol known as PEAP-MSCHAPv2, a widely supported standard, can be exploited to gain user login information from devices which are not properly configured …

Authenticating with Server Certificate Validation

Demystifying Server Certificate Validation

Jake Ludin Education

Demystifying Server Certificate Validation

Credential theft is a high priority concern across many industries, and to combat it, many institutions have deployed WPA2-Enterprise wireless networks. This network type encrypts all network communications, as well as secures the authentication process. Often, WPA2-Enterprise is deployed in …