TTLS-PAP as an authentication method is weaker than others available

EAP-TTLS/PAP Authentication Protocol Is Not Secure

Jake Ludin Uncategorized

EAP-TTLS/PAP Authentication Protocol Is Not Secure

When designing a new network, there are countless features to consider that have a significant impact on the organization at large. Few functions of the network impact the users more than the authentication method chosen by decision makers. If an …

Digital Certificates vs Password Authentication

Sam Metzler Education, Security Threats

Digital Certificates vs Password Authentication

Businesses understand the importance of passwords for private data security, but might not realize that using a network with passwords poses many security threats. Every advancement in security technology is followed by more sophisticated hacking techniques. Credentials require password change …

Using Multi-Factor Authentication for Network Security

Micah Spady Education

Using Multi-Factor Authentication for Network Security

Many inquiries that we receive reference Multi-Factor Authentication (MFA) and how it can be used to improve the network security. MFA is a process that requires more than one form of identity to authenticate a user and approve network access. …

Reducing IT support tickets

Use WPA-2 Enterprise To Efficiently Onboard Onboard Thousands of Devices

Jake Ludin Education

Use WPA-2 Enterprise To Efficiently Onboard Onboard Thousands of Devices

Each year, college campuses must navigate the trials associated with successfully onboarding thousands of new students to the wireless network. This may have been moderately challenging 10 years ago, but the explosion of wireless devices in the past few years …

Overcoming Support Tickets

Buried Under a Mountain of Support Tickets? We Can Help!

Jake Ludin Education

Buried Under a Mountain of Support Tickets? We Can Help!

Support tickets are an inescapable burden that many IT departments wish they could reduce. Resolving technical issues is a vital function of any IT department, but they amount to a net negative for all parties involved. Particularly at the beginning …

This artilce discusses some of the common questions we receive about PKIs

Public Key Infrastructure: Explained

Jake Ludin Education

Public Key Infrastructure: Explained

To start, let’s answer the question, “What does a PKI stand for”? PKI stands for Public Key Infrastructure, the use of aPKI by an organization demonstrates a dedication to the security of the network and the effectiveness of public key …

Samsung Keyboards Vulnerable to Man-in-the-Middle Exploit

News Security Threats

Samsung Keyboards Vulnerable to Man-in-the-Middle Exploit

During a presentation at BlackHat London in early June, a major vulnerability in software that comes bundled with Samsung phones was unveiled. The bug, uncovered by NowSecure researcher Ryan Welton, lets intruders hijack software updates for Swiftkey, the device’s default ...