Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • WPA3-Enterprise: Should you Adopt It?

    WPA (Wi-Fi Protected Access) was created in the early 2000s when IT professionals quickly realized that WEP (Wired Equivalency Protocol) had terrible security vulnerabilities. WPA2 was ratified in 2004 as a more secure iteration of the protocol and is what ...

    Read More
  • Is RadSec Necessary for Eduroam?

    Students and staff who visit other colleges and universities frequently encounter challenges accessing safe Wi-Fi networks. Without an integrated system, they may encounter connectivity challenges, different login procedures, or concerns about data security on new networks. These barriers can impede ...

    Read More
  • Complete Guide to Android 802.1X

    In this article, we’ll examine a crucial authentication method for keeping your Android devices secure while connecting to networks. It’s called 802.1X authentication. This specific security approach ensures only the designated devices can access a network. Consider it a secret ...

    Read More
  • The Dangers of Self-Signed Certificates

    Self-signed certificates continue to pose critical risks to organizations prioritizing secure communication. While they may seem convenient for quick deployments, their inherent vulnerabilities can lead to severe security and operational challenges. A self-signed SSL certificate, generated by the same entity ...

    Read More
  • Solved: Error “Cannot Manage Active Directory Certificate Services”

    Admins configuring Active Directory Certificate Services (AD CS) for their network may encounter the following error message: Cannot manage active directory certificate services. The system cannot find the file specified: 0x800700002 (WIN32: 2 ERROR_FILE_NOT_FOUND) Fortunately, this error is usually easily ...

    Read More
  • What is PIV (Personal Identity Verification)?

    Personal Identity Verification (PIV) is a security standard detailed in NIST FIPS 201-2 that creates a framework for multi-factor authentication (MFA) on a smartcard. While PIV was originally designed for the US government, it has seen widespread use in commercial ...

    Read More
  •  How Safe Is The EMF Exposure From Wi-fi?

    Most people use Wi-Fi, which emits electronic and magnetic fields (EMF). But are the EMFs from Wi-Fi dangerous? The short answer is no, but we'll dig into the question further.

    Read More
  • A Guide to Server Certificates

    Server security is critical in today’s digitally driven environment. The server certificate, a digital document that verifies the identification of a website or server, is fundamental to Internet communication security. Server certificates enable encrypted connections, guaranteeing the confidentiality and integrity ...

    Read More
  • Top 6 Ways To Prevent Your Network From DNS Poisoning Attacks

    As we increasingly rely on the internet for both personal and professional activities, understanding the potential threats to our online security becomes essential. A prevalent and significant risk is DNS Poisoning, a cyber attack that manipulates and exploits vulnerabilities in ...

    Read More
  • An Overview Of Passpoint In Network Infrastructure

    Wi-Fi access has evolved from the manual selection of Service Set Identifiers (SSIDs) to the automated, secure connectivity of Passpoint. Initially, users had to browse a list of available SSIDs, select a network, and manually enter credentials—an often cumbersome and ...

    Read More