Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • 3 Best Practices for Onboarding BYODs

    Bring Your Own Device (BYOD) systems can be an amazing tool for businesses or schools looking to increase productivity and reduce cost. According to a study by Forbes, 42 percent of those who use their own devices at work say ...

    Read More
  • Why Most Are Leaving LDAP With WPA2-Enterprise Behind

    For years, the credential-based network authentication standard was the Lightweight Directory Access Protocol (LDAP). The security and efficiency offered by LDAP provided the necessary protection levels for everyday WPA2-Enterprise operations. But as time progressed, new methods of authentication have been ...

    Read More
  • Managed PKI VS Private PKI

    Deciding between a managed PKI and a private PKI is a difficult decision. Each method of PKI management has advantages and disadvantages, and if you’re coming from a place of little experience, it can be daunting to choose one. We’ve ...

    Read More
  • Top 4 Managed PKI Use Cases

    A Managed PKI is a vital part of any comprehensive network security strategy. It allows you to use digital certificates for authentication, a form of credential that’s much more secure and widely-applicable than passwords. Certificates offer the following advantages: Certificates ...

    Read More
  • It’s Time For SHA-1 Hash To End

    SHA-1 is a commonly used cryptographic hash algorithm that has been used for nearly 2 decades to secure online communications. It was originally designed for government use, but an exploit was discovered and its official government use was phased out. ...

    Read More
  • Phishing Scams Are Now Capitalizing on Coronavirus

    COVID-19, better known as the Coronavirus, is spreading throughout the world right now and has a lot of people concerned. This has led to scammers incorporating the virus into their phishing attacks to trick people out of their private information ...

    Read More
  • How To Address America’s Ransomware Threats

    Over the course of the 2010s, ransomware attacks on city and state governments have increased in number and effectiveness. The lack of proper cybersecurity measures has highlighted a weakness in the US’s preparedness and ability to protect government data. The ...

    Read More
  • Combating Burnout in Cybersecurity

    Cybersecurity professionals are highly sought-after individuals that add an immense amount of value to an organization, but that value can be difficult to pin down in terms of dollars. As a result, they tend to be under-represented within some organizations. ...

    Read More
  • PPSK Is Not an Alternative to 802.1x

    Believe it or not, the aging WPA-Personal protocol has seen some innovation in the past few years. Several companies have developed unique PSK authentication protocols with varying names, though “Private PSK” (PPSK) has emerged as the commonly-accepted phrase. Here are ...

    Read More
  • Top 3 PEAP-MSCHAPv2 Mistakes Made by Universities

    Credential-based authentication with PEAP-MSCHAPv2 is still commonly used, and for some network types it is appropriate. A home network or a small coffee shop offering free wireless can benefit from its convenience. But for any institution or university hosting valuable ...

    Read More