Tag: phishing

Stop relying on NTLM. Start trusting certificates.
Risks & Threats November 6, 2024
Why NTLM Authentication is Vulnerable

One of the biggest problems with Windows environments is the insistence to continue to build upon older systems despite the emergence of cloud solutions. Attackers can easily gain access to...

Digital certificates are the backbone of trust in online communications.
PKI/Certificates April 18, 2022
The Anatomy Of An X.509 Digital Certificate

Digital certificates are frequently used in the online world as a means of identification. The information embedded in the certificates lets anyone verify the identity of an entity with the...

Convenience shouldn't come at the cost of security
Integrations October 29, 2021
Cloud-Hosted LDAP is Vulnerable with Credentials

Organizations are always looking for a new strategy to increase the convenience of using their network without compromising security. As a result, many have sought out cloud solutions. Read here...

FIDO2 + PKI = Stronger access, simpler management.
Integrations September 21, 2021
Combining FIDO2 and PKI: Supporting All Your Applications

The world of IT is constantly evolving. This is true due to both advancements in technology and the emerging remote work landscape of the world. Remote work is now commonplace...

Every user, every device, always verified.
Protocols & Standards April 2, 2021
Zero Trust Strategy Best Practices With AD CS

Zero trust is a burgeoning security practice among cybersecurity-focused organizations. The main concept behind zero trust is limiting a user’s resources to only what they need access to. For example,...

Modern Wi-Fi, simplified for every network.
Protocols & Standards March 24, 2021
How To Use Google Wi-Fi Without Active Directory and NPS?

While technology changes rapidly, one constant is the use of Google and its spread across all facets of business technology. But how people connect to Google services and how they...

Secure VPN access with 802.1X authentication.
Protocols & Standards March 2, 2021
How to Secure 802.1X for Remote Workers

Though remote work wasn’t started by the Covid-19 pandemic, it has increased drastically to the point that working from home will be commonplace for many workers. Unfortunately that leaves organizations...

Cyber threats evolve; MSPs must adapt.
Service Providers October 30, 2020
Top 3 Cybersecurity Concerns for MSPs

Managed service providers (MSPs) have been the focal point of a series of attacks that are starting to draw attention from the public. A study conducted by Vanson Bourne surveyed...

The Average Internet User Manages 70+ Passwords?! No, Thank You.
Thought Leadership July 14, 2020
Are Passwords Secure?

Credential-based authentication is the method nearly all network users are used to and has been a common tool for decades. But unlike other decades-old technology, passwords have not been phased...

Protect your VPN from phishing with certificate-based authentication.
ZTNA & VPN June 5, 2020
How to Prevent VPN Phishing Attacks

What is a Phishing Attack A phishing attack is a type of social engineering attack that is used to steal an unsuspecting user’s data by masquerading as a trusted platform....

35% of Exploits Are MITM—Are You Safe?
Risks & Threats June 1, 2020
What Is a Man in the Middle Attack? MITM Explained

If you’ve ever watched this scene from Spongebob Squarepants, then you have a basic understanding of a man-in-the-middle (MITM) attack. According to UPS Capital, cyber attacks cost small businesses an...

Credentials Alone Are Easy Prey
Risks & Threats March 19, 2020
Phishing Scams Are Now Capitalizing on Coronavirus

COVID-19, better known as the Coronavirus, is spreading throughout the world right now and has a lot of people concerned. This has led to scammers incorporating the virus into their...

Passwords are the Weak Link in Ransomware Defense
Risks & Threats March 16, 2020
How To Address America’s Ransomware Threats

Over the course of the 2010s, ransomware attacks on city and state governments have increased in number and effectiveness. The lack of proper cybersecurity measures has highlighted a weakness in...

Simplify access and boost security with SAML SSO—you sign in once and unlock Wi-Fi and apps securely.
ZTNA & VPN September 30, 2019
Streamline Your Network with a Single Sign-On Policy

Organizations that seek out opportunities to improve the efficiency of their network should consider using SAML authentication to implement a Single Sign-On (SSO) policy. First and foremost, SAML is an...

Secure systems aren’t enough. Constant configuration checks, logging, and proactive testing keep your defenses reliable
Risks & Threats September 30, 2019
Effective Cybersecurity in Banking Starts With People

Large banking institutions like Capital One are among the most targeted organizations by cyber-criminals looking to profit through data theft. Banks are responsible for protecting heaps of personal information about...

Protect your network from credential theft by combining certificate-based controls, PAM, and machine learning.
Risks & Threats July 2, 2019
Addressing Credential Theft Threats From Every Angle

The looming threat of a data breach has influenced many organizations to step up the security protecting their wireless network. Organizations with personnel files, financial information, and other types of...

The Equifax breach proved that expired certificates and weak security practices can expose millions to risk
Risks & Threats May 14, 2019
Equifax’s Story: The Risks of Lax Security

On July 29th, 2017, Equifax discovered that data was leaking out of the credit bureau’s databases and had been since approximately mid-May of that year. They publicly reported the incident...