consumer protection
PKI for Microsoft GPO
Microsoft’s Group Policy Object (GPO) is a useful tool to allow administrators to control the level of access for users on the network. In addition to providing strong security from outside threats, ...
Best Cyber Security Practices for MSPs
Over 30 millions businesses have fewer than 1,000 employees and many don’t have the IT budget to provide effective network security. Managed Service Providers (MSP) are a godsend for small businesses because ...
Problems Facing IT Departments
No one can deny that the IT department is tasked with monumentally important functions. Without an efficient and secure network, nearly every organization would fall apart. IT has to find cost effective ...
User Lookup With Certificate-Based Authentication
Traditionally, the process of authenticating certificates for network access is independent of the user directory. And in a normally-functioning network environment, this is perfectly acceptable. Certificate-based authentication is ironclad and protects the ...
Mobile Authentication with 802.11u
As mobile device users continue to expect stronger roaming connections and faster data speeds, Wi-Fi Alliance developed PassPoint to meet these high standards. It allows users to easily transfer from wireless network ...
YubiKey PIV Certificate Management
Many organizations purchase security keys like the YubiKey to streamline and secure access to various applications, but they can be used for much more. The YubiKey in particular has the ability to ...
The Great Re-Opening
The worldwide uncertainty brought on by the outbreak of COVID-19 has affected every aspect of daily life. How can we return to some semblance of normalcy? The current roadmap to reopening the ...
(Working) Windows Hello for Business Yubikey Login
Windows Hello is one of the easiest ways to add biometric security to your authentication protocols, and if you’re already using other common components of the Microsoft ecosystem for authentication (AD or ...
Yubikey Certificate Attestation Improved
One of the features of new Yubikeys is that they can perform “attestation”, which gives them the potential to be even more powerful in terms of protecting your data. In coordination with ...
Why ECC is the Solution for IoT Security
ECC, or Eliptical Curve Cryptography, isn’t a new technology – it’s relatively old, actually, Despite being around since 1985, it has just recently begun to gain popularity as an alternative, possibly superior, ...

