PKI for Microsoft GPO

Microsoft’s Group Policy Object (GPO) is a useful tool to allow administrators to control the level of access for users on the network. In addition to providing strong security from outside threats, ...
cyber security managed service providers

Best Cyber Security Practices for MSPs

Over 30 millions businesses have fewer than 1,000 employees and many don’t have the IT budget to provide effective network security. Managed Service Providers (MSP) are a godsend for small businesses because ...
https://lh3.googleusercontent.com/proxy/8qECupKLM_-G38tlKLQ9O6cW-WShm_9qTpVuKdvmlRMhaOxDESKFKwgZkUBJ_fV0FYvHhgnwxvIZletVqc93CrA2eXfg7pjBJqn8D074yQyteRU

Problems Facing IT Departments

No one can deny that the IT department is tasked with monumentally important functions. Without an efficient and secure network, nearly every organization would fall apart. IT has to find cost effective ...
https://it.sheridanc.on.ca/images/it-communications.png

User Lookup With Certificate-Based Authentication

Traditionally, the process of authenticating certificates for network access is independent of the user directory. And in a normally-functioning network environment, this is perfectly acceptable. Certificate-based authentication is ironclad and protects the ...
Authenticating to Hotspot 2.0

Mobile Authentication with 802.11u

As mobile device users continue to expect stronger roaming connections and faster data speeds, Wi-Fi Alliance developed PassPoint to meet these high standards. It allows users to easily transfer from wireless network ...
yubikey piv certificate management

YubiKey PIV Certificate Management

Many organizations purchase security keys like the YubiKey to streamline and secure access to various applications, but they can be used for much more. The YubiKey in particular has the ability to ...
open signage on door

The Great Re-Opening

The worldwide uncertainty brought on by the outbreak of COVID-19 has affected every aspect of daily life. How can we return to some semblance of normalcy? The current roadmap to reopening the ...
windows hello yubikey

(Working) Windows Hello for Business Yubikey Login

Windows Hello is one of the easiest ways to add biometric security to your authentication protocols, and if you’re already using other common components of the Microsoft ecosystem for authentication (AD or ...
YubiKey Certificate Enrollment with SecureW2

Yubikey Certificate Attestation Improved

One of the features of new Yubikeys is that they can perform “attestation”, which gives them the potential to be even more powerful in terms of protecting your data. In coordination with ...
ecc for iot

Why ECC is the Solution for IoT Security

ECC, or Eliptical Curve Cryptography, isn’t a new technology – it’s relatively old, actually, Despite being around since 1985, it has just recently begun to gain popularity as an alternative, possibly superior, ...