<img height="1" width="1" src="https://www.facebook.com/tr?id=3323484487762706&amp;ev=PageView&amp;noscript=1">

Blog (8)

Cybersecurity Experts Alarmed Over Log4j Vulnerability. Should You be Worried?

The Apache Log4j vulnerability is currently the most talked-about security flaw due to its ability ...
Duane Laflotte

Types of Denial of Service (DoS) Attacks and How We Detect Them

Denial of Service (DoS) attacks on wireless networks are almost impossible to stop. Some attacks ...
Tim Connell

Wi-Fi Security Standards and Protocols

On your access points, are you using at a minimum WPA2-PSK with CCMP encryption? Is TKIP encryption ...
Tim Connell

Correlating a Device MAC Address to the Type of Device

Typically, when a device successfully connects to a network, the only information the network needs ...
Tim Connell

The Preferred Network List (PNL) for Devices Connecting to Your Network

Do you know the preferred network list (PNL) for the devices connecting to your network?
Corey Belanger

Who Is Connected to Your Network?

Do you currently know who is connected to your corporate wireless network? Most people cannot even ...
Corey Belanger