Better Late Than Never: Addressing NIST’s Updated Password Security Guidance
NIST recently updated its decades-old password security guidance after years of scrutiny, skepticism, and flat-out ineffectiveness finally forced the agency to address practical security considerations and realistic threats while abandoning what many considered to be ineffective security theater.
Let’s Talk About Cookies!
Cookies help enhance our browsing experience, but what are the risks? Learn more about how cookies work, what data they collect, and how you can protect your data from misuse.
SOC 2 Made Simple
Are you tired of filling out lengthy vendor questionnaires and are looking to pursue an SOC 2 examination report instead? Discover some basic practices to secure your customers’ data and pave the way for SOC 2 certification.
On Your DMARC, Get Set, Go!
Google and Yahoo are requiring DMARC beginning in February 2024. So what does that mean for your organization, and how do you implement it?
The Weakest Link: Managing Supply Chain Risk
In the interconnected web of modern business ecosystems, supply chain risks have emerged as insidious threats, leaving even the most vigilant organizations vulnerable to devastating cyber breaches.
Who is Watching You and Why?
In the musical words of Rockwell, 🎵 “I always feel like somebody’s watching me - and I have no privacy.” 🎵Who might be watching you through your webcam, and what can you do to stop it?
Examining the LastPass Breach Through our Password Table
The recent LastPass breach has been rattling around in the news and some researchers believe hackers may have begun to crack some of the stolen passwords. We generated another version of our famous password table for this scenario - read on!
Passkey to the (Passwordless) Future
What would it be like to live in a world without having to memorize and type a million of passwords? Logging in without having to enter a password has been practically impossible - until now.
HTTPS is Secure (Except When it’s Not)
This may be an unpopular opinion: HTTPS is not secure, or at least not always. Let’s go back in time to review what HTTP and HTTPS are and are not - and some of the ways you can protect yourself online.
Exploring Human Errors in Cybersecurity
You may have thought that hackers wore black suits and rappelled off the roof to hack a company, but that only exists in Hollywood. In real life, human error remains one of the leading causes of cybersecurity breaches.
#Secure: Locking Down Your Social Media in Style
Social media platforms are essential tools for personal and professional communication. The increasing number of cyber threats means protecting your accounts has become paramount.
I’m Sorry, But That’s Classified
The discovery of classified information at high profile politicians’ homes and alternate work locations has seemingly swarmed the news cycle in the past six months. Let’s take a look at what classified information is and how it is managed by the United States government.
RFID: Is it Secret? Is it Safe?
RFID technology is used in a plethora of modern applications. Is it secure, and what should we actually worry about?
Whitepaper: The Intersection of Technical Debt and Cybersecurity
Understanding the impact of technical debt on your business operations and cybersecurity efforts can be a challenge. That’s why Hive Systems and BARR Advisory partnered on an in-depth whitepaper to explore how organizations can recognize, prevent, and manage technical debt.
Quantitative Risk Assessment 101
Ready for the future of cybersecurity? Getting started with quantitative risk assessment is easier than you might think.
A Beginner's Guide to 2FA and MFA
Everyone is telling you to enable 2FA or MFA to be secure in the digital age. But how do you do it? And what's the best method for you, or the most secure? Our experts break it down in an approachable way.
Experts Agree This is the Best Way to Protect Your IT Devices
Identify. Evaluate. Remediate. Validate. Repeat.
Insider Threat: The Real Risk to Your Organization
There’s a very real threat to the cybersecurity and safety of your organization: your employees.
What’s an IT Budget and How Much Should I Spend on Cybersecurity?
We break down the steps to proper IT budgeting that will keep your company in business.
10 Reasons to Run a Cybersecurity Drill
There’s no better way to understand your organizations strengths and weaknesses than by running a cybersecurity drill.