When it comes to cybersecurity, you need to ACT, and not react.
Our Approachable Cyber Threats (ACT) blog breaks down risks, headlines, and industry trends into clear, actionable insights. Written by our team of experts to keep you informed, not overwhelmed.
Preparation: The Real Secret to Saving Money in Cybersecurity
Data breaches are expensive but smart preparation can make them survivable. We break down how small businesses can reduce cyber risk with simple steps like training, planning, and response readiness.
Your Guide to Engaging with a C3PAO
CMMC is here and C3PAO assessments began on January 2, 2025. So what should you expect from an assessment, and how can you set your company up for success?
CMMC Is Here: Your Essential Guide to Identifying and Protecting Federal Contract Information (FCI)
As the CMMC program takes effect, understanding what qualifies as Federal Contract Information (FCI) is critical. This guide breaks down FCI definitions, offers practical tips for identifying and handling FCI across your organization, and walks you through applying CMMC Level 1 controls—ensuring you stay compliant, secure, and ready for the new era of defense contracting.
Navigating the Dual Impact of AI in Cybersecurity
Artificial Intelligence (AI) is set to be the newest ally for many companies, but it’s also set to be the newest threat.
On Your DMARC, Get Set, Go!
Google and Yahoo are requiring DMARC beginning in February 2024. So what does that mean for your organization, and how do you implement it?
The Race to CMMC Compliance: Understanding the DoD’s New Implementation Plan
The DoD just released a proposed rule for implementation of all CMMC requirements by October 1, 2026. The plan will be implemented in four phases.
Who is Watching You and Why?
In the musical words of Rockwell, 🎵 “I always feel like somebody’s watching me - and I have no privacy.” 🎵Who might be watching you through your webcam, and what can you do to stop it?
HTTPS is Secure (Except When it’s Not)
This may be an unpopular opinion: HTTPS is not secure, or at least not always. Let’s go back in time to review what HTTP and HTTPS are and are not - and some of the ways you can protect yourself online.
Exploring Human Errors in Cybersecurity
You may have thought that hackers wore black suits and rappelled off the roof to hack a company, but that only exists in Hollywood. In real life, human error remains one of the leading causes of cybersecurity breaches.
Data Breach 101: Actions to Take After a Breach
Data breaches are a significant concern here in the digital age. With technology advancing rapidly, hackers have been using various methods to gain sensitive information from unsuspecting individuals, organizations, and you.
#Secure: Locking Down Your Social Media in Style
Social media platforms are essential tools for personal and professional communication. The increasing number of cyber threats means protecting your accounts has become paramount.
Keep Calm and Check Your Public Wi-Fi Connection
When it comes to public Wi-Fi, it is “better to be safe than sorry.” Read our guide and secure your Wi-Fi connection when you travel.
Let’s Not Get Smished
Email isn't the only way hackers try to get your information. They can also use text messages to entice victims to click on links in scams known as “smishing.”
Black Friday and Cyber Monday Cyber Scams on the Rise
Holiday shopping season is upon us, but it may not be so jolly if you take risks when shopping online. Read our guide for how to stay safe when shopping for gifts this year!
RFID: Is it Secret? Is it Safe?
RFID technology is used in a plethora of modern applications. Is it secure, and what should we actually worry about?
Applying Heuristics in Cybersecurity
Using heuristics in cybersecurity is a bad idea...except when it's not. We look at what heuristics are, how to leverage them in a meaningful way, and how to avoid their pitfalls.
The Dangers of QR Codes
The recent rise in QR codes allows for easy access to information - including yours. So are QR codes dangerous, and what can you do to protect yourself?
Password Hygiene: LastPass Edition!
A recent scare for LastPass has many people wondering: are password managers worth it, and what can I do to protect my information better?
Q&A Follow-up from “Risk Assessment on the Shoulders of Scientists”
We received a number of follow-up questions during our Hive Live workshop “Risk Assessment on the Shoulders of Scientists” and we’ve got detailed answers!
Experts Agree This is the Best Way to Protect Your IT Devices
Identify. Evaluate. Remediate. Validate. Repeat.
Explore our archives
- July 2025
-
June 2025
- Jun 17, 2025 Ahead of the Curve: Learning from Cyber Preparedness Done Right
- Jun 10, 2025 QUICK READ: The Death of DIBNet
- May 2025
-
April 2025
- Apr 29, 2025 Are Your Passwords in the Green?
- Apr 17, 2025 FedRAMP 20x: Change is Coming, But Are We Ready?
- Apr 11, 2025 Financial Fallout: The True Cost of Employee Loss
- Apr 8, 2025 Preparing a Cryptographic Inventory for a Post Quantum Computing World
- Apr 1, 2025 This Major Vulnerability Could Fill Your Computer with Bees (Seriously)
- March 2025
- February 2025
-
January 2025
- Jan 7, 2025 Your Guide to Engaging with a C3PAO
- December 2024
- November 2024
-
October 2024
- Oct 24, 2024 Getting Ahead of CMMC with Joint Surveillance Voluntary Assessments
- Oct 15, 2024 RED ALERT: CMMC Begins December 16th
- Oct 7, 2024 Better Late Than Never: Addressing NIST’s Updated Password Security Guidance
- Oct 1, 2024 A Farewell to the JAB
-
August 2024
- Aug 19, 2024 It’s Time For Your Wakeup Call: CMMC is Almost Here!
- Aug 5, 2024 BEWARE: Job scams are on the rise!
- July 2024
-
May 2024
- May 23, 2024 NIST Releases New CUI Security Requirements
-
April 2024
- Apr 23, 2024 Are Your Passwords in the Green in 2024?
-
March 2024
- Mar 1, 2024 Let’s Talk About Cookies!
-
February 2024
- Feb 23, 2024 Navigating the Dual Impact of AI in Cybersecurity
- Feb 12, 2024 SOC 2 Made Simple
- Feb 1, 2024 On Your DMARC, Get Set, Go!
- January 2024
-
December 2023
- Dec 21, 2023 The Weakest Link: Managing Supply Chain Risk
- Dec 7, 2023 The Cyber Attack Perception Problem in 2023
-
October 2023
- Oct 17, 2023 Approachable CMMC: Accelerate with our SSP Template
- Oct 5, 2023 Who is Watching You and Why?
-
September 2023
- Sep 27, 2023 Deepfakes: Can You Trust What You See?
- Sep 13, 2023 Examining the LastPass Breach Through our Password Table
-
August 2023
- Aug 7, 2023 Passkey to the (Passwordless) Future
-
July 2023
- Jul 31, 2023 Brand New SEC Cybersecurity Requirements
- Jul 3, 2023 HTTPS is Secure (Except When it’s Not)
-
May 2023
- May 30, 2023 Exploring Human Errors in Cybersecurity
- May 8, 2023 Newly Exploited Vulnerabilities in Apple Devices
-
April 2023
- Apr 18, 2023 Are Your Passwords in the Green in 2023?
- Apr 17, 2023 Data Breach 101: Actions to Take After a Breach
-
March 2023
- Mar 24, 2023 #Secure: Locking Down Your Social Media in Style
- Mar 9, 2023 Telecommunications: A Case Study
-
February 2023
- Feb 16, 2023 I’m Sorry, But That’s Classified
- Feb 8, 2023 Digital Banking - Case Study
- Feb 1, 2023 Hospital & Healthcare Technology - Case Study
-
January 2023
- Jan 17, 2023 Keep Calm and Check Your Public Wi-Fi Connection
- Jan 4, 2023 Let’s Not Get Smished
-
December 2022
- Dec 13, 2022 The Data Breach Perception Problem in 2022
- November 2022
- September 2022
-
August 2022
- Aug 25, 2022 Crypto Cons Continue
- Aug 20, 2022 I am once again asking you to update your Apple devices
- Aug 10, 2022 The Art of (Cyber) War
-
July 2022
- Jul 19, 2022 RFID: Is it Secret? Is it Safe?
- Jul 7, 2022 The Revival of Raccoon Stealer
-
June 2022
- Jun 7, 2022 Conti Ransomware Continues to Cause Concern
- May 2022
-
April 2022
- Apr 29, 2022 Avoiding Tax Scams in 2022
-
March 2022
- Mar 22, 2022 A Look at the Cybersecurity Red Alert from the White House
- Mar 2, 2022 Are Your Passwords in the Green in 2022?
-
February 2022
- Feb 17, 2022 Applying Heuristics in Cybersecurity
- Feb 14, 2022 The Dangers of QR Codes
- Feb 14, 2022 Hive Systems on InvestigateTV About Social Media Hacking
- Feb 8, 2022 Happy Safer Internet Day 2022!
-
January 2022
- Jan 27, 2022 Quantitative Risk Assessment 101
- Jan 25, 2022 Practical Practices for Data Privacy Week
- Jan 24, 2022 A Beginner's Guide to 2FA and MFA
- Jan 12, 2022 Password Hygiene: LastPass Edition!
- Jan 5, 2022 Q&A Follow-up from “Risk Assessment on the Shoulders of Scientists”
-
December 2021
- Dec 16, 2021 Log4Shell: The New ‘Heartbleed’
- Dec 13, 2021 These Passwords Are a Joke
-
October 2021
- Oct 29, 2021 Experts Agree This is the Best Way to Protect Your IT Devices
- Oct 28, 2021 Insider Threat: The Real Risk to Your Organization
- Oct 27, 2021 What’s an IT Budget and How Much Should I Spend on Cybersecurity?
- Oct 26, 2021 10 Reasons to Run a Cybersecurity Drill
- Oct 25, 2021 An Unholy Union: Remote Access and Ransomware
- Oct 22, 2021 Cybersecurity’s Newest Advocate: the CFO
- Oct 21, 2021 A New Career Could Mean a Stolen Identity
- Oct 17, 2021 Don't Let Ransomware Take Hostage of Your Information
- Oct 14, 2021 A Guide to Increasing Your Email Security and Deliverability: DMARC
- Oct 14, 2021 A Guide to Increasing Your Email Security and Deliverability: DKIM
- Oct 14, 2021 A Guide to Increasing Your Email Security and Deliverability: SPF
- Oct 13, 2021 Let’s Go Phishing
- Oct 11, 2021 If Your Devices Aren’t Updated, You’re In For A Bad Time
- Oct 10, 2021 What’s Your iPrivacy?
- Oct 9, 2021 Stop Hackers Dead In Their Tracks With This Easy Trick
- Oct 8, 2021 What is a VPN? And How Does it Work?
- Oct 7, 2021 How Hackers Steal and Use Your Passwords
- Oct 5, 2021 What Does my Router Actually Do?
- Oct 5, 2021 How Am I Supposed to Remember All These Passwords?
- Oct 4, 2021 Facebook, Instagram, Whatsapp down
- Oct 1, 2021 It’s Cybersecurity Awareness Month!
-
September 2021
- Sep 14, 2021 What Really Caused Data Breaches in 2020?
- Sep 13, 2021 Go Update Your iPhone and iPad NOW!
- Sep 7, 2021 Hive Systems Featured on BARR Advisory’s cyBARR Chats
- August 2021
-
July 2021
- Jul 27, 2021 Get it Together, Twitter-verse
- Jul 13, 2021 Yes, People Are Really Still Using These Versions of Windows…
-
June 2021
- Jun 28, 2021 Unplug Your WD MyBook Now
- Jun 28, 2021 Don’t Let Ransomware Corrupt Your Data Completely
- Jun 15, 2021 Here's How People Keep Track of Their Passwords
-
May 2021
- May 18, 2021 Paying the Ransom is No Guarantee
- May 6, 2021 World Password Day 2021
- May 5, 2021 Update your iPhone and iPad TODAY! (again)
- May 5, 2021 Hive Systems Partners with BARR Advisory to Offer A Comprehensive Cybersecurity Solution
-
April 2021
- Apr 28, 2021 Apple’s One Last Thing: Privacy
- Apr 21, 2021 You’ve Got a Lot to Lose to Insider Threat
- Apr 14, 2021 The Snowball Effect of Security Flaw Remediation Costs
- Apr 13, 2021 Identity Management Day 2021
- Apr 9, 2021 Facebook’s Massive Data Breach Is Already Impacting You
- Apr 7, 2021 Are You Being Targeted by Hackers Because of Your Age?
- Apr 1, 2021 This Major Vulnerability Could Fill Your Computer with Bees
-
March 2021
- Mar 31, 2021 6 Ways to Protect Your Home While on Vacation
- Mar 30, 2021 It’s Time to ACT Against Cyber Crime
- Mar 10, 2021 Let's Talk About Cybersecurity in 2020 by the Numbers
- Mar 8, 2021 A Guide to Mitigating the Critical Microsoft Exchange Vulnerability
-
February 2021
- Feb 18, 2021 The Top Cybersecurity Blogs We're Reading in 2022
- Feb 9, 2021 Average Ransom Payments are Still Climbing!
- Feb 9, 2021 It’s Safer Internet Day!
- Feb 1, 2021 Hive Systems Presents: Hive Live
-
January 2021
- Jan 27, 2021 Data Privacy Day 2021
- Jan 27, 2021 Own an iPhone or iPad? Update TODAY!
- Jan 19, 2021 What Are You Worth on the Dark Web?
-
December 2020
- Dec 28, 2020 ACT Top 10 Countdown of 2020
- Dec 21, 2020 Don't Fall for These Common Phishing Tests
- Dec 1, 2020 Lost Time is Lost Money After a Cyber Attack
-
November 2020
- Nov 24, 2020 Shop Safely on Black Friday and Cyber Monday with These Tricks
- Nov 23, 2020 Record Numbers Expected on Cyber Monday
- Nov 18, 2020 Small Businesses are Overconfident and Underprepared
- Nov 12, 2020 Time to Set Up Multi Factor Authentication
-
October 2020
- Oct 19, 2020 Biggest Data Breaches of All Time
- Oct 18, 2020 Not All Telework Solutions are Created Equal
- Oct 11, 2020 Your New Smart Devices Could be Your New Problem
- Oct 9, 2020 Home Security Cameras Aren’t the Problem - You Are
- Oct 2, 2020 October is Cybersecurity Awareness Month
-
September 2020
- Sep 30, 2020 Let's Talk About Phishing Red Flags
- Sep 28, 2020 Massive U.S. Healthcare Company UHS a Victim of Major Cyber Attack
- Sep 24, 2020 They're Not Who You Think They Are
- Sep 8, 2020 Let's Talk About COVID-19 Scams
- Sep 2, 2020 How Do You Bring Down an Organization? From the Inside
-
August 2020
- Aug 31, 2020 Know the Signs of Phishing Attempts
- Aug 19, 2020 Are Your Passwords in the Green in 2020?
- Aug 18, 2020 Hive Systems is Now Listed on Bloomberg
- Aug 11, 2020 Keep Hackers From Damaging Your Credit Score - A Guide
- Aug 7, 2020 Hackers Hack Hearing for Alleged Twitter Hacker
- Aug 5, 2020 The Availability of the Internet Rests on the Bottom of the Ocean
-
July 2020
- Jul 24, 2020 How Bad was Twitter's Very Public Hack?
- Jul 22, 2020 Are You Willing to Take the Gamble?
- Jul 22, 2020 What’s Encryption and Why Does it Matter?
- Jul 16, 2020 Let’s Talk About Password Managers!
- Jul 14, 2020 That MGM Resorts Data Breach is Much Worse than Originally Reported
- Jul 12, 2020 The Ransomware is Just the Start
- Jul 1, 2020 Cyber Incidents Lead to Lost Business
-
June 2020
- Jun 24, 2020 Don't Set Yourself Up to be Hacked
- Jun 19, 2020 "Cybersecurity Doesn’t Have to Cost an Arm and a Leg" - Tastytrade Interview
- Jun 17, 2020 DDoS Attacks are Ramping Up
- Jun 16, 2020 What Happened Yesterday with T-Mobile? And was it a DDoS Attack?
- Jun 10, 2020 The Cost of Phishing Keeps Adding Up
- Jun 9, 2020 Debilitating Increase Seen in Cyber Attacks Against Advocacy Groups
-
May 2020
- May 27, 2020 What’s the Difference Between a Cyber Incident and Data Breach?
- May 21, 2020 easyJet Suffers Massive Data Breach of Sensitive Information
- May 20, 2020 The 1-2 Punch of Ransomware
- May 19, 2020 Is the Cloud Actually Secure?
- May 13, 2020 Go Update Your Microsoft Devices Right Now
- May 7, 2020 The Latest Email Scam Almost Tricked My Family
- May 1, 2020 Case Study: Architecture and Design Firms
-
April 2020
- Apr 30, 2020 Your IT Investments May Not Be Keeping You Safe
- Apr 21, 2020 Privacy Check Tuesday
- Apr 15, 2020 Number of Suspicious COVID-19 Websites
- Apr 13, 2020 Case Study: Working from Home Puts Your Law Firm’s Information at Risk
- Apr 8, 2020 Increased Public RDP Usage
- Apr 7, 2020 Zoom Isn’t Secure, but Here’s How to Fix It
- Apr 2, 2020 Marriott Has Been Hacked...Again
-
March 2020
- Mar 31, 2020 Don't Fall for These Three COVID-19 Scams
- Mar 26, 2020 The Hive Systems Cybersecurity Risk Quiz
- Mar 23, 2020 The Ever Increasing Cost of BEC
- Mar 19, 2020 Business Email Compromise is Eroding Trust and Costing Millions
- Mar 11, 2020 Should I buy a RFID Wallet or Purse to Protect my new Credit Card?
- Mar 5, 2020 Retail Giant J. Crew Hacked and Kept it Quiet for a Year
-
February 2020
- Feb 11, 2020 Hacking Your Brain with Coronavirus
- Feb 5, 2020 Cyber Theft Doesn't End with the Theft
- Feb 4, 2020 The Tax Refund You’re Counting on is in Jeopardy
- January 2020
-
December 2019
- Dec 18, 2019 The End of an Era and the Beginning of Trouble
- Dec 5, 2019 Keep Your SIM Card Safe: the Remix
- Dec 4, 2019 Hackers Have Found a Way to Pretend to be You
-
November 2019
- Nov 21, 2019 Don't Let a USB Slot Takeoff with Your Information
- Nov 20, 2019 Most Companies Take Six Months to Detect a Data Breach
- Nov 5, 2019 The Vulnerability that Could Ruin Your Business is Here
-
October 2019
- Oct 24, 2019 The Top 10 Hacked Passwords
- Oct 17, 2019 What’s the Difference Between IT and Cybersecurity?
- Oct 16, 2019 Small Business Cyber Incidents are Costly
- Oct 9, 2019 Identity Theft is More Prevalent Than You May Realize
- Oct 8, 2019 Double Data Breach Day
- Oct 3, 2019 Stay Safe for Cybersecurity Awareness Month
-
September 2019
- Sep 26, 2019 You Need to Update to iOS 13
- Sep 25, 2019 Introducing the ACT Digest