This Major Vulnerability Could Fill Your Computer with Bees (Seriously)
A newly discovered vulnerability lets attackers swarm your system with thousands of virtual bees — and yes, it’s as wild (and dangerous) as it sounds. Hive Systems breaks down the real security flaw behind the buzz and what it means for defenders.
Think You Can Spot a Phishing Scam? Think Again.
Phishing emails are getting harder to detect. Even the savviest professionals can fall victim. Learn how to test your team’s awareness and keep your organization secure.
BEWARE: Job scams are on the rise!
Job scams are on the rise and they’re coming straight to your phone via text, email, and even social media. Watch this interview with our CEO, Alex Nette, who explores the ways to identify a job scam and stay ahead of scammers if you’re on the hunt for a job!
I am once again asking you to update your Apple devices
Apple has released critical fixes for critical problems on its devices - so spend ten minutes and update them now!
The Dangers of QR Codes
The recent rise in QR codes allows for easy access to information - including yours. So are QR codes dangerous, and what can you do to protect yourself?
Practical Practices for Data Privacy Week
Hive Systems and the National Cybersecurity Alliance have some helpful tips for you to manage your privacy at work and at home this National Privacy Week.
Experts Agree This is the Best Way to Protect Your IT Devices
Identify. Evaluate. Remediate. Validate. Repeat.
Insider Threat: The Real Risk to Your Organization
There’s a very real threat to the cybersecurity and safety of your organization: your employees.
What’s an IT Budget and How Much Should I Spend on Cybersecurity?
We break down the steps to proper IT budgeting that will keep your company in business.
10 Reasons to Run a Cybersecurity Drill
There’s no better way to understand your organizations strengths and weaknesses than by running a cybersecurity drill.
An Unholy Union: Remote Access and Ransomware
DHS warns the worst case scenario is starting to happen - your organization’s remote access solution may end up being the reason you lose millions and go out of business.
Cybersecurity’s Newest Advocate: the CFO
Investment and cybersecurity risk quantification have joined forces to better protect your organization. Are you ready?
A New Career Could Mean a Stolen Identity
Job scams are all too real, and somebody could use all your personal information you put on the application to steal your identity. Check out our list of ways to avoid having your job hunt turn into a job nightmare!
Don't Let Ransomware Take Hostage of Your Information
Ransomware: you’ve heard about it in the news. You usually realize it when a ransom note pops up on your screen, but unfortunately this one isn’t made out of letters from a magazine and is going to be a big, expensive problem.
A Guide to Increasing Your Email Security and Deliverability: DMARC
Your misconfigured email can send your emails to spam inboxes and let hackers pretend to be you - costing you millions. In part 3 of this guide, we’ll pull everything from the first two parts together and cover DMARC.
A Guide to Increasing Your Email Security and Deliverability: DKIM
Your misconfigured email can send your emails to spam inboxes and let hackers pretend to be you - costing you millions. In part 2 of this guide, we’ll cover configuring DKIM records.
A Guide to Increasing Your Email Security and Deliverability: SPF
Your misconfigured email can send your emails to spam inboxes and let hackers pretend to be you - costing you millions. In part 1 of this guide, we’ll cover configuring your SPF record.
Let’s Go Phishing
How a simple phishing email will shut down your company if you’re not careful.
If Your Devices Aren’t Updated, You’re In For A Bad Time
“Patch Tuesday” is here again - do you know how to update ALL of your devices?
What’s Your iPrivacy?
Why does my crossword app need to know my friend’s email? Hint: it doesn’t.