0
Skip to Content
Hive Systems
Products
Our Products
Derive
Audora
Services
Our Products and Services
Cyber Risk Quantification
FedRAMP
SOC 2
CMMC Readiness
Ransomware
Penetration Testing
Strategy
Assessments
Training
CMMC
I'm New to CMMC
C3PAO Assessment
CMMC Readiness and Implementation
CMMC Mock Assessment
CMMC Resources
Contact Us About CMMC
MSSP
Our Managed Services
Managed Phishing Simulations
Penetration Testing
Learning
ACT Blog
Hive Live
Free Cybersecurity Guide and Resources
Cyber Risk Quiz
Company
Our Story
What is Hive Systems?
Contact Us
Leadership
Pro Bono
Work With Us
Newsroom
Subscribe
Let's Talk
Hive Systems
Products
Our Products
Derive
Audora
Services
Our Products and Services
Cyber Risk Quantification
FedRAMP
SOC 2
CMMC Readiness
Ransomware
Penetration Testing
Strategy
Assessments
Training
CMMC
I'm New to CMMC
C3PAO Assessment
CMMC Readiness and Implementation
CMMC Mock Assessment
CMMC Resources
Contact Us About CMMC
MSSP
Our Managed Services
Managed Phishing Simulations
Penetration Testing
Learning
ACT Blog
Hive Live
Free Cybersecurity Guide and Resources
Cyber Risk Quiz
Company
Our Story
What is Hive Systems?
Contact Us
Leadership
Pro Bono
Work With Us
Newsroom
Subscribe
Let's Talk
Folder: Products
Folder: Services
Folder: CMMC
Folder: MSSP
Folder: Learning
Folder: Company
Let's Talk
Back
Our Products
Derive
Audora
Back
Our Products and Services
Cyber Risk Quantification
FedRAMP
SOC 2
CMMC Readiness
Ransomware
Penetration Testing
Strategy
Assessments
Training
Back
I'm New to CMMC
C3PAO Assessment
CMMC Readiness and Implementation
CMMC Mock Assessment
CMMC Resources
Contact Us About CMMC
Back
Our Managed Services
Managed Phishing Simulations
Penetration Testing
Back
ACT Blog
Hive Live
Free Cybersecurity Guide and Resources
Cyber Risk Quiz
Back
Our Story
What is Hive Systems?
Contact Us
Leadership
Pro Bono
Work With Us
Newsroom
Subscribe
Keep Your SIM Card Safe: the Remix
Vulnerabilities, Risk Level: 2 Alex Nette 12/5/19 Vulnerabilities, Risk Level: 2 Alex Nette 12/5/19

Keep Your SIM Card Safe: the Remix

Your SIM is what lets your cell phone talk to you mobile phone carrier. Without it, you have an expensive Wi-Fi enabled paperweight. So you need to protect it.

Read More
Hackers Have Found a Way to Pretend to be You
Vulnerabilities, Risk Level: 3 Alex Nette 12/4/19 Vulnerabilities, Risk Level: 3 Alex Nette 12/4/19

Hackers Have Found a Way to Pretend to be You

Think about everything that’s on your cell phone right now. What would happen if someone got control of all of it?

Read More
Don't Let a USB Slot Takeoff with Your Information
Vulnerabilities, Risk Level: 2 Alex Nette 11/21/19 Vulnerabilities, Risk Level: 2 Alex Nette 11/21/19

Don't Let a USB Slot Takeoff with Your Information

It’s so convenient to plug your charger into a USB slot on a random wall or plane seat. But you could be doing more than just charging your phone.

Read More
The Vulnerability that Could Ruin Your Business is Here
Vulnerabilities, Risk Level: 5 Alex Nette 11/5/19 Vulnerabilities, Risk Level: 5 Alex Nette 11/5/19

The Vulnerability that Could Ruin Your Business is Here

A vulnerability for Windows was discovered called BlueKeep that has the ability to really ruin your day. The vulnerability was believed to be so devastating that the Department of Homeland Security put out a warning telling people to patch the hole immediately.

Read More
You Need to Update to iOS 13
Vulnerabilities, Risk Level: 3 Alex Nette 9/26/19 Vulnerabilities, Risk Level: 3 Alex Nette 9/26/19

You Need to Update to iOS 13

iOS 13 brings a host of new features (dark mode!) this fall, but it also contains a number of important cybersecurity fixes.

Read More
Newer Posts

New to cybersecurity?

❯ What is cybersecurity?
❯ Why Hive Systems?
❯ Explore our services
❯ Learn from our experts
❯ What is cyber risk quantification (CRQ)?

About Hive Systems

❯ Our story
❯ Newsroom
❯ Work with us
❯ Hive Helps
❯ Privacy Policy
❯ Security and Trust

Popular Links

❯ Time it takes a hacker to brute force your password in 2025
❯ Get a CMMC 3PAO Audit
❯ Affordable managed phishing simulations

© 2025 Hive Systems Holdings, LLC All rights reserved
Proudly headquartered in Richmond, Virginia

Our library of great guides, rigorous research, and perfect posters is FREE to access. Download now ❯

❯ Access our content library
❯ 2025 Hive Systems Password Table
❯ Phishing awareness posters
❯ Cybersecurity accelerator kit
❯ CMMC 101 guide
❯ CMMC SSP template
❯ Rapid cyber risk assessment quiz

❯ Watch Hive Live Episodes 🚨 NEW
❯ Read our ACT Blog 🚨 NEW

Subscribe.

❯ ACT Digest Email Newsletter

Connect with Us

Learn from our Experts.

Resource Center

Learn from Experts

Our experts help keep your information secure anywhere - so you can reduce risk everywhere.
See how ❯

Cyber Services.

By Need

❯ Quantiative Cyber Risk
❯ FedRAMP
❯ SOC 2
❯ CMMC
❯ Ransomware
❯ Penetration Testing
❯ Phishing Simulations
❯ Browse All Services

By Risk

❯ Cyber Strategy
❯ Cyber Assessments
❯ Cyber Training
❯ Cyber Compliance
❯ Ransomware

By Industry

❯ Company Leaders
❯ IT Leaders

By Role

❯ Small Business
❯ Nonprofit
❯ Startups
❯ By Industry Segment

Cyber Products.

Hive Systems builds leading products that help accelerate your organization’s cybersecurity journey.
See how ❯

Derive

Audora

Built by auditors, for auditors - the leading cybersecurity audit automation platform
Learn more ❯

QryptoCyber

Cryptographic discovery and encryption management that drives your post-quantum readiness.
Learn more ❯

Stop random acts of cybersecurity - the leading quantitative cyber risk assessment platform.
Learn more ❯

Managed Security
Service Provider (MSSP).

Our experts run your cybersecurity program and reduce your risk with less effort and better return on your investment.

See how ❯

Pen Testing

Phishing Simulations

Create a culture of continuous learning with our fully managed phishing simulations.
Learn more ❯

Our variety of pen testing options help our experts identify real-world weaknesses at your organization.
Learn more ❯

Hive Systems provides smarter cybersecurity solutions with our trusted experts. Learn more ❯

❯ Our Story
❯ What is Hive Systems?
❯ Leadership
❯ Contact Us

❯ Pro Bono
❯ Education

❯ Partnerships & Careers

Follow Us

❯ Newsroom
❯ Subscribe

Company.

About Us

Our Impact

Work with Us

News

Cybersecurity Maturity Model Certification (CMMC).

CMMC assessments conducted by our experts who understand how your business works.

Readiness & Implementation

Not Sure?

C3PAO Assessment

Official DoD CMMC assessments performed by our expert CCA’s and CCP’s.
Learn more ❯

Preparing your company to meet CMMC requirements without reworking the way you work.
Learn more ❯

❯ I’m new to CMMC
❯ CMMC Mock Assessment
❯ Resource Center
❯ Level 2 Self Assessment Tool
❯ Talk with an expert

Our library of great guides, rigorous research, and perfect posters is FREE to access. Download now ❯

❯ Access our content library
❯ 2025 Hive Systems Password Table
❯ Phishing awareness posters
❯ Cybersecurity accelerator kit
❯ CMMC 101 guide
❯ CMMC SSP template
❯ Rapid cyber risk assessment quiz

❯ Watch Hive Live Episodes 🚨 NEW
❯ Read our ACT Blog 🚨 NEW

Subscribe.

❯ ACT Digest Email Newsletter

Connect with Us

Learn from our Experts.

Resource Center

Learn from Experts

Our experts help keep your information secure anywhere - so you can reduce risk everywhere.
See how ❯

Cyber Services.

By Need

❯ Quantiative Cyber Risk
❯ FedRAMP
❯ SOC 2
❯ CMMC
❯ Ransomware
❯ Penetration Testing
❯ Phishing Simulations
❯ Browse All Services

By Risk

❯ Cyber Strategy
❯ Cyber Assessments
❯ Cyber Training
❯ Cyber Compliance
❯ Ransomware

By Industry

❯ Company Leaders
❯ IT Leaders

By Role

❯ Small Business
❯ Nonprofit
❯ Startups
❯ By Industry Segment

Cyber Products.

Hive Systems builds leading products that help accelerate your organization’s cybersecurity journey.
See how ❯

Derive

Audora

Built by auditors, for auditors - the leading cybersecurity audit automation platform
Learn more ❯

QryptoCyber

Cryptographic discovery and encryption management that drives your post-quantum readiness.
Learn more ❯

Stop random acts of cybersecurity - the leading quantitative cyber risk assessment platform.
Learn more ❯

Managed Security
Service Provider (MSSP).

Our experts run your cybersecurity program and reduce your risk with less effort and better return on your investment.

See how ❯

Pen Testing

Phishing Simulations

Create a culture of continuous learning with our fully managed phishing simulations.
Learn more ❯

Our variety of pen testing options help our experts identify real-world weaknesses at your organization.
Learn more ❯

Hive Systems provides smarter cybersecurity solutions with our trusted experts. Learn more ❯

❯ Our Story
❯ What is Hive Systems?
❯ Leadership
❯ Contact Us

❯ Pro Bono
❯ Education

❯ Partnerships & Careers

Follow Us

❯ Newsroom
❯ Subscribe

Company.

About Us

Our Impact

Work with Us

News

Cybersecurity Maturity Model Certification (CMMC).

CMMC assessments conducted by our experts who understand how your business works.

Readiness & Implementation

Not Sure?

C3PAO Assessment

Official DoD CMMC assessments performed by our expert CCA’s and CCP’s.
Learn more ❯

Preparing your company to meet CMMC requirements without reworking the way you work.
Learn more ❯

❯ I’m new to CMMC
❯ CMMC Mock Assessment
❯ Resource Center
❯ Level 2 Self Assessment Tool
❯ Talk with an expert