When it comes to cybersecurity, you need to ACT, and not react.
Our Approachable Cyber Threats (ACT) keep you up to date on what we’re talking about around the water cooler.
Looking for something else?
- December 2024
- November 2024
-
October 2024
- Oct 24, 2024 Getting Ahead of CMMC with Joint Surveillance Voluntary Assessments
- Oct 15, 2024 RED ALERT: CMMC Begins December 16th
- Oct 7, 2024 Better Late Than Never: Addressing NIST’s Updated Password Security Guidance
- Oct 1, 2024 A Farewell to the JAB
-
August 2024
- Aug 19, 2024 It’s Time For Your Wakeup Call: CMMC is Almost Here!
- Aug 5, 2024 BEWARE: Job scams are on the rise!
- July 2024
-
May 2024
- May 23, 2024 NIST Releases New CUI Security Requirements
-
April 2024
- Apr 23, 2024 Are Your Passwords in the Green?
-
March 2024
- Mar 1, 2024 Let’s Talk About Cookies!
-
February 2024
- Feb 23, 2024 Navigating the Dual Impact of AI in Cybersecurity
- Feb 12, 2024 SOC 2 Made Simple
- Feb 1, 2024 On Your DMARC, Get Set, Go!
- January 2024
-
December 2023
- Dec 21, 2023 The Weakest Link: Managing Supply Chain Risk
- Dec 7, 2023 The Cyber Attack Perception Problem in 2023
-
October 2023
- Oct 17, 2023 Approachable CMMC: Accelerate with our SSP Template
- Oct 5, 2023 Who is Watching You and Why?
-
September 2023
- Sep 27, 2023 Deepfakes: Can You Trust What You See?
- Sep 13, 2023 Examining the LastPass Breach Through our Password Table
-
August 2023
- Aug 7, 2023 Passkey to the (Passwordless) Future
-
July 2023
- Jul 31, 2023 Brand New SEC Cybersecurity Requirements
- Jul 3, 2023 HTTPS is Secure (Except When it’s Not)
-
May 2023
- May 30, 2023 Exploring Human Errors in Cybersecurity
- May 8, 2023 Newly Exploited Vulnerabilities in Apple Devices
-
April 2023
- Apr 18, 2023 Are Your Passwords in the Green in 2023?
- Apr 17, 2023 Data Breach 101: Actions to Take After a Breach
-
March 2023
- Mar 24, 2023 #Secure: Locking Down Your Social Media in Style
- Mar 9, 2023 Telecommunications: A Case Study
-
February 2023
- Feb 16, 2023 I’m Sorry, But That’s Classified
- Feb 8, 2023 Digital Banking - Case Study
- Feb 1, 2023 Hospital & Healthcare Technology - Case Study
-
January 2023
- Jan 17, 2023 Keep Calm and Check Your Public Wi-Fi Connection
- Jan 4, 2023 Let’s Not Get Smished
-
December 2022
- Dec 13, 2022 The Data Breach Perception Problem in 2022
- November 2022
- September 2022
-
August 2022
- Aug 25, 2022 Crypto Cons Continue
- Aug 20, 2022 I am once again asking you to update your Apple devices
- Aug 10, 2022 The Art of (Cyber) War
-
July 2022
- Jul 19, 2022 RFID: Is it Secret? Is it Safe?
- Jul 7, 2022 The Revival of Raccoon Stealer
-
June 2022
- Jun 7, 2022 Conti Ransomware Continues to Cause Concern
- May 2022
-
April 2022
- Apr 29, 2022 Avoiding Tax Scams in 2022
-
March 2022
- Mar 22, 2022 A Look at the Cybersecurity Red Alert from the White House
- Mar 2, 2022 Are Your Passwords in the Green in 2022?
-
February 2022
- Feb 17, 2022 Applying Heuristics in Cybersecurity
- Feb 14, 2022 The Dangers of QR Codes
- Feb 14, 2022 Hive Systems on InvestigateTV About Social Media Hacking
- Feb 8, 2022 Happy Safer Internet Day 2022!
-
January 2022
- Jan 27, 2022 Quantitative Risk Assessment 101
- Jan 25, 2022 Practical Practices for Data Privacy Week
- Jan 24, 2022 A Beginner's Guide to 2FA and MFA
- Jan 12, 2022 Password Hygiene: LastPass Edition!
- Jan 5, 2022 Q&A Follow-up from “Risk Assessment on the Shoulders of Scientists”
-
December 2021
- Dec 16, 2021 Log4Shell: The New ‘Heartbleed’
- Dec 13, 2021 These Passwords Are a Joke
-
October 2021
- Oct 29, 2021 Experts Agree This is the Best Way to Protect Your IT Devices
- Oct 28, 2021 Insider Threat: The Real Risk to Your Organization
- Oct 27, 2021 What’s an IT Budget and How Much Should I Spend on Cybersecurity?
- Oct 26, 2021 10 Reasons to Run a Cybersecurity Drill
- Oct 25, 2021 An Unholy Union: Remote Access and Ransomware
- Oct 22, 2021 Cybersecurity’s Newest Advocate: the CFO
- Oct 21, 2021 A New Career Could Mean a Stolen Identity
- Oct 17, 2021 Don't Let Ransomware Take Hostage of Your Information
- Oct 14, 2021 A Guide to Increasing Your Email Security and Deliverability: DMARC
- Oct 14, 2021 A Guide to Increasing Your Email Security and Deliverability: DKIM
- Oct 14, 2021 A Guide to Increasing Your Email Security and Deliverability: SPF
- Oct 13, 2021 Let’s Go Phishing
- Oct 11, 2021 If Your Devices Aren’t Updated, You’re In For A Bad Time
- Oct 10, 2021 What’s Your iPrivacy?
- Oct 9, 2021 Stop Hackers Dead In Their Tracks With This Easy Trick
- Oct 8, 2021 What is a VPN? And How Does it Work?
- Oct 7, 2021 How Hackers Steal and Use Your Passwords
- Oct 5, 2021 What Does my Router Actually Do?
- Oct 5, 2021 How Am I Supposed to Remember All These Passwords?
- Oct 4, 2021 Facebook, Instagram, Whatsapp down
- Oct 1, 2021 It’s Cybersecurity Awareness Month!
-
September 2021
- Sep 14, 2021 What Really Caused Data Breaches in 2020?
- Sep 13, 2021 Go Update Your iPhone and iPad NOW!
- Sep 7, 2021 Hive Systems Featured on BARR Advisory’s cyBARR Chats
- August 2021
-
July 2021
- Jul 27, 2021 Get it Together, Twitter-verse
- Jul 13, 2021 Yes, People Are Really Still Using These Versions of Windows…
-
June 2021
- Jun 28, 2021 Unplug Your WD MyBook Now
- Jun 28, 2021 Don’t Let Ransomware Corrupt Your Data Completely
- Jun 15, 2021 Here's How People Keep Track of Their Passwords
-
May 2021
- May 18, 2021 Paying the Ransom is No Guarantee
- May 6, 2021 World Password Day 2021
- May 5, 2021 Update your iPhone and iPad TODAY! (again)
- May 5, 2021 Hive Systems Partners with BARR Advisory to Offer A Comprehensive Cybersecurity Solution
-
April 2021
- Apr 28, 2021 Apple’s One Last Thing: Privacy
- Apr 21, 2021 You’ve Got a Lot to Lose to Insider Threat
- Apr 14, 2021 The Snowball Effect of Security Flaw Remediation Costs
- Apr 13, 2021 Identity Management Day 2021
- Apr 9, 2021 Facebook’s Massive Data Breach Is Already Impacting You
- Apr 7, 2021 Are You Being Targeted by Hackers Because of Your Age?
- Apr 1, 2021 This Major Vulnerability Could Fill Your Computer with Bees
-
March 2021
- Mar 31, 2021 6 Ways to Protect Your Home While on Vacation
- Mar 30, 2021 It’s Time to ACT Against Cyber Crime
- Mar 10, 2021 Let's Talk About Cybersecurity in 2020 by the Numbers
- Mar 8, 2021 A Guide to Mitigating the Critical Microsoft Exchange Vulnerability
-
February 2021
- Feb 18, 2021 The Top Cybersecurity Blogs We're Reading in 2022
- Feb 9, 2021 Average Ransom Payments are Still Climbing!
- Feb 9, 2021 It’s Safer Internet Day!
- Feb 1, 2021 Hive Systems Presents: Hive Live
-
January 2021
- Jan 27, 2021 Data Privacy Day 2021
- Jan 27, 2021 Own an iPhone or iPad? Update TODAY!
- Jan 19, 2021 What Are You Worth on the Dark Web?
-
December 2020
- Dec 28, 2020 ACT Top 10 Countdown of 2020
- Dec 21, 2020 Don't Fall for These Common Phishing Tests
- Dec 1, 2020 Lost Time is Lost Money After a Cyber Attack
-
November 2020
- Nov 24, 2020 Shop Safely on Black Friday and Cyber Monday with These Tricks
- Nov 23, 2020 Record Numbers Expected on Cyber Monday
- Nov 18, 2020 Small Businesses are Overconfident and Underprepared
- Nov 12, 2020 Time to Set Up Multi Factor Authentication
-
October 2020
- Oct 19, 2020 Biggest Data Breaches of All Time
- Oct 18, 2020 Not All Telework Solutions are Created Equal
- Oct 11, 2020 Your New Smart Devices Could be Your New Problem
- Oct 9, 2020 Home Security Cameras Aren’t the Problem - You Are
- Oct 2, 2020 October is Cybersecurity Awareness Month
-
September 2020
- Sep 30, 2020 Let's Talk About Phishing Red Flags
- Sep 28, 2020 Massive U.S. Healthcare Company UHS a Victim of Major Cyber Attack
- Sep 24, 2020 They're Not Who You Think They Are
- Sep 8, 2020 Let's Talk About COVID-19 Scams
- Sep 2, 2020 How Do You Bring Down an Organization? From the Inside
-
August 2020
- Aug 31, 2020 Know the Signs of Phishing Attempts
- Aug 19, 2020 Are Your Passwords in the Green in 2020?
- Aug 18, 2020 Hive Systems is Now Listed on Bloomberg
- Aug 11, 2020 Keep Hackers From Damaging Your Credit Score - A Guide
- Aug 7, 2020 Hackers Hack Hearing for Alleged Twitter Hacker
- Aug 5, 2020 The Availability of the Internet Rests on the Bottom of the Ocean
-
July 2020
- Jul 24, 2020 How Bad was Twitter's Very Public Hack?
- Jul 22, 2020 Are You Willing to Take the Gamble?
- Jul 22, 2020 What’s Encryption and Why Does it Matter?
- Jul 16, 2020 Let’s Talk About Password Managers!
- Jul 14, 2020 That MGM Resorts Data Breach is Much Worse than Originally Reported
- Jul 12, 2020 The Ransomware is Just the Start
- Jul 1, 2020 Cyber Incidents Lead to Lost Business
-
June 2020
- Jun 24, 2020 Don't Set Yourself Up to be Hacked
- Jun 19, 2020 "Cybersecurity Doesn’t Have to Cost an Arm and a Leg" - Tastytrade Interview
- Jun 17, 2020 DDoS Attacks are Ramping Up
- Jun 16, 2020 What Happened Yesterday with T-Mobile? And was it a DDoS Attack?
- Jun 10, 2020 The Cost of Phishing Keeps Adding Up
- Jun 9, 2020 Debilitating Increase Seen in Cyber Attacks Against Advocacy Groups
-
May 2020
- May 27, 2020 What’s the Difference Between a Cyber Incident and Data Breach?
- May 21, 2020 easyJet Suffers Massive Data Breach of Sensitive Information
- May 20, 2020 The 1-2 Punch of Ransomware
- May 19, 2020 Is the Cloud Actually Secure?
- May 13, 2020 Go Update Your Microsoft Devices Right Now
- May 7, 2020 The Latest Email Scam Almost Tricked My Family
- May 1, 2020 Case Study: Architecture and Design Firms
-
April 2020
- Apr 30, 2020 Your IT Investments May Not Be Keeping You Safe
- Apr 21, 2020 Privacy Check Tuesday
- Apr 15, 2020 Number of Suspicious COVID-19 Websites
- Apr 13, 2020 Case Study: Working from Home Puts Your Law Firm’s Information at Risk
- Apr 8, 2020 Increased Public RDP Usage
- Apr 7, 2020 Zoom Isn’t Secure, but Here’s How to Fix It
- Apr 2, 2020 Marriott Has Been Hacked...Again
-
March 2020
- Mar 31, 2020 Don't Fall for These Three COVID-19 Scams
- Mar 26, 2020 The Hive Systems Cybersecurity Risk Quiz
- Mar 23, 2020 The Ever Increasing Cost of BEC
- Mar 19, 2020 Business Email Compromise is Eroding Trust and Costing Millions
- Mar 11, 2020 Should I buy a RFID Wallet or Purse to Protect my new Credit Card?
- Mar 5, 2020 Retail Giant J. Crew Hacked and Kept it Quiet for a Year
-
February 2020
- Feb 11, 2020 Hacking Your Brain with Coronavirus
- Feb 5, 2020 Cyber Theft Doesn't End with the Theft
- Feb 4, 2020 The Tax Refund You’re Counting on is in Jeopardy
- January 2020
-
December 2019
- Dec 18, 2019 The End of an Era and the Beginning of Trouble
- Dec 5, 2019 Keep Your SIM Card Safe: the Remix
- Dec 4, 2019 Hackers Have Found a Way to Pretend to be You
-
November 2019
- Nov 21, 2019 Don't Let a USB Slot Takeoff with Your Information
- Nov 20, 2019 Most Companies Take Six Months to Detect a Data Breach
- Nov 5, 2019 The Vulnerability that Could Ruin Your Business is Here
-
October 2019
- Oct 24, 2019 The Top 10 Hacked Passwords
- Oct 17, 2019 What’s the Difference Between IT and Cybersecurity?
- Oct 16, 2019 Small Business Cyber Incidents are Costly
- Oct 9, 2019 Identity Theft is More Prevalent Than You May Realize
- Oct 8, 2019 Double Data Breach Day
- Oct 3, 2019 Stay Safe for Cybersecurity Awareness Month
-
September 2019
- Sep 26, 2019 You Need to Update to iOS 13
- Sep 25, 2019 Introducing the ACT Digest
All About Email?
If you prefer staying on top of things via email instead, then sign up for our ACT Digest. You’ll receive updates on the latest cybersecurity threats - straight to your inbox.
Want more ACT?
Or looking for something in particular? Search our archives.
Uncover the truth about cyber attack misconceptions with Hive Systems' latest research. Learn how media coverage skews public perception of cyber attacks and discover the real risks organizations face. Explore data-driven insights to better protect your business in an evolving threat landscape