Getting Ahead of CMMC with Joint Surveillance Voluntary Assessments
A JSVA could be the answer your company has been looking for to get ahead of CMMC. Katie, a CCA on our team, helps outline everything you need to know about getting CMMC Level 2 certified - giving your company the advantage before CMMC even starts!
RED ALERT: CMMC Begins December 16th
The long-awaited CMMC rule has finally been officially published and is accompanied by some beneficial changes from the original draft. We break them down for you so you and your organization can begin to prepare for the imminent enforcement.
A Farewell to the JAB
The Federal Risk and Authorization Management Program (FedRAMP) has been a cornerstone for ensuring the security of cloud services used by federal agencies. Recently, significant changes to the program - specifically the sunset of the JAB have sparked discussions across the cloud computing landscape.
It’s Time For Your Wakeup Call: CMMC is Almost Here!
CMMC has been on the horizon for years, lurking in the distance and often thought of as a “tomorrow” problem. With the publication of the proposed rule to amend DFARS 252.204-7021, let this be a wake up call: CMMC is coming - and it’s coming quickly.
Let’s Talk About Cookies!
Cookies help enhance our browsing experience, but what are the risks? Learn more about how cookies work, what data they collect, and how you can protect your data from misuse.
Passkey to the (Passwordless) Future
What would it be like to live in a world without having to memorize and type a million of passwords? Logging in without having to enter a password has been practically impossible - until now.
A Guide to Increasing Your Email Security and Deliverability: DMARC
Your misconfigured email can send your emails to spam inboxes and let hackers pretend to be you - costing you millions. In part 3 of this guide, we’ll pull everything from the first two parts together and cover DMARC.
A Guide to Increasing Your Email Security and Deliverability: DKIM
Your misconfigured email can send your emails to spam inboxes and let hackers pretend to be you - costing you millions. In part 2 of this guide, we’ll cover configuring DKIM records.
A Guide to Increasing Your Email Security and Deliverability: SPF
Your misconfigured email can send your emails to spam inboxes and let hackers pretend to be you - costing you millions. In part 1 of this guide, we’ll cover configuring your SPF record.
What’s Your iPrivacy?
Why does my crossword app need to know my friend’s email? Hint: it doesn’t.
What Does my Router Actually Do?
You’ve always had that small box with some blinking lights and tiny arms sticking off it that never provides enough Wi-Fi coverage. But what does it do anyway, why is it like a tree farm, and most importantly, how can you secure it?
6 Ways to Protect Your Home While on Vacation
As spring break is approaching, it’s important to make sure your home is protected. To help you prepare for your vacation, Hive Systems President and CEO Alex Nette has been featured on the Redfin Blog.
The Top Cybersecurity Blogs We're Reading in 2022
We love what we do, and we read about it constantly. Here’s a collection of our favorite cybersecurity blogs and websites from the industry's foremost thought leaders and reporters.
Keep Hackers From Damaging Your Credit Score - A Guide
Hackers have accumulated a wealth of information about you over the years - more than enough to open up a new credit card under your name and damage your credit score. Stop them in their tracks by freezing your credit.
Hackers Hack Hearing for Alleged Twitter Hacker
If you didn’t see this coming from a mile away, you haven’t been reading the ACT enough!
The Availability of the Internet Rests on the Bottom of the Ocean
Undersea cables help connect the Internet across the world…until they don’t.
How Bad was Twitter's Very Public Hack?
What does the hack look like for Twitter’s reputation and for the accounts impacted?
What Happened Yesterday with T-Mobile? And was it a DDoS Attack?
For a large portion of yesterday, T-Mobile’s network was brought to a standstill. Was it a DDoS attack against the United States?
Privacy Check Tuesday
Cybersecurity and privacy are intrinsically connected. The ability to protect your privacy often relies on cybersecurity working correctly. We’ll talk a lot about privacy here on the ACT, but today we’ve got two quick checks for you.
Retail Giant J. Crew Hacked and Kept it Quiet for a Year
If you’ve shopped at J. Crew, you should know they were hacked over a year ago, meaning you need to ACT right now.