Practical Practices for Data Privacy Week
Hive Systems and the National Cybersecurity Alliance have some helpful tips for you to manage your privacy at work and at home this National Privacy Week.
A Beginner's Guide to 2FA and MFA
Everyone is telling you to enable 2FA or MFA to be secure in the digital age. But how do you do it? And what's the best method for you, or the most secure? Our experts break it down in an approachable way.
Password Hygiene: LastPass Edition!
A recent scare for LastPass has many people wondering: are password managers worth it, and what can I do to protect my information better?
Q&A Follow-up from “Risk Assessment on the Shoulders of Scientists”
We received a number of follow-up questions during our Hive Live workshop “Risk Assessment on the Shoulders of Scientists” and we’ve got detailed answers!
Log4Shell: The New ‘Heartbleed’
Just in time for the holidays, this critical vulnerability threatens to wreak havoc on cloud services and companies around the globe.
These Passwords Are a Joke
If you’re the kind of person whose luggage combination is 1234, then you probably have a few of these passwords. It’s time to change.
Experts Agree This is the Best Way to Protect Your IT Devices
Identify. Evaluate. Remediate. Validate. Repeat.
Insider Threat: The Real Risk to Your Organization
There’s a very real threat to the cybersecurity and safety of your organization: your employees.
What’s an IT Budget and How Much Should I Spend on Cybersecurity?
We break down the steps to proper IT budgeting that will keep your company in business.
10 Reasons to Run a Cybersecurity Drill
There’s no better way to understand your organizations strengths and weaknesses than by running a cybersecurity drill.
An Unholy Union: Remote Access and Ransomware
DHS warns the worst case scenario is starting to happen - your organization’s remote access solution may end up being the reason you lose millions and go out of business.
Cybersecurity’s Newest Advocate: the CFO
Investment and cybersecurity risk quantification have joined forces to better protect your organization. Are you ready?
A New Career Could Mean a Stolen Identity
Job scams are all too real, and somebody could use all your personal information you put on the application to steal your identity. Check out our list of ways to avoid having your job hunt turn into a job nightmare!
Don't Let Ransomware Take Hostage of Your Information
Ransomware: you’ve heard about it in the news. You usually realize it when a ransom note pops up on your screen, but unfortunately this one isn’t made out of letters from a magazine and is going to be a big, expensive problem.
A Guide to Increasing Your Email Security and Deliverability: DMARC
Your misconfigured email can send your emails to spam inboxes and let hackers pretend to be you - costing you millions. In part 3 of this guide, we’ll pull everything from the first two parts together and cover DMARC.
A Guide to Increasing Your Email Security and Deliverability: DKIM
Your misconfigured email can send your emails to spam inboxes and let hackers pretend to be you - costing you millions. In part 2 of this guide, we’ll cover configuring DKIM records.
A Guide to Increasing Your Email Security and Deliverability: SPF
Your misconfigured email can send your emails to spam inboxes and let hackers pretend to be you - costing you millions. In part 1 of this guide, we’ll cover configuring your SPF record.
Let’s Go Phishing
How a simple phishing email will shut down your company if you’re not careful.
If Your Devices Aren’t Updated, You’re In For A Bad Time
“Patch Tuesday” is here again - do you know how to update ALL of your devices?
What’s Your iPrivacy?
Why does my crossword app need to know my friend’s email? Hint: it doesn’t.