FedHIVE Blog

February 10, 2022

Avoid Falling for Online Phishing Attempts

This is a threat to everyone who is online, or has data stored online. The threat is raised when phishing attempts can target both the institution holding the information as well as the user. While the user is much more commonly targeted, businesses have reported receiving anywhere from “fourteen to forty fraudulent emails per year”.
January 27, 2022

Malware, Emotet, DoS – Know The Difference

The advancement of technology plays a large role in making these attackers smarter day by day. Cybercriminals take advantage of firms who pay less heed to...
November 23, 2021

Software Vulnerability

Software vulnerability allows online attackers to gain control of a system due to a defect in the software that originated from the design or a flaw in the coding. This is a large threat to those online because important information can be stolen and becomes vulnerable.
November 3, 2021

DDoS Attacks and Embracing the Remote Working Environment

Cyber threats are getting more serious, and the cybercriminals are becoming more sophisticated in their work. The increasing levels of remote work are enabling them to hack. Distributed Denial of Service (DDoS) attacks are the biggest cybersecurity threat because hackers utilize remote work and human error to steal corporate data.
October 20, 2021

COVID-19 Phishing Schemes

Throughout the COVID-19 pandemic, the number of phishing schemes being sent out have increased. This comes in a variety of different forms, such as malicious websites, phishing emails, fraudulent charities, and unemployment scams.
October 13, 2021

Cloud Attacks

Cloud Capabilities give businesses on-demand self-service, easy maintenance, large network access, security and much more benefits, the efficiency and convenience of cloud services come at a cost. Cloud models are vulnerable to on site and virtual attacks, opening the door for people with malicious intent to have a crack at businesses and individuals’ data. Developers and Cloud Security Specialists have a job to take the necessary security precautions to protect their customers data from cyber-attacks.
October 6, 2021

The Continuous Cyber Treat

With cyber-attacks and AI-Enhanced cyberthreats increasing over the years, especially since 2018, witnessing crimes related to massive data breaches, flaw in microchips, crypto-jacking, and many others, taking precautious steps into handling these horrific incidences is crucial.
August 4, 2021

The Cybersecurity Maturity Model Certification framework and what Federal IT pros need to know

Our very own Michael Cardaci (CEO, FedHIVE) is featured In a recent FedTech Magazine article about CMMC and its impact on cybersecurity.
May 20, 2021

3 Tips to Improve Government Services in an Equitable Way

During a recent GovLoop training, government and industry experts discussed how to use technology to remove the barriers that prevent constituents from receiving equitable government service.
May 19, 2021

CMMC: Another Check in the Box or a Whole New Mindset

The Department of Defense’s (DoD) plan to instill a security mindset with its contractors is gaining traction. Gone are the days when cybersecurity was dealt with by ensuring all of your employees attend security training. Gone are the days when changing email passwords every couple of weeks was enough.