HiveMined Security is a Customer-centric Cybersecurity Company, that avoids unnecessary complex abbreviations and industry lingo, although because customer-centrism is so important to us, we were indeed tempted to call our solutions "C4".
Unlike our humor...
...we cater our language so everyone can understand what we do without any need for prior knowledge about cybersecurity. We believe anything else is insincere. Some cybersecurity companies even deliberately promote fear and utilise scare-tactics to sell their solutions. They benefit from making digital threats out to be overly complex, in order to make their customers believe their purportedly matching complex systems, are needed to meet the threat.
More often however, the complexity arises from the accidental tendency of the entire cybersecurity industry to continuously behave reactively, always playing catch-up to the latest hacking methods and cyber-exploits… On top of that, every time a novel threat arises, it is naturally given a particular technological explanation, and a mirroring technological fix. But then for no apparent reason, it is given a matching obscure high-tech name too. As of such, some of the latest cybersecurity software advances has created entirely new niche-markets with dense abbreviations including SIEM, ISACA, IDS/IDP, and CND —straight forward stuff right?
We find all this vey silly. Everyone from the CEO to the floor manager in your company should be able to understand why and how their cybersecurity solutions are protecting the organisation against hackers. Besides this, we believe we can approach the issue a little more cleverly, by flipping the script instead of always reacting to the bad guys’ antics. There is no need to follow suit, if you deny the game that they have started.
Our approach is not a game changer, it’s a game non-starter.
The way we think about and work with cybersecurity, is divided into two large areas, divided by how hackers and cyber-criminals begin to play their games:
1) By targeting the users, or 2) by targeting the systems
No matter what cyber-attack you’ve heard of, or can imagine, it will fall within one of the two categories, and sometimes both. The first category covers threats that utilise mass-distributed random messaging that is tailored to encourage human error that benefit the hackers’ goals, by means of lies and deceit in the messaging that meet the users.
It depends entirely on fooling the users, so we created Skeptify - skepticism as a service - in order to handle the root of the problem. Skeptify for Outlook is not another annoying spam filter, it's a convenient on-demand bullshit caller that addresses the cyber-threat that accounts for 91% of all cyber crime.
Skeptify for Mobile also covers cellular messaging and calls, of which nearly 50% on a daily basis in the USA are now fraudulent. Our Skeptify services however do not include protection against intentional and targeted attacks directly against the online systems themselves. This area is far more complex... That's right until we realised there's a way to make preventing it very simple. We call it HiveDefence.
Here's a narrative comparison, that explains exactly what HiveDefence does:
If a customer walking the isles of a local supermarket, sneaks a glazed ham into her purse to hide it, her intensions are very likely a matter of shoplifting said ham. However technically speaking, the customer hasn't stolen anything before she has left the store, so they wait till she breaches the threshold of the doors before they apprehend her... Sometimes it might happen that the store manager lets her off the hook... She must have hungry kids or something, right? In this case, you can be sure that they ban her from entering the place ever again. Might even put up a picture of her so the security guard can keep an eye out.
Now imagine that instead of a framed picture in one store, facial recognition software denied her access to every store in the world, or at least everywhere that is connected to this kind of anti-shoplifter security system. So she's screwed...
Right until she remembers, that she can still buy her groceries online. But because she is a complete psychopath (doesn't even have hungry kids, just a really bad attitude) she tries to get around paying for her groceries online too. Before she even identifies her pork-based loot however, her uniquely suspicious behaviour around the target grocery webshop reveals her criminal intentions with utmost certainty well before anything actually criminal happens — just like the CC cameras did at the stores when she concealed the ham...
All of a sudden she finds herself forever blocked from the website. In fact, to her, it's like it never even existed. But it's not only that site; it's every site she can remember the address of (who all happen to have a HiveDefence subscription)!
So she gets another connection (IP address), but this time she simply pays for her glazed ham, no harm done, well aware that if she tries again, her online access vanishes once more.
HiveDefence is not "intrusion detection", it's intrusion prevention. What would you rather have?
With unparalleled convenience, HiveDefence implements with one line of code for any IoT-device, virtual machine, or server...