Data Breaches

Cybersecurity Awareness Month – Breaches

Ransomware costs continue to increase year over year for SMBs. News headlines talk about multi-million dollar Ransomware breach costs, but those apply primarily to enterprises. For the average SMB, the costs are in the hundreds of thousands of dollars. $139,000 to be exact or 65% more than last year ($84,000).
Preparations have never been more important or simple for SMBs to train up their employees to fight the scourge of cyberattacks.

Average cost of Ransomware to a Small Business

Cybersecurity Awareness Month – Ransomware Costs

Ransomware costs continue to increase year over year for SMBs. News headlines talk about multi-million dollar Ransomware breach costs, but those apply primarily to enterprises. For the average SMB, the costs are in the hundreds of thousands of dollars. $139,000 to be exact or 65% more than last year ($84,000).
Preparations have never been more important or simple for SMBs to train up their employees to fight the scourge of cyberattacks.

3rd Party Risk Management and Data Destruction

Morgan Stanley Data Breach – Lessons to be Learned

The Morgan Stanley data breach of 2022 where surplus equipment was sent to a 3rd party for data destruction but ended up on eBay is a lesson’s learned treasure trove. From Data Retention and Destruction process failures to contract failures to 3rd party risk management failures, there are plenty of improvement opportunities for SMBs and MSPs to learn from here. This article highlights how you can improve your cybersecurity program from the failures of this breach.

cyberhoot newsletter july 2022

CyberHoot Newsletter – July 2022

Restaurant Cloud-based POS Systems Hacked Multiple POS systems used by restaurants all over the world (MenuDrive, HarborTouch, and InTouchPOS) have been hacked enabling hackers to collect credit card details on …

POS SHopping Cart

Restaurant Ordering Platforms Targeted By Hackers

Secure your business with CyberHoot Today!!! Sign Up Now Customers from over 300 restaurants’ had payment card details stolen in web-skimming campaigns targeting three online ordering platforms. Web-skimmers, or Magecart …

time to live TTL cybrary

Time-To-Live (TTL)

Secure your business with CyberHoot Today!!! Sign Up Now Time-To-Live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network …

call admission control cac

Call Admission Control (CAC)

Secure your business with CyberHoot Today!!! Sign Up Now Call Admission Control (CAC) is the method or process of regulating traffic in voice communications, specifically in wireless mobile networks and …

voice firewall definition cybrary

Voice Firewall

Source: Mobileum Secure your business with CyberHoot Today!!! Sign Up Now A Voice Firewall logs, monitors, and controls all inbound and outbound voice network activity on a per-call basis through …

traceroute cybrary definition

Traceroute

Secure your business with CyberHoot Today!!! Sign Up Now Traceroute is a network diagnostic tool used to track the path taken by a packet on an IP network from source …

honeymonkey cybrary

HoneyMonkey

Secure your business with CyberHoot Today!!! Sign Up Now A HoneyMonkey is a system created by Microsoft Research that uses a network of computers or virtual machines to browse different …

Interpol

Secure your business with CyberHoot Today!!! Sign Up Now Interpol, also known as the International Criminal Police Organization, is the world’s largest international police organization, with seven regional bureaus worldwide …

infragard cybrary

InfraGard

Secure your business with CyberHoot Today!!! Sign Up Now InfraGard is a partnership between the FBI and the private sector. It’s an association of individuals who represent businesses, academic institutions, …

june 2022 newsletter

CyberHoot Newsletter – June 2022

Ransomware Insurance: Prescriptive and Restrictive Insurers are drafting more restrictive and prescriptive insurance policy requirements designed to reduce the number of claims and better protect themselves and the companies they …

vishing refund scam

Refund Vishing Scams

Secure your business with CyberHoot Today!!! Sign Up Now We’re constantly receiving emails, text messages, and phone calls from scammers claiming to be reputable brands we use. What you may …

universal authentication framework UAF definition

Universal Authentication Framework (UAF)

Secure your business with CyberHoot Today!!! Sign Up Now The Universal Authentication Framework (UAF) is an authentication standard created by the FIDO Alliance. In UAF, a user who is authenticating to …

indicators of compromise IOC

Indicators of Compromise (IoC)

Secure your business with CyberHoot Today!!! Sign Up Now Indicators of Compromise (IoC) are pieces of forensic evidence, called IoCs for short, which show potential intrusions on a computer system …

extended detection and response (XDR) cybrary definition

Extended Detection and Response (XDR)

Secure your business with CyberHoot Today!!! Sign Up Now Extended Detection and Response (XDR) is touted as a consolidation of technologies and disparate system monitoring into a single tool or …

fido cybrary definition

Fast Identity Online (FIDO)

Secure your business with CyberHoot Today!!! Sign Up Now Fast Identity Online (FIDO) is a set of technology security specifications for strong authentication. FIDO is developed by the FIDO Alliance, …

active directory (AD) cybrary definition

Active Directory (AD)

Secure your business with CyberHoot Today!!! Sign Up Now Active Directory (AD) is Microsoft’s proprietary directory service. It runs on Windows Server and enables administrators to manage permissions and access …

scareware cybrary definition

Scareware

Secure your business with CyberHoot Today!!! Sign Up Now Scareware is a type of malware tactic used to manipulate victims into downloading or buying malware-infested software. Scareware attacks are used …

oauth cybrary definition

OAuth

Secure your business with CyberHoot Today!!! Sign Up Now OAuth, also known as Open Authorization, is an open standard authorization framework for token-based authorization on the internet. OAuth enables an end-user’s account …

web3 cybrary definition

Web3

Secure your business with CyberHoot Today!!! Sign Up Now Web3, also referred to as Web 3.0, is the next evolution of the internet. The new phase is predicted by some …

Geofencing

Geofencing

Secure your business with CyberHoot Today!!! Sign Up Now Geofencing is a technology for setting virtual boundaries and triggering events when these boundaries are crossed by a mobile device on which …

pdf malware keylogger

Snake Keylogger Spreading Through PDFs

Secure your business with CyberHoot Today!!! Sign Up Now Many malicious email campaigns today leverage Word documents to hide and spread malware, but a recently discovered campaign uses a malicious …

may 2022 newsletter cyberhoot

CyberHoot Newsletter – May 2022

Emotet Has Reemerged as Top Malware in Circulation The HP Wolf Security threat research team has identified a 2700% increase in Emotet infections in the first quarter of 2022, re-emerging in late 2021 after …