Apple Gift Card Email Compromise

The picture above is a bag with $25,000 in “redeemed” Apple Store gift cards sent to hackers overseas by a small business in New England. The business owner’s email address …

NCAM CyberHoot: Business E-mail Compromise

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

NCAM CyberHoot: Passwords & Password Managers

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

NCAM CyberHoot: Two-Factor Authentication

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

NCAM CyberHoot: Reduce WiFi Risks

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

Confessions of a CyberSpy Hunter

This 20 minute Ted Talk discusses how a hidden cyberwar is being perpetrated for the past 2 decades online not with bullets and bombs but rather with bits and bytes.  …

Digital Forensics Explained

  This 16 minute Ted talk outlines the work of a digital forensics investigator.  He describes his work as the collection, analysis, and reporting of electronic data that is preserved …

How to setup a DMARC record

This video outlines the steps you need to take to setup your DMARC and DKIM email records in the Domain Name System (DNS) in order to protect your domain online …

How to Create a Strong Passphrase

This 3 minute video outlines how to create strong passphrases by using at least five (5) discrete words that are changed slightly so that they are not spelled exactly as …

Phishing Training

This 3 minute video by the Government of Canada outlines how phishing occurs online. Problems online occur when you are phished and turn over account numbers, passwords, or other critical …

What are Password Managers

This 3 minute video outlines how Password Managers can make your life easier. It starts by illustrating some of the many ways people fail security such as reusing easy to …

Social Engineering 101

This great 1 minute video outlines how social engineers manipulate people in social settings to gain information on how to hack systems or steal information.  The video outlines various methods …

The Dangers of Random USB Keys

This video outlines the dangers of inserting random USB keys in your computer.  Security researchers have proven that a very powerful and effective attack on businesses and individuals is to …

LastPass Overview 2017

This video provides a very good overview of LastPass password manager and its various features from secure password generation to storing credentials for websites, to storing encrypted Secure Notes.  If …

Mobile Devices and Privacy Concerns

This video should be removed since it purports that the filtration by Apple and Google of Apps in their application stores prevents Smartphones from being hacked was proven false this …

How to protect yourself from Malware

This short 3 min video outlines how to combat malware by preventing it from being installed in the first place.  It outlines how to keep computer security up-to-date with patching, …

LastPass 101 – Android OS

What happens when you sit down at your computer in the morning after a long vacation or jury duty or maternity/paternity leave and you can’t remember the password you were …

LastPass 101 – Filling a Form

Password Managers are productivity tools in addition to security tools.  One of the most valuable time-savers in LastPass is the Form filling feature.  This video outlines how to add various …

LastPass 101 – Creating Secure Notes

This 1 minute video outlines how to create secure encrypted note cards within LastPass.  These notecards are useful for secure password storage on encrypted Office documents and excel files as …

Insider Threat 201

https://www.youtube.com/embed/5XbSNeVsQYcThis video covers the most common types of insiders who threaten your business.  From a non-malicious but accidental disclosure of confidential information (a mistake) to a malicious or purposeful sale …

The Importance of Social Media and Email Security

https://www.youtube.com/embed/xLyPhLHlyXEThis Fox News special outlines an alert posted by Twitter about hacker attacks, possibly from nation states, on users social media accounts. The security analysts reminds us to use strong …

Basic Physical Security Training

https://www.youtube.com/embed/UjENRK4UwYIComputer security in the 21st century isn’t solely about password hygiene and phishing attacks. It must also include physical security training to guide employees on how to maintain a secure …