CyberHoot: An Introduction to our Platform
Welcome to CyberHoot’s cyber literacy 101 core curriculum videos. This introductory video introduces end users to cyber security in the 21st century. It examines who is attacking us, using what …
Welcome to CyberHoot’s cyber literacy 101 core curriculum videos. This introductory video introduces end users to cyber security in the 21st century. It examines who is attacking us, using what …
What is 2FA and why is it Important? This video is part of CyberHoot’s foundational cyber literacy 101 video program. It focuses on two-factor (aka: multi-factor) authentication. Two-Factor Authentication (2FA) …
This video is part of CyberHoot’s cyber literacy 101 program. It summarizes the importance of password hygiene and why the human mind is not well suited to memorizing and recalling …
How to Reduce your WiFi Risks This is the sixth and final cyberliteracy 101 video in CyberHoot’s core program. It highlights the three most common methods hackers use to target …
Microsoft’s Granular Delegated Admin Privileges (GDAP) is a way of assigning specific administrative permissions to individuals or groups within an organization through Microsoft Azure. This approach enables a more refined …
Overview CyberHoot provides the ability to optionally assign policies, videos, and programs to your users. Optional assignments provide the convenience of providing training to your users without the repeated reminders …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
As part of National Cybersecurity Awareness Month (NCAM), CyberHoot strives to share topics that broaden everyone’s view on the importance of cybersecurity training and awareness. Unfortunately, a lot of small …
The picture above is a bag with $25,000 in “redeemed” Apple Store gift cards sent to hackers overseas by a small business in New England. The business owner’s email address …
Employees are the weakest link in Cybersecurity and because of this 80% of businesses will adopt a Cloud-based training solution by 2020. Small to Medium sized businesses are being left …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
“Education is learning what you didn’t even know you didn’t know.” – Daniel J. Boorstin We continue to encounter a lack of awareness on the Ransomware topic, and sadly the …
This video explains how the Foreign Intelligence Surveillance Act (FISA) system works and is fulfilled law enforcement with checks and balances by the FBI, senior leadership at the FBI, the …
This 20 minute Ted Talk discusses how a hidden cyberwar is being perpetrated for the past 2 decades online not with bullets and bombs but rather with bits and bytes. …
This 12 minute Ted Talk outlines how the IoT is making investigations easier. Digital forensics looks for a trail of electronic evidence from the research on how to perform a …
This 16 minute Ted talk outlines the work of a digital forensics investigator. He describes his work as the collection, analysis, and reporting of electronic data that is preserved …
This video outlines the steps you need to take to setup your DMARC and DKIM email records in the Domain Name System (DNS) in order to protect your domain online …
This 5 minute video outlines how Password Managers can make your life easier. It starts by illustrating some of the many ways people fail security such as reusing easy to …
What happens when you sit down at your computer in the morning after a long vacation or jury duty or maternity/paternity leave and you can’t remember the password you were …
What happens when you sit down at your computer in the morning after a long vacation or jury duty or maternity/paternity leave and you can’t remember the password you were …
LastPass lives in your browser as an extension. It sits in the background monitoring your logins to each website based upon the domain name you’re visiting. If it finds a …
The LastPass password manager is a security and productivity tool for the 21st century. Watching this video helps the new password manager user understand the tool and its capabilities with …
The first thing you need to learn with LastPass, or any password manager, is how it saves your online identities (usernames and passwords) into the secure database. This LastPass video …
One of the more difficult tasks associated with strong password hygiene is creating strong passwords. This 1 minute video from LastPass outlines the valuable secure password generator available from within …
This 1 minute video outlines how to create secure encrypted note cards within LastPass. These notecards are useful for secure password storage on encrypted Office documents and excel files as …
https://www.youtube.com/embed/5XbSNeVsQYcThis video covers the most common types of insiders who threaten your business. From a non-malicious but accidental disclosure of confidential information (a mistake) to a malicious or purposeful sale …
Watch this video on YouTube This Fox News special outlines an alert posted by Twitter about hacker attacks, possibly from nation-states, on user’s social media accounts. The security analysts remind …
Watch this video on YouTube Computer security in the 21st century isn’t solely about password hygiene and phishing attacks. It must also include physical security training to guide employees on …
Computer security in the 21st century isn’t solely about password hygiene and phishing attacks. It must also include physical security training to guide employees on how to maintain a secure …
Watch this video on YouTube Hospitals must train all their employees on how to remain safe while performing their healthcare job responsibilities. From safely lifting patients to dealing with universal …
Watch this video on YouTube The FBI claims that over 50% of the 6 Trillion dollars lost to hackers and businesses is due to Business Email Compromise (aka: BEC). That …
The Healthcare market is required to provide training on legislation that was passed over a decade ago and called the Health Insurance Portability and Accountability Act (HIPAA for short). This …
This video explains the common form of phishing simply called phishing. It then goes on to differentiate a more sophisticated, targeted and well-researched attack on businesses known as a Spear-Phishing …
A Virtual Private Network (VPN) is a way to create online privacy and anonymity by creating a private network from a public internet connection. A VPN will mask your internet protocol (IP) …
This Two-Factor Authentication vendor video outlines the importance of using Two-Factor Authentication (2FA) on all your critical and sensitive accounts. It is a complementary video to the CyberHoot Core Curriculum …
In late 2017 and well into 2018 hackers were attempting to extort money from unsuspecting victims by presenting those targeted individuals with a password scraped off the Dark Web (from …
The International Trade in Arms Regulations is Department of Defense requirements surrounding the import and export of 16 categories of “Defense Articles”. This video outlines the requirements of businesses dealing …
The first data privacy legislation was passed by the European Union and called the General Data Privacy Regulation (GDPR) back in 2017. In Jan. 2019, California is following suite with …
Check fraud has been a problem since long before Frank Abignale bought his check printing press in the late 60s and defrauded hundreds of companies out of $100’s of thousands …
Payment Card Industry Data Security Standards, aka: PCI Compliance is a creation of the four major Credit Card Brands including Visa, Mastercard, American Express, and Discover. Together they published data …
This video dives into password managers and how they protect your most critical and sensitive data – your passwords. This video explains some of the more sophisticated protections provided by …
“It had a devastating effect on our office, Monday, Tuesday, Wednesday, until this morning when they got us up running, we were not able to see half of our patients …