GDAP helps MSPs with PIM

Granular Delegated Admin Privileges (GDAP)

Microsoft’s Granular Delegated Admin Privileges (GDAP) is a way of assigning specific administrative permissions to individuals or groups within an organization through Microsoft Azure. This approach enables a more refined …

optional training icon

HowTo: Optional Training Assignments

Overview CyberHoot provides the ability to optionally assign policies, videos, and programs to your users.  Optional assignments provide the convenience of providing training to your users without the repeated reminders …

3.5 Million Unfilled Cybersecurity Jobs by 2021

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

Apple Gift Card Email Compromise

The picture above is a bag with $25,000 in “redeemed” Apple Store gift cards sent to hackers overseas by a small business in New England. The business owner’s email address …

What is Business Email Compromise?

Enterprise Security Weekly Podcast

Employees are the weakest link in Cybersecurity and because of this 80% of businesses will adopt a Cloud-based training solution by 2020. Small to Medium sized businesses are being left …

The Importance of Social Media and Email Security

HB 1612 : DATA SECURITY IN NH PUBLIC SCHOOLS

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

Our Employees Deserve Security Training

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

Join Our Newsletter

NCAM CyberHoot: Business E-mail Compromise

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

NCAM CyberHoot: Passwords & Password Managers

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

CyberHoot – Two-Factor Authentication – What is it and why is it Important?

NCAM CyberHoot: Two-Factor Authentication

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

Learning the dangers of public wifi networks

NCAM CyberHoot: Reduce WiFi Risks

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

How the Foreign Intelligence Surveillance Act (aka: FISA) Process Works

How The FISA Process Works

This video explains how the Foreign Intelligence Surveillance Act (FISA) system works and is fulfilled law enforcement with checks and balances by the FBI, senior leadership at the FBI, the …

Confessions of a CyberSpy Hunter

Confessions of a CyberSpy Hunter

This 20 minute Ted Talk discusses how a hidden cyberwar is being perpetrated for the past 2 decades online not with bullets and bombs but rather with bits and bytes.  …

Digital Forensics Explained

Digital Forensics Explained

  This 16 minute Ted talk outlines the work of a digital forensics investigator.  He describes his work as the collection, analysis, and reporting of electronic data that is preserved …

How to set up a DMARC record

How to setup a DMARC record

This video outlines the steps you need to take to setup your DMARC and DKIM email records in the Domain Name System (DNS) in order to protect your domain online …

What Are Password Managers?

This 5 minute video outlines how Password Managers can make your life easier. It starts by illustrating some of the many ways people fail security such as reusing easy to …

LastPass 101 – Android OS

What happens when you sit down at your computer in the morning after a long vacation or jury duty or maternity/paternity leave and you can’t remember the password you were …

LastPass 101 – Creating Secure Notes

This 1 minute video outlines how to create secure encrypted note cards within LastPass.  These notecards are useful for secure password storage on encrypted Office documents and excel files as …

Insider Threat 201

Insider Threat 201

https://www.youtube.com/embed/5XbSNeVsQYcThis video covers the most common types of insiders who threaten your business.  From a non-malicious but accidental disclosure of confidential information (a mistake) to a malicious or purposeful sale …

Basic Physical Security Training

Basic Physical Security Training

Watch this video on YouTube Computer security in the 21st century isn’t solely about password hygiene and phishing attacks. It must also include physical security training to guide employees on …

What is Business Email Compromise?

What is Business Email Compromise?

Watch this video on YouTube The FBI claims that over 50% of the 6 Trillion dollars lost to hackers and businesses is due to Business Email Compromise (aka: BEC).  That …

Become More Aware Become More Secure

CyberHoot: An Introduction to our Platform

This CyberHoot core curriculum and BootCamp video begins with an introduction to the CyberHoot platform.  Then the video segways into examining who is attacking us (common Hacker archetypes) and what …

HIPAA Training 2019

HIPAA Training 2019

The Healthcare market is required to provide training on legislation that was passed over a decade ago and called the Health Insurance Portability and Accountability Act (HIPAA for short).  This …

Phishing and Spear Phishing Explained

This video explains the common form of phishing simply called phishing.  It then goes on to differentiate a more sophisticated, targeted and well-researched attack on businesses known as a Spear-Phishing …

Virtual Private Networks (VPN) Explained

Virtual Private Networks (VPN) Explained

A Virtual Private Network (VPN) is a way to create online privacy and anonymity by creating a private network from a public internet connection. A VPN will mask your internet protocol (IP) …

CyberHoot: WiFi Insecurities and How to Reduce WiFi Risks

CyberHoot: WiFi Insecurities Explained

How to Reduce your WiFi Risks This CyberHoot core curriculum and BootCamp video outlines the three most common ways hackers attack wifi connections and what individuals should do to protect …

Two-Factor Authentication Explained (DUO)

Two-Factor Authentication Explained (DUO)

This Two-Factor Authentication vendor video outlines the importance of using Two-Factor Authentication (2FA) on all your critical and sensitive accounts.  It is a complementary video to the CyberHoot Core Curriculum …

Sextortion Explained in 30 Seconds

Sextortion Explained in 30 Seconds

In late 2017 and well into 2018 hackers were attempting to extort money from unsuspecting victims by presenting those targeted individuals with a password scraped off the Dark Web (from …

Basic ITAR Training Cyberhoot

Basic ITAR Training

The International Trade in Arms Regulations is Department of Defense requirements surrounding the import and export of 16 categories of “Defense Articles”.  This video outlines the requirements of businesses dealing …

CyberHoot – Two-Factor Authentication – What is it and why is it Important?

CyberHoot: Two-Factor Authentication (2FA)

What is 2FA and why is it Important? This CyberHoot core curriculum and Bootcamp video focuses on two-factor authentication (aka: 2FA). Two-factor authentication is the gold standard for securely authenticating …

Physical Check Fraud Protections

Physical Check Fraud Protections

Check fraud has been a problem since long before Frank Abignale bought his check printing press in the late 60s and defrauded hundreds of companies out of $100’s of thousands …

An overview of PCI Compliance

An Overview of PCI Compliance

Payment Card Industry Data Security Standards, aka: PCI Compliance is a creation of the four major Credit Card Brands including Visa, Mastercard, American Express, and Discover.  Together they published data …