HowTo: Sales Module
Overview CyberHoot provides a free trial module for MSPs to pursue new cybersecurity business. This new CyberHoot Sales module enables MSPs to perform a quick security assessment of a potential …
Overview CyberHoot provides a free trial module for MSPs to pursue new cybersecurity business. This new CyberHoot Sales module enables MSPs to perform a quick security assessment of a potential …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
As part of National Cybersecurity Awareness Month (NCAM), CyberHoot strives to share topics that broaden everyone’s view on the importance of cybersecurity training and awareness. Unfortunately, a lot of small …
The picture above is a bag with $25,000 in “redeemed” Apple Store gift cards sent to hackers overseas by a small business in New England. The business owner’s email address …
Employees are the weakest link in Cybersecurity and because of this 80% of businesses will adopt a Cloud-based training solution by 2020. Small to Medium sized businesses are being left …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
“Education is learning what you didn’t even know you didn’t know.” – Daniel J. Boorstin We continue to encounter a lack of awareness on the Ransomware …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
This video explains how the Foreign Intelligence Surveillance Act (FISA) system works and is fulfilled law enforcement with checks and balances by the FBI, senior leadership at the FBI, the …
This 20 minute Ted Talk discusses how a hidden cyberwar is being perpetrated for the past 2 decades online not with bullets and bombs but rather with bits and bytes. …
This 12 minute Ted Talk outlines how the IoT is making investigations easier. Digital forensics looks for a trail of electronic evidence from the research on how to perform a …
This 16 minute Ted talk outlines the work of a digital forensics investigator. He describes his work as the collection, analysis, and reporting of electronic data that is preserved …
This video outlines the steps you need to take to setup your DMARC and DKIM email records in the Domain Name System (DNS) in order to protect your domain online …
This 5 minute video outlines how Password Managers can make your life easier. It starts by illustrating some of the many ways people fail security such as reusing easy to …
This video outlines the dangers of inserting random USB keys in your computer. Security researchers have proven that a very powerful and effective attack on businesses and individuals is to …
This video should be removed since it purports that the filtration by Apple and Google of Apps in their application stores prevents Smartphones from being hacked was proven false this …
What happens when you sit down at your computer in the morning after a long vacation or jury duty or maternity/paternity leave and you can’t remember the password you were …
What happens when you sit down at your computer in the morning after a long vacation or jury duty or maternity/paternity leave and you can’t remember the password you were …
LastPass lives in your browser as an extension. It sits in the background monitoring your logins to each website based upon the domain name you’re visiting. If it finds a …
The LastPass password manager is a security and productivity tool for the 21st century. Watching this video helps the new password manager user understand the tool and its capabilities with …
The first thing you need to learn with LastPass, or any password manager, is how it saves your online identities (usernames and passwords) into the secure database. This LastPass video …
Password Managers are productivity tools in addition to security tools. One of the most valuable time-savers in LastPass is the Form filling feature. This video outlines how to add various …
One of the more difficult tasks associated with strong password hygiene is creating strong passwords. This 1 minute video from LastPass outlines the valuable secure password generator available from within …
This 1 minute video outlines how to create secure encrypted note cards within LastPass. These notecards are useful for secure password storage on encrypted Office documents and excel files as …
httpv://www.youtube.com/watch?v=embed/5XbSNeVsQYcThis video covers the most common types of insiders who threaten your business. From a non-malicious but accidental disclosure of confidential information (a mistake) to a malicious or purposeful sale …
This Fox News special outlines an alert posted by Twitter about hacker attacks, possibly from nation states, on users social media accounts. The security analysts reminds us to use strong …
httpv://www.youtube.com/watch?v=embed/UjENRK4UwYIComputer security in the 21st century isn’t solely about password hygiene and phishing attacks. It must also include physical security training to guide employees on how to maintain a secure …
Computer security in the 21st century isn’t solely about password hygiene and phishing attacks. It must also include physical security training to guide employees on how to maintain a secure …
httpv://www.youtube.com/watch?v=embed/qbuSZ9rOKNkHospitals must train all their employees on how to remain safe while performing their healthcare job responsibilities. From safely lifting patients to dealing with universal precautions to protect against fluid …
The FBI claims that over 50% of the 6 Trillion dollars lost to hackers and businesses is due to Business Email Compromise (aka: BEC). That staggering statistic is what this …
This CyberHoot core curriculum and BootCamp video begins with an introduction to the CyberHoot platform. Then the video segways into examining who is attacking us (common Hacker archetypes) and what …
This CyberHoot core curriculum and BootCamp video summarizes the importance of Passwords and Passphrases and why the human mind is not well suited to memorizing and recalling complex strong and …
The Healthcare market is required to provide training on legislation that was passed over a decade ago and called the Health Insurance Portability and Accountability Act (HIPAA for short). This …
This video explains the common form of phishing simply called phishing. It then goes on to differentiate a more sophisticated, targeted and well-researched attack on businesses known as a Spear-Phishing …
Social Engineering is a core component of Phishing attacks. However, it is also commonly used in physical attacks at businesses as well as over the phone. This video outlines common …
Remote access solutions are also known as Virtual Private Networks. These are encrypted closed-loop encrypted connection between your home computer or Laptop and your business’s remote access solution. The importance …
How to Reduce your WiFi Risks This CyberHoot core curriculum and BootCamp video outlines the three most common ways hackers attack wifi connections and what individuals should do to protect …
This Two-Factor Authentication vendor video outlines the importance of using Two-Factor Authentication (2FA) on all your critical and sensitive accounts. It is a complementary video to the CyberHoot Core Curriculum …
In late 2017 and well into 2018 hackers were attempting to extort money from unsuspecting victims by presenting those targeted individuals with a password scraped off the Dark Web (from …
The International Trade in Arms Regulations is Department of Defense requirements surrounding the import and export of 16 categories of “Defense Articles”. This video outlines the requirements of businesses dealing …
This brief video shows proof of concept exploit code that takes advantage of a critical vulnerability in the Remote Desktop Protocol. In this video a remote hacker attacks an unpatched …
What is 2FA and why is it Important? This CyberHoot core curriculum and Bootcamp video focuses on two-factor authentication (aka: 2FA). Two-factor authentication is the gold standard for securely authenticating …
The first data privacy legislation was passed by the European Union and called the General Data Privacy Regulation (GDPR) back in 2017. In Jan. 2019, California is following suite with …