Internet of Things (IoT)
The Internet of Things (IoT) is any device or machine that has the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. IoT is essentially any …
Weekly blog articles covering current, critical cybersecurity topics to help the world become more aware and more secure.
The Internet of Things (IoT) is any device or machine that has the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. IoT is essentially any …
Cybersecurity program require many things, but Policies and Procedures should be near the top of the list.
MAZE Ransomware represents a change for the worse in the capabilities of online hackers today. Traditional backup strategies are no longer enough to provide a get-out-of-jail-free card when hit with ransomware. Data confidentiality is also at risk now and that changes who will pay ransoms dramatically. Prepare now to avoid this scourge of online hacking.
Cybersecurity Maturity Model Certification is a much needed adjustment to DFARS that provides risk based compliance to five levels of controls that relates to the Controlled Unclassified Information (CUI) that underpins a defense contractor, sub or prime working in the defense industry.
Risk assessments have many benefits and only one drawback (they cost money). Having a Risk Management framework in place requires a risk assessment be performed. Avoid costly down-time and improve network robustness by having one done on your business.
Dear Valued Customer, As Eric shared last week, our commitment to strengthening and improving Zoom is our number one priority. We wanted to reach out with a quick overview of …
In 2020, the number of daily smartphone users in the world totals 3.5 Billion or 45% of the world’s population. However, the total number of people who own a smart or …
With the issues we are facing today with the coronavirus, many technology companies are looking for ways they can stay afloat, but some are looking for ways to use their …
Ruthless phishing attacks purporting to inform you of exposure to the coronavirus from a hospital are now compromising computers everywhere. Become more aware to become more secure!
Zoom Bombing is where an unauthorized person enters your Zoom video conference to cause disruptions or to gain sensitive information. Many companies and schools have begun using video conferencing extensively …
Barbara Corcoran, a world famous Shark Tank host, was scammed out of nearly $400,000 in late February. Barbara Corcoran, a renowned real-estate broker and business expert, admitted last month that …
Working remote introduces many new cybersecurity risks to businesses large and small. Review the best practices, watch a few videos, and prepare your business for success in the new era of COVID19 and working remote.
A few weeks ago a report was published by a cybersecurity firm, ImmuniWeb. This report revealed that only three of the world’s top 100 international airports passed their basic high …
Trello, the platform used by many businesses for organizing to-do lists and coordinating team tasks has recently exposed the personally identifiable information (PII) data of its users. The finding was …
Last Updated: Sun. March 8th, 2020 The Coronavirus (COVID-19), has infected nearly 90,000 people worldwide as of March 2, 2020, killing more than 3,000 of those infected. The virus started …
Knowing how to protect yourself and your critical accounts from compromise is becoming ever more important. Learn what can happened to and setup 2FA into all of your online critical accounts.
The Coronavirus has been on the front of everyone’s mind lately, causing fear and concern across the world. This deadly virus opens up yet another way for attackers to hack …
The Active Cyber Defense Certainty Act (ACDC), also known as the “Hack Back” bill was first introduced in the U.S. House of Representatives in 2017. The bill has been worked …
Governments across the world are starting to realize how important cybersecurity really is. The United States is currently working on legislation that would help protect state and local governments by …
[Editors Note: Clearview AI stopped selling their database access to just any US Business] Clearview AI has created one of the broadest and most powerful facial recognition databases in the …
Hackers never cease to stop evolving and finding new ways to get your information. Hackers are now breaking into telecom companies to take over victim’s phone numbers. Being able to …
Infrequently, Microsoft released critical vulnerability alerts and patches that are so important to know about, that you should stop what you’re doing and review them and plan to patch as soon as possible. This is one of those times.
With tensions cooling ever so slightly from the days following Suleimani’s killing, the threat of Cyberattack by Iranian hackers remains a very real threat. Vigilance is still key.
Educational institutions are easy marks for hackers peddling ransomware. They have lots of critical student and employee data, small cybersecurity budgets, and don’t train students or faculty how to spot and avoid common cyber-attacks. Combined with an ability to pay ransoms either through cyber-insurance coverage or city coffers, and they have a perfect cyberattacks bullseye on them!
The Internet is racing towards 10 Billion publicly documented breached accounts. You can check your own email accounts for breaches and what information was compromised through CyberHoot’s website, inside your …
It was only about a week ago that the government facility in Pensacola, Florida was shut down due to a cyber attack. Now the city of New Orleans is shut …
Technology is always improving and hackers are always finding novel ways to exploit those advances. Cyber security analysts believe new attacks are on the way next year with some powerful …
This past Thanksgiving weekend, 110 healthcare facilities were infected by a ransomware attack on their IT provider. Virtual Care Provider Inc. (VCPI), provides security, data hosting and access management services …
Who is most likely to fall victim to Cyber Monday phishing scams? People who don’t know about phishing scams, typosquatting, and fake look-alike websites. Did you know there are 4 …
Good backups will let you go back in time to recover compromised systems. Don’t let this happen by not patching for BlueKeep now.
CyberHoot has learned there is a new Zero-Day vulnerability in Chrome actively being exploited in the Wild. Your computer can be compromised just by visiting a malicious website. That is …
The City of Johanessburg (COJ) experienced its second ransomware attack this year. In July a Database, internal network and web application were encrypted by hackers seeking a bitcoin ransom. Earlier …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
The FBI issued a stern warning in February 2019. They witnessed multiple Managed Service Providers successfully attacked by advanced hacking tools and organizations. This article details what’s happened since then. …
As part of National Cybersecurity Awareness Month (NCAM), CyberHoot strives to share topics that broaden everyone’s view on the importance of cybersecurity training and awareness. Unfortunately, a lot of small …
The picture above is a bag with $25,000 in “redeemed” Apple Store gift cards sent to hackers overseas by a small business in New England. The business owner’s email address …
Employees are the weakest link in Cybersecurity and because of this 80% of businesses will adopt a Cloud-based training solution by 2020. Small to Medium sized businesses are being left …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
“Education is learning what you didn’t even know you didn’t know.” – Daniel J. Boorstin We continue to encounter a lack of awareness on the Ransomware topic, and sadly the …
This video explains the common form of phishing simply called phishing. It then goes on to differentiate a more sophisticated, targeted and well-researched attack on businesses known as a Spear-Phishing …
“It had a devastating effect on our office, Monday, Tuesday, Wednesday, until this morning when they got us up running, we were not able to see half of our patients …
Hack a Charging Cable via Wi-Fi? Most of us have tethered our mobile phones to our laptop dozens to hundreds of times. Have you ever worried about a hacked charging …