You’ve Been Phished!
Overview of Phish testing.
CyberHoot Videos Used in the Training Platform.
Spotting and Avoiding Phishing Attacks This foundational CyberHoot video teaches critical skills to identify phishing attacks. Viewers learn the most common phishing patterns and simple, effective questions to quickly spot …
Welcome to CyberHoot’s cyber literacy 101 core curriculum videos. This introductory video introduces end users to cyber security in the 21st century. It examines who is attacking us, using what …
What is 2FA and why is it Important? This video is part of CyberHoot’s foundational cyber literacy 101 video program. It focuses on two-factor (aka: multi-factor) authentication. Two-Factor Authentication (2FA) …
This video is part of CyberHoot’s Cyber Literacy program of six (6) videos. It outlines the critical need for anyone and everyone to adopt a password manager. However, this video …
This video is part of CyberHoot’s cyber literacy 101 program. It summarizes the importance of password hygiene and why the human mind is not well suited to memorizing and recalling …
How to Reduce your WiFi Risks This is the sixth and final cyberliteracy 101 video in CyberHoot’s core program. It highlights the three most common methods hackers use to target …
Payment Card Industry (PCI) compliance is important for all businesses that deal with credit cards. PCI compliance standards require businesses to handle customer’s credit card information in a secure manner. …
All credit and debit cards are now being made with “a computer that is 1/4 the size of a postage stamp” this technology we know as a chip card. Chip …
PCI DSS stands for Payment Card Industry Data Security Standard. This is the standard that all organizations must follow if they are processing cardholder data. If an organization or business …
Tokenization is a way for credit card information (also called the Primary Account Number or PAN) to not be used in credit card processing transactions and instead replaced with a …
This video documents what the Wannacry ransomware virus did to companies and individuals throughout the world in the summer of 2017. This video outlines how the US’s own National Security …
This 3-minute video outlines how to create strong passphrases by using at least five (5) discrete words that are changed slightly so that they are not spelled exactly as the …
This short 3 min video outlines how to combat malware by preventing it from being installed in the first place. It outlines how to keep computer security up-to-date with patching, …
This 20 minute Ted Talk discusses how a hidden cyberwar is being perpetrated for the past 2 decades online not with bullets and bombs but rather with bits and bytes. …
This 12 minute Ted Talk outlines how the IoT is making investigations easier. Digital forensics looks for a trail of electronic evidence from the research on how to perform a …
This 16 minute Ted talk outlines the work of a digital forensics investigator. He describes his work as the collection, analysis, and reporting of electronic data that is preserved …
This video outlines the steps you need to take to setup your DMARC and DKIM email records in the Domain Name System (DNS) in order to protect your domain online …
https://www.youtube.com/embed/5XbSNeVsQYcThis video covers the most common types of insiders who threaten your business. From a non-malicious but accidental disclosure of confidential information (a mistake) to a malicious or purposeful sale …
Watch this video on YouTube This Fox News special outlines an alert posted by Twitter about hacker attacks, possibly from nation-states, on user’s social media accounts. The security analysts remind …
Computer security in the 21st century isn’t solely about password hygiene and phishing attacks. It must also include physical security training to guide employees on how to maintain a secure …
Watch this video on YouTube Hospitals must train all their employees on how to remain safe while performing their healthcare job responsibilities. From safely lifting patients to dealing with universal …
Watch this video on YouTube The FBI claims that over 50% of the 6 Trillion dollars lost to hackers and businesses is due to Business Email Compromise (aka: BEC). That …
The Healthcare market is required to provide training on legislation that was passed over a decade ago and called the Health Insurance Portability and Accountability Act (HIPAA for short). This …
A Virtual Private Network (VPN) is a way to create online privacy and anonymity by creating a private network from a public internet connection. A VPN will mask your internet protocol (IP) …
This Two-Factor Authentication vendor video outlines the importance of using Two-Factor Authentication (2FA) on all your critical and sensitive accounts. It is a complementary video to the CyberHoot Core Curriculum …
In late 2017 and well into 2018 hackers were attempting to extort money from unsuspecting victims by presenting those targeted individuals with a password scraped off the Dark Web (from …
The International Trade in Arms Regulations is Department of Defense requirements surrounding the import and export of 16 categories of “Defense Articles”. This video outlines the requirements of businesses dealing …
The first data privacy legislation was passed by the European Union and called the General Data Privacy Regulation (GDPR) back in 2017. In Jan. 2019, California is following suite with …
Check fraud has been a problem since long before Frank Abignale bought his check printing press in the late 60s and defrauded hundreds of companies out of $100’s of thousands …