CyberHoot: The Many Benefits of a Password Manager
In the 20th century, the ability to Type on a keyboard was viewed as a critical skill in the workplace. While you did not have to type 200 words per …
CyberHoot Videos Used in the Training Platform.
In the 20th century, the ability to Type on a keyboard was viewed as a critical skill in the workplace. While you did not have to type 200 words per …
This 2-minute video outlines how social engineers manipulate people in social settings to gain information on how to hack systems and steal valuable information. The video outlines various methods social …
Payment Card Industry (PCI) compliance is important for all businesses that deal with credit cards. PCI compliance standards require businesses to handle customer’s credit card information in a secure manner. …
All credit and debit cards are now being made with “a computer that is 1/4 the size of a postage stamp” this technology we know as a chip card. Chip …
PCI DSS stands for Payment Card Industry Data Security Standard. This is the standard that all organizations must follow if they are processing cardholder data. If an organization or business …
Tokenization is a way for credit card information (also called the Primary Account Number or PAN) to not be used in credit card processing transactions and instead replaced with a …
Spotting and Avoiding Phishing Attacks This CyberHoot core curriculum and BootCamp video outlines the common attack patterns found in phishing attacks and provides the viewer with a clear set of …
This video outlines the common WiFi security risks unsuspecting public wifi users are liable to face. This 3 min video outlines steps to protect yourself on public wifi including verifying …
This video documents what the Wannacry ransomware virus did to companies and individuals throughout the world in the summer of 2017. This video outlines how the US’s own National Security …
This video provides a very good overview of LastPass password manager and its various features from secure password generation to storing credentials for websites, to storing encrypted Secure Notes. If …
This 3 minute video by the Government of Canada outlines how phishing occurs online. Problems online occur when you are phished and turn over account numbers, passwords, or other critical …
This 3-minute video outlines how to create strong passphrases by using at least five (5) discrete words that are changed slightly so that they are not spelled exactly as the …
This short 3 min video outlines how to combat malware by preventing it from being installed in the first place. It outlines how to keep computer security up-to-date with patching, …
This video explains how the Foreign Intelligence Surveillance Act (FISA) system works and is fulfilled law enforcement with checks and balances by the FBI, senior leadership at the FBI, the …
This 20 minute Ted Talk discusses how a hidden cyberwar is being perpetrated for the past 2 decades online not with bullets and bombs but rather with bits and bytes. …
This 12 minute Ted Talk outlines how the IoT is making investigations easier. Digital forensics looks for a trail of electronic evidence from the research on how to perform a …
This 16 minute Ted talk outlines the work of a digital forensics investigator. He describes his work as the collection, analysis, and reporting of electronic data that is preserved …
This video outlines the steps you need to take to setup your DMARC and DKIM email records in the Domain Name System (DNS) in order to protect your domain online …
This 5 minute video outlines how Password Managers can make your life easier. It starts by illustrating some of the many ways people fail security such as reusing easy to …
What happens when you sit down at your computer in the morning after a long vacation or jury duty or maternity/paternity leave and you can’t remember the password you were …
What happens when you sit down at your computer in the morning after a long vacation or jury duty or maternity/paternity leave and you can’t remember the password you were …
LastPass lives in your browser as an extension. It sits in the background monitoring your logins to each website based upon the domain name you’re visiting. If it finds a …
The LastPass password manager is a security and productivity tool for the 21st century. Watching this video helps the new password manager user understand the tool and its capabilities with …
The first thing you need to learn with LastPass, or any password manager, is how it saves your online identities (usernames and passwords) into the secure database. This LastPass video …
One of the more difficult tasks associated with strong password hygiene is creating strong passwords. This 1 minute video from LastPass outlines the valuable secure password generator available from within …
This 1 minute video outlines how to create secure encrypted note cards within LastPass. These notecards are useful for secure password storage on encrypted Office documents and excel files as …
https://www.youtube.com/embed/5XbSNeVsQYcThis video covers the most common types of insiders who threaten your business. From a non-malicious but accidental disclosure of confidential information (a mistake) to a malicious or purposeful sale …
Watch this video on YouTube This Fox News special outlines an alert posted by Twitter about hacker attacks, possibly from nation-states, on user’s social media accounts. The security analysts remind …
Watch this video on YouTube Computer security in the 21st century isn’t solely about password hygiene and phishing attacks. It must also include physical security training to guide employees on …
Computer security in the 21st century isn’t solely about password hygiene and phishing attacks. It must also include physical security training to guide employees on how to maintain a secure …
Watch this video on YouTube Hospitals must train all their employees on how to remain safe while performing their healthcare job responsibilities. From safely lifting patients to dealing with universal …
Watch this video on YouTube The FBI claims that over 50% of the 6 Trillion dollars lost to hackers and businesses is due to Business Email Compromise (aka: BEC). That …
This CyberHoot core curriculum and BootCamp video begins with an introduction to the CyberHoot platform. Then the video segways into examining who is attacking us (common Hacker archetypes) and what …
This CyberHoot core curriculum and BootCamp video summarizes the importance of Passwords and Passphrases and why the human mind is not well suited to memorizing and recalling complex strong and …
The Healthcare market is required to provide training on legislation that was passed over a decade ago and called the Health Insurance Portability and Accountability Act (HIPAA for short). This …
A Virtual Private Network (VPN) is a way to create online privacy and anonymity by creating a private network from a public internet connection. A VPN will mask your internet protocol (IP) …
How to Reduce your WiFi Risks This CyberHoot core curriculum and BootCamp video outlines the three most common ways hackers attack wifi connections and what individuals should do to protect …
This Two-Factor Authentication vendor video outlines the importance of using Two-Factor Authentication (2FA) on all your critical and sensitive accounts. It is a complementary video to the CyberHoot Core Curriculum …
In late 2017 and well into 2018 hackers were attempting to extort money from unsuspecting victims by presenting those targeted individuals with a password scraped off the Dark Web (from …
The International Trade in Arms Regulations is Department of Defense requirements surrounding the import and export of 16 categories of “Defense Articles”. This video outlines the requirements of businesses dealing …
What is 2FA and why is it Important? This CyberHoot core curriculum and Bootcamp video focuses on two-factor authentication (aka: 2FA). Two-factor authentication is the gold standard for securely authenticating …
The first data privacy legislation was passed by the European Union and called the General Data Privacy Regulation (GDPR) back in 2017. In Jan. 2019, California is following suite with …
Check fraud has been a problem since long before Frank Abignale bought his check printing press in the late 60s and defrauded hundreds of companies out of $100’s of thousands …
Payment Card Industry Data Security Standards, aka: PCI Compliance is a creation of the four major Credit Card Brands including Visa, Mastercard, American Express, and Discover. Together they published data …
This video dives into password managers and how they protect your most critical and sensitive data – your passwords. This video explains some of the more sophisticated protections provided by …