Phish Testing

CyberHoot: Phishing Attacks

Spotting and Avoiding Phishing Attacks This foundational CyberHoot video teaches critical skills to identify phishing attacks. Viewers learn the most common phishing patterns and simple, effective questions to quickly spot …

Become More Aware Become More Secure

CyberHoot: An Introduction to our Platform

Welcome to CyberHoot’s cyber literacy 101 core curriculum videos.  This introductory video introduces end users to cyber security in the 21st century.  It examines who is attacking us, using what …

CyberHoot – Two-Factor Authentication – What is it and why is it Important?

CyberHoot: Two-Factor Authentication (2FA)

What is 2FA and why is it Important? This video is part of CyberHoot’s foundational cyber literacy 101 video program.  It focuses on two-factor (aka: multi-factor) authentication. Two-Factor Authentication (2FA) …

PCI Compliance 101 training video

PCI Compliance Training

Payment Card Industry (PCI) compliance is important for all businesses that deal with credit cards. PCI compliance standards require businesses to handle customer’s credit card information in a secure manner. …

Chip and Pin Benefits Video Training

Chip and Pin Benefits Training

All credit and debit cards are now being made with “a computer that is 1/4 the size of a postage stamp” this technology we know as a chip card. Chip …

PCI DSS Compliance video training

PCI DSS Training

PCI DSS stands for Payment Card Industry Data Security Standard. This is the standard that all organizations must follow if they are processing cardholder data. If an organization or business …

Tokenization explained in training video

Tokenization

Tokenization is a way for credit card information (also called the Primary Account Number or PAN) to not be used in credit card processing transactions and instead replaced with a …

How to create a strong passphrase training

How to Create a Strong Passphrase

This 3-minute video outlines how to create strong passphrases by using at least five (5) discrete words that are changed slightly so that they are not spelled exactly as the …

How to Protect Yourself From Malware

How to Protect Yourself From Malware

This short 3 min video outlines how to combat malware by preventing it from being installed in the first place.  It outlines how to keep computer security up-to-date with patching, …

Confessions of a CyberSpy Hunter

Confessions of a CyberSpy Hunter

This 20 minute Ted Talk discusses how a hidden cyberwar is being perpetrated for the past 2 decades online not with bullets and bombs but rather with bits and bytes.  …

Digital Forensics Explained

Digital Forensics Explained

  This 16 minute Ted talk outlines the work of a digital forensics investigator.  He describes his work as the collection, analysis, and reporting of electronic data that is preserved …

How to set up a DMARC record

How to setup a DMARC record

This video outlines the steps you need to take to setup your DMARC and DKIM email records in the Domain Name System (DNS) in order to protect your domain online …

Insider Threat 201

Insider Threat 201

https://www.youtube.com/embed/5XbSNeVsQYcThis video covers the most common types of insiders who threaten your business.  From a non-malicious but accidental disclosure of confidential information (a mistake) to a malicious or purposeful sale …

What is Business Email Compromise?

What is Business Email Compromise?

Watch this video on YouTube The FBI claims that over 50% of the 6 Trillion dollars lost to hackers and businesses is due to Business Email Compromise (aka: BEC).  That …

HIPAA Training 2019

HIPAA Training 2019

The Healthcare market is required to provide training on legislation that was passed over a decade ago and called the Health Insurance Portability and Accountability Act (HIPAA for short).  This …

Virtual Private Networks (VPN) Explained

Virtual Private Networks (VPN) Explained

A Virtual Private Network (VPN) is a way to create online privacy and anonymity by creating a private network from a public internet connection. A VPN will mask your internet protocol (IP) …

Two-Factor Authentication Explained (DUO)

Two-Factor Authentication Explained (DUO)

This Two-Factor Authentication vendor video outlines the importance of using Two-Factor Authentication (2FA) on all your critical and sensitive accounts.  It is a complementary video to the CyberHoot Core Curriculum …

Sextortion Explained in 30 Seconds

Sextortion Explained in 30 Seconds

In late 2017 and well into 2018 hackers were attempting to extort money from unsuspecting victims by presenting those targeted individuals with a password scraped off the Dark Web (from …

Basic ITAR Training Cyberhoot

Basic ITAR Training

The International Trade in Arms Regulations is Department of Defense requirements surrounding the import and export of 16 categories of “Defense Articles”.  This video outlines the requirements of businesses dealing …

Physical Check Fraud Protections

Physical Check Fraud Protections

Check fraud has been a problem since long before Frank Abignale bought his check printing press in the late 60s and defrauded hundreds of companies out of $100’s of thousands …