Computer Emergency Response Team (CERT)

21st February 2020 | Cybrary Computer Emergency Response Team (CERT)


A Computer Emergency Response Team (CERT) is a group of security experts who respond to cybersecurity incidents. These teams work on many unique cybersecurity incidents involving malware, viruses, and cyber attacks on businesses. The work of a CERT encompasses a wide variety of security activities aimed at preventing and minimizing cyberattacks from wherever they originate. CERT teams focus on cybersecurity problems, attacks heuristics, and communicate their investigations to the broader population of consumers. In this sense a CERT team is like a honeypot, advising the rest of us about attack methods, developments, and evolutions.

Lastly, CERT teams can exist within large enterprises, cybersecurity focused service providers, individual nation states, and cooperating groups of nation states. Examples of CERT organizations include: US CERT, FIRST.org, and Australia’s CERT Organization.

Source: Techopedia

Related Terms: Malware, Trojan Horse, Virus

Related Reading:

US Issues Cybersecurity Warnings Over Flawed Medical Devices

Wikipedia – Computer Emergency Response Teams

As an SMB Owner, What should I do about CERT Organizations?

It is always a good idea to subscribe to an organization like a CERT or Cybersecurity entity (CyberHoot) who can keep you informed about emerging threats, critical vulnerabilities, and attack vectors you might face as an SMB owner. Subscribe to the US CERT for their advisories and to CyberHoot Newsletters, to stay on top of the latest cybersecurity threats we all face.

To learn more about CERT, watch this short video

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Cyberattacks usually start with phishing emails or weak passwords. This one did not. Security researchers...

Read more
Cybersecurity Leader Uploads Sensitive Files to AI

Cybersecurity Leader Uploads Sensitive Files to AI

Not surprising when Trouble Ensues Last summer, the interim head of a major U.S. cybersecurity agency uploaded...

Read more
Common Google Workspace Security Gaps

Common Google Workspace Security Gaps

And How to Fix Them Let me make an educated guess. You moved to Google Workspace because it was supposed to...

Read more