Computer Emergency Response Team (CERT)

21st February 2020 | Cybrary Computer Emergency Response Team (CERT)


A Computer Emergency Response Team (CERT) is a group of security experts who respond to cybersecurity incidents. These teams work on many unique cybersecurity incidents involving malware, viruses, and cyber attacks on businesses. The work of a CERT encompasses a wide variety of security activities aimed at preventing and minimizing cyberattacks from wherever they originate. CERT teams focus on cybersecurity problems, attacks heuristics, and communicate their investigations to the broader population of consumers. In this sense a CERT team is like a honeypot, advising the rest of us about attack methods, developments, and evolutions.

Lastly, CERT teams can exist within large enterprises, cybersecurity focused service providers, individual nation states, and cooperating groups of nation states. Examples of CERT organizations include: US CERT, FIRST.org, and Australia’s CERT Organization.

Source: Techopedia

Related Terms: Malware, Trojan Horse, Virus

Related Reading:

US Issues Cybersecurity Warnings Over Flawed Medical Devices

Wikipedia – Computer Emergency Response Teams

As an SMB Owner, What should I do about CERT Organizations?

It is always a good idea to subscribe to an organization like a CERT or Cybersecurity entity (CyberHoot) who can keep you informed about emerging threats, critical vulnerabilities, and attack vectors you might face as an SMB owner. Subscribe to the US CERT for their advisories and to CyberHoot Newsletters, to stay on top of the latest cybersecurity threats we all face.

To learn more about CERT, watch this short video

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

OAuth tokens don't expire when employees leave, passwords change, or apps go rogue. Your security program needs...

Read more
Attackers Don’t Need a Key. They Already Have Yours.

Attackers Don’t Need a Key. They Already Have Yours.

Most breaches don't start with a hacker in a hoodie cracking code at 3am. They start with your username and a...

Read more
Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Article Updates: As of May 6th 2026, every major U.S. AI lab, including Google DeepMind, Microsoft, xAI,...

Read more