Welcome to CyberHoot’s August Newsletter!
This month, we’re tackling the latest cybersecurity threats that hit you where it matters most: your devices, your data, and your business.
We’re diving into Microsoft’s new Token Protection feature and how it’s preventing BEC attacks by stopping token theft in its tracks. We’ll also take a hard look at why MSPs are the new favorite target for cybercriminals and how we can fortify our defenses to fight back. Plus, we’re giving you the lowdown on SIM swapping attacks and showing you exactly how to protect your phone from becoming a hacker’s gateway.
Let’s jump in!
Got Questions? Let’s Talk.
If you’d like to dive deeper into anything we’ve covered—or talk cybersecurity strategy, compliance, or training—our CEO Craig Taylor is making time for one-on-one sessions with our subscribers.
It’s a rare chance to pick the brain of a seasoned cybersecurity leader. You can schedule a session directly below.
Discover how Microsoft’s new Token Protection feature helps prevent Business Email Compromise (BEC) by stopping token theft attacks.
Stay tuned for Part 2 on Tues. Aug. 19th, when we outline critical implementation measures to help ensure the highest probability of success during rollout.
MSPs are becoming cybercriminals’ favorite snack. Here’s why and how cybersecurity pros can fight back with smart, layered defenses.
Protect your phone from SIM swapping attacks. Learn how to lock your SIM, enable 2FA, and use your carrier tools to stop hackers.
Liking CyberHoot? We need your help. Please leave us a review using the links below!
TrustPilot.com | G2.com | Capterra.com | Google.com | TrustRadius.com | Gartner.com
–TrustPilot
For more information on how to leave a CyberHoot review, please watch the brief video overviews below. Note: to avoid fraudulent reviews, each review website will require to you to create and validate your identity through an email account registration process.
Business Email Compromise (BEC)
Business Email Compromise (BEC) is when an email account, often in a company’s finance department, is broken into and controlled by a hacker. This is often accomplished through a phishing attack that leads to credential theft as outlined in CyberHoot’s article titled the ‘Domino Attack’. Credentials are stolen when a victim clicks on a fraudulent phishing email link or opens a fake invoice. Doing this brings the victim to a malicious but believable website identical to the real vendor’s website, that prompts the user to enter their email and password. BEC attacks often come from someone your CFO already knows, meaning the sending email address is actually correct and expected. It usually turns out that the other finance person’s email has been compromised by hackers who are now targeting your financial officers. Thus the domino’s continue to fall company by company.
General Release Notes
CyberHoot’s new ChatBot Self-Service Support is now live, providing 24×7 assistance directly inside the Admin Interface and on our CyberHoot website. Located at the bottom right of your screen, this intelligent support tool helps you find answers instantly, troubleshoot issues, and access resources without waiting for a live agent. If you need additional help, you can always reach our live support team at support@cyberhoot.com.
Enroll in CyberHoot’s Referral Program today and start earning a 20% share of all revenue generated for one year by those who register through your exclusive referral link. As a referral partner, not only will you receive financial rewards, but you’ll also experience the satisfaction of aiding others in becoming more security-conscious, safeguarding them against cyber threats. Don’t hesitate, sign up now at https://cyberhoot.com/referral-program/.
Referral through Autopilot’s Dashboard:
Join CyberHoot in our mission to create a more aware and better secured world! Recommend CyberHoot Autopilot to a friend, and they will enjoy a complimentary first month. For every new sign up who uses your referral link, you will receive a free month added to your account. This offer is exclusively for first-time CyberHoot registrants.
Know someone who had a close call recently with a cyber attack, phishing email, or social engineering phone call? Recommend CyberHoot’s free Cyber Literacy 101 training. They’ll receive six (6) videos (each video is 3-4min.) and one of our positive reinforcement, hyper-realistic, phishing simulations. All for free.
Registration: https://cyberhoot.com/individuals
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
For years, organizations have relied on fake email phishing simulations to measure employee resilience to...
Read moreWelcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...
Read more"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.