Welcome to CyberHoot’s July Newsletter!
This month, we’re cutting through the noise and spotlighting the real threats that hit closest to home, literally and digitally.
We’re diving into how your smart home devices might be tracking your every move through WiFi motion detection and how to lock them down before they start judging your dance moves. We’re also breaking down a massive password leak, 184 million credentials exposed from a single misconfigured database, and what it means for your password hygiene.
And if you’re still relying on outdated training methods (punishing bad behaviors instead of rewarding good behaviors), it’s time to meet HootPhish: our smarter, positive rewards based phishing simulations, that actually engages users and trains them how to spot real-world attacks, and why that’s so important!
Let’s get into it.
Got Questions? Let’s Talk.
If you’d like to dive deeper into anything we’ve covered—or talk cybersecurity strategy, compliance, or training—our CEO Craig Taylor is making time for one-on-one sessions with our subscribers.
It’s a rare chance to pick the brain of a seasoned cybersecurity leader. You can schedule a session directly below.
Explore the hidden cybersecurity risks of WiFi motion detection and learn how to secure your smart home from privacy threats.
184 million passwords just leaked from an unsecured database. Find out how it happened and what it means for your personal password hygiene.
Train users to spot phishing threats with HootPhish. It’s fun, effective, and automated security awareness training that engages employee and changes behaviors.
Liking CyberHoot? We need your help. Please leave us a review using the links below!
TrustPilot.com | G2.com | Capterra.com | Google.com | TrustRadius.com | Gartner.com
For more information on how to leave a CyberHoot review, please watch the brief video overviews below. Note: to avoid fraudulent reviews, each review website will require to you to create and validate your identity through an email account registration process.
SIM Swapping is a term used when hackers steal a victims phone number and port or switch that number to a different SIM card in a different cell phone in a hacker’s possession. When the hacker has control of the phone number, they are able to gain access to emails, social media accounts, and even cryptocurrency accounts that are normally protected by SMS-based 2-factor authentication.
General Release Notes
Set up a HootPhish Challenge to Test your Phishing Knowledge in a Fun Game!
Enroll in CyberHoot’s Referral Program today and start earning a 20% share of all revenue generated for one year by those who register through your exclusive referral link. As a referral partner, not only will you receive financial rewards, but you’ll also experience the satisfaction of aiding others in becoming more security-conscious, safeguarding them against cyber threats. Don’t hesitate, sign up now at https://cyberhoot.com/referral-program/.
Referral through Autopilot’s Dashboard:
Join CyberHoot in our mission to create a more aware and better secured world! Recommend CyberHoot Autopilot to a friend, and they will enjoy a complimentary first month. For every new sign up who uses your referral link, you will receive a free month added to your account. This offer is exclusively for first-time CyberHoot registrants.
Know someone who had a close call recently with a cyber attack, phishing email, or social engineering phone call? Recommend CyberHoot’s free Cyber Literacy 101 training. They’ll receive six (6) videos (each video is 3-4min.) and one of our positive reinforcement, hyper-realistic, phishing simulations. All for free.
Registration: https://cyberhoot.com/individuals
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Ever had your phone suddenly lose service for no reason, followed by a flood of “reset your password”...
Read moreAs smart homes get smarter, so do their habits of watching, sensing, and reporting. Enter WiFi Motion Detection, a...
Read moreSpoiler alert: If you’re still using “password123” or “iloveyou” for your login… it’s time for an...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.