Shoot the Hoot with CyberHoot …RAW – Episode 5

1st July 2025 | Shoot the Hoot Shoot the Hoot with CyberHoot …RAW – Episode 5

Welcome to Shoot the Hoot…RAW!

Welcome back to Episode 5 of Shoot the Hoot—the weekly livestream hosted by Chuck Taylor, Co-Founder and Lead Developer at CyberHoot. If you think firewalls and fancy tools are all you need to stay secure, this episode might hurt a little (in the best way).

This week, we’re diving headfirst into one of the hardest truths in cybersecurity: your biggest risk isn’t your tech—it’s your people. But here’s the twist… they’re also your greatest defense.

Chuck’s breaking down a real-world horror story that proves it, explaining exactly what went wrong, and showing you how to build a human firewall that actually holds up.

Still raw. Still real. Still 100% for the MSP community.

🛫 Today’s Flight Plan:

🦉 Human Error Horror Story – A true tale of what happens when training gets ignored
🦉 Breakdown + Fixes – What went wrong, why it matters, and how to stop it from happening to you
🦉 Nerd Update – What’s new, what’s changing, and what’s (maybe) breaking
🦉 Live Q&A – Chuck answers your questions with zero sugarcoating

If you’ve ever thought “That won’t happen to us,” this one’s for you.

No fluff. No filters. Just real talk for real MSPs.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Your Clients’ Routers Are Now a National Security Conversation

Why Your Clients’ Routers Are Now a National Security Conversation

You now have five important reasons to start a router security conversation with your small business clients this...

Read more
Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

OAuth tokens don't expire when employees leave, passwords change, or apps go rogue. Your security program needs...

Read more
Attackers Don’t Need a Key. They Already Have Yours.

Attackers Don’t Need a Key. They Already Have Yours.

Most breaches don't start with a hacker in a hoodie cracking code at 3am. They start with your username and a...

Read more