Become More Aware Become More Secure

CyberHoot: An Introduction to our Platform

Welcome to CyberHoot’s cyber literacy 101 core curriculum videos.  This introductory video introduces end users to cyber security in the 21st century.  It examines who is attacking us, using what …

CyberHoot – Two-Factor Authentication – What is it and why is it Important?

CyberHoot: Two-Factor Authentication (2FA)

What is 2FA and why is it Important? This video is part of CyberHoot’s foundational cyber literacy 101 video program.  It focuses on two-factor (aka: multi-factor) authentication. Two-Factor Authentication (2FA) …

Protect Your Business from Zero-Day Exploits:

Learn how to protect your business from zero-day exploits like those recently used by Chinese hackers targeting U.S. internet providers. Discover key cybersecurity strategies to stay ahead of emerging threats.

New Qilin Ransomware Attack

Learn how to protect your organization from the new Qilin ransomware attack, which exploits VPN vulnerabilities. Discover essential tips for strengthening your cybersecurity defenses and preventing ransomware threats

NPD Breach Exposes 3 Billion Personal Records

Discover the extensive impact of the NPD breach that exposed 3 billion personal records, underscoring significant privacy risks and highlighting essential steps for safeguarding personal information against identity theft and cyber fraud.

Top 10 Cyber Attacks and How to Respond

Discover the top 10 cyber attacks. Learn how to identify the attacks through scenarios and then take steps to mitigate the damage and protect your business and data from harm.

The Evolving Kill Chain (On-Premise vs. SaaS)

Learn how to protect your business from the evolving SaaS kill chain by understanding the stages of cyber attacks, or kill chain links, and the nuances of on-premise vs. SaaS models of the kill-chain.

Advanced Phishing Tactics: A Hacker’s Playbook

Discover the latest phishing tactics targeting unsuspecting victims, including Cloudflare Workers, HTML smuggling, and AI-generated emails. Learn how cybercriminals bypass security measures and how you can protect yourself from these sophisticated attacks. Stay informed and stay safe in the ever-evolving world of cybersecurity.

Why Ditching Passwords is the Future of Online Security

For over 40 years, passwords have been the cornerstone of computer security, despite their many flaws. People turned to password managers to simplify and secure their login processes. Now, passkeys are set to revolutionize how we secure our online identities. Unlike traditional passwords, passkeys eliminate many common security risks, making them a crucial advancement everyone should understand. This article will explain what passkeys are, how they work, and why they represent the future of identity management online.

The Evolution of Phishing: SMS and Voice-Based Attacks

The recent sophisticated breach of Microsoft Executive emails is a stark reminder that all of us can be targeted with phishing and social engineering attacks and need to prepare by training, testing, and governing employees on Cyber Literacy.

Five Easy Steps to Boost Your Cybersecurity

The recent sophisticated breach of Microsoft Executive emails is a stark reminder that all of us can be targeted with phishing and social engineering attacks and need to prepare by training, testing, and governing employees on Cyber Literacy.

Privileged Access Management

Bridging the Gap: Superuser Protection for SMBs and MSPs

Superuser accounts in small to medium-sized businesses (SMBs) and managed service providers (MSPs) face unique cybersecurity challenges. Bridging the gap between Privileged Access Management (PAM) and Identity Management (IdM) is critical for comprehensive protection. Effective cybersecurity for SMBs and MSPs requires tailored strategies that are practical, cost-effective, and straightforward to implement. This includes establishing clear governance policies, regular employee training, risk assessments, and implementing essential technical defenses to enhance overall security posture and protect sensitive data.