Social Engineering 101
This 2-minute video outlines how social engineers manipulate people in social settings to gain information on how to hack systems and steal valuable information. The video outlines various methods social …
This 2-minute video outlines how social engineers manipulate people in social settings to gain information on how to hack systems and steal valuable information. The video outlines various methods social …
Spotting and Avoiding Phishing Attacks This foundational CyberHoot video teaches critical skills to identify phishing attacks. Viewers learn the most common phishing patterns and simple, effective questions to quickly spot …
A Hardware Security Module (HSM) is a physical security device that safeguards and manages digital keys, performs encryption and decryption services, strong authentication, and often have tamper detection and prevention built …
Educational institutions are easy marks for hackers peddling ransomware. They have lots of critical student and employee data, small cybersecurity budgets, and don’t train students or faculty how to spot and avoid common cyber-attacks. Combined with an ability to pay ransoms either through cyber-insurance coverage or city coffers, and they have a perfect cyberattacks bullseye on them!
Payment Card Industry (PCI) compliance is important for all businesses that deal with credit cards. PCI compliance standards require businesses to handle customer’s credit card information in a secure manner. …
In the NICE Workforce Framework, Education and Training in cybersecurity work is where a person conducts training of personnel within pertinent subject domains. Additionally, this individual develops, plans, coordinates, delivers, …
All credit and debit cards are now being made with “a computer that is 1/4 the size of a postage stamp” this technology we know as a chip card. Chip …
PCI DSS stands for Payment Card Industry Data Security Standard. This is the standard that all organizations must follow if they are processing cardholder data. If an organization or business …
Tokenization is a way for credit card information (also called the Primary Account Number or PAN) to not be used in credit card processing transactions and instead replaced with a …
This video outlines the common WiFi security risks unsuspecting public wifi users are liable to face. This 3 min video outlines steps to protect yourself on public wifi including verifying …
This video documents what the Wannacry ransomware virus did to companies and individuals throughout the world in the summer of 2017. This video outlines how the US’s own National Security …
This video provides a very good overview of LastPass password manager and its various features from secure password generation to storing credentials for websites, to storing encrypted Secure Notes. If …
This 3 minute video by the Government of Canada outlines how phishing occurs online. Problems online occur when you are phished and turn over account numbers, passwords, or other critical …
This 3-minute video outlines how to create strong passphrases by using at least five (5) discrete words that are changed slightly so that they are not spelled exactly as the …
This short 3 min video outlines how to combat malware by preventing it from being installed in the first place. It outlines how to keep computer security up-to-date with patching, …
https://www.youtube.com/embed/5XbSNeVsQYcThis video covers the most common types of insiders who threaten your business. From a non-malicious but accidental disclosure of confidential information (a mistake) to a malicious or purposeful sale …
Watch this video on YouTube The FBI claims that over 50% of the 6 Trillion dollars lost to hackers and businesses is due to Business Email Compromise (aka: BEC). That …
This Two-Factor Authentication vendor video outlines the importance of using Two-Factor Authentication (2FA) on all your critical and sensitive accounts. It is a complementary video to the CyberHoot Core Curriculum …
In late 2017 and well into 2018 hackers were attempting to extort money from unsuspecting victims by presenting those targeted individuals with a password scraped off the Dark Web (from …
The International Trade in Arms Regulations is Department of Defense requirements surrounding the import and export of 16 categories of “Defense Articles”. This video outlines the requirements of businesses dealing …
The first data privacy legislation was passed by the European Union and called the General Data Privacy Regulation (GDPR) back in 2017. In Jan. 2019, California is following suite with …
Payment Card Industry Data Security Standards, aka: PCI Compliance is a creation of the four major Credit Card Brands including Visa, Mastercard, American Express, and Discover. Together they published data …
This video dives into password managers and how they protect your most critical and sensitive data – your passwords. This video explains some of the more sophisticated protections provided by …