Ransomware attack in Richmond Michigan Schools

Michigan School District Shut Down by Ransomware – Why Educational Institutions are Prime Targets

Educational institutions are easy marks for hackers peddling ransomware. They have lots of critical student and employee data, small cybersecurity budgets, and don’t train students or faculty how to spot and avoid common cyber-attacks. Combined with an ability to pay ransoms either through cyber-insurance coverage or city coffers, and they have a perfect cyberattacks bullseye on them!

January 3rd, 2020

Social engineering training video

Social Engineering 101

This 2-minute video outlines how social engineers manipulate people in social settings to gain information on how to hack systems and steal valuable information.  The video outlines various methods social …

December 26th, 2019

PCI Compliance 101 training video

PCI Compliance Training

Payment Card Industry (PCI) compliance is important for all businesses that deal with credit cards. PCI compliance standards require businesses to handle customer’s credit card information in a secure manner. …

December 26th, 2019

Education and Training

In the NICE Workforce Framework, Education and Training in cybersecurity work is where a person conducts training of personnel within pertinent subject domains. Additionally, this individual develops, plans, coordinates, delivers, …

December 26th, 2019

Encrypt

Encrypt is the generic term encompassing encipher and encode, which means to convert plaintext to ciphertext by means of a code. This is done to protect important information from being …

December 26th, 2019

Indicator

An indicator is an occurrence or sign that an incident may have occurred or may be in progress. Related Term: Precursor Source: CNSSI 4009, NIST SP 800-61 Rev 2 (DRAFT), …

December 24th, 2019

Risk Transfer for Risk Mitigation

Risk Transfer

Risk Transfer is referring to the transferring of risk. When mitigating risk, we are looking for ways to deal with the risk that is presented to us. Transferring risk is …

December 20th, 2019

Chip and Pin Benefits Video Training

Chip and Pin Benefits Training

All credit and debit cards are now being made with “a computer that is 1/4 the size of a postage stamp” this technology we know as a chip card. Chip …

December 18th, 2019

PCI DSS Compliance video training

PCI DSS Training

PCI DSS stands for Payment Card Industry Data Security Standard. This is the standard that all organizations must follow if they are processing cardholder data. If an organization or business …

December 18th, 2019

Tokenization explained in training video

Tokenization

Tokenization is a way for credit card information (also called the Primary Account Number or PAN) to not be used in credit card processing transactions and instead replaced with a token. …

December 18th, 2019

Phish Testing

CyberHoot: Phishing Attacks

Spotting and Avoiding Phishing Attacks This CyberHoot core curriculum and BootCamp video outlines the common attack patterns found in phishing attacks and provides the viewer with a clear set of …

December 17th, 2019

LastPass Overview 2017 Training Video

LastPass Overview 2017

This video provides a very good overview of LastPass password manager and its various features from secure password generation to storing credentials for websites, to storing encrypted Secure Notes.  If …

December 17th, 2019

Phish Testing

How to Protect Yourself from Phishing Attacks

This video details what could happen if you follow criminals suggested actions and logged into their spoofed website and lost your credentials or installed malware on your computer by running …

December 17th, 2019

Phish Testing

Phishing Training

This 3 minute video by the Government of Canada outlines how phishing occurs online. Problems online occur when you are phished and turn over account numbers, passwords, or other critical …

December 17th, 2019

How to create a strong passphrase training

How to Create a Strong Passphrase

This 3 minute video outlines how to create strong passphrases by using at least five (5) discrete words that are changed slightly so that they are not spelled exactly as …

December 17th, 2019

How to Protect Yourself From Malware

How to Protect Yourself From Malware

This short 3 min video outlines how to combat malware by preventing it from being installed in the first place.  It outlines how to keep computer security up-to-date with patching, …

December 17th, 2019

Insider Threat 201

Insider Threat 201

https://www.youtube.com/embed/5XbSNeVsQYcThis video covers the most common types of insiders who threaten your business.  From a non-malicious but accidental disclosure of confidential information (a mistake) to a malicious or purposeful sale …

September 30th, 2019

What is Business Email Compromise?

What is Business Email Compromise?

The FBI claims that over 50% of the 6 Trillion dollars lost to hackers and businesses is due to Business Email Compromise (aka: BEC).  That staggering statistic is what this …

September 30th, 2019

Two-Factor Authentication Explained (DUO)

Two-Factor Authentication Explained (DUO)

This Two-Factor Authentication vendor video outlines the importance of using Two-Factor Authentication (2FA) on all your critical and sensitive accounts.  It is a complementary video to the CyberHoot Core Curriculum …

September 30th, 2019

Sextortion Explained in 30 Seconds

Sextortion Explained in 30 Seconds

In late 2017 and well into 2018 hackers were attempting to extort money from unsuspecting victims by presenting those targeted individuals with a password scraped off the Dark Web (from …

September 30th, 2019

Basic ITAR Training Cyberhoot

Basic ITAR Training

The International Trade in Arms Regulations is Department of Defense requirements surrounding the import and export of 16 categories of “Defense Articles”.  This video outlines the requirements of businesses dealing …

September 30th, 2019

An overview of PCI Compliance

An Overview of PCI Compliance

Payment Card Industry Data Security Standards, aka: PCI Compliance is a creation of the four major Credit Card Brands including Visa, Mastercard, American Express, and Discover.  Together they published data …

September 30th, 2019