Your business’ toughest competition might be criminal. See why.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    ebooks
    ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
3 Hot Takes and Tips for Cybersecurity Awareness Month 2023
Published:
October 10, 2023

3 Hot Takes and Tips for Cybersecurity Awareness Month 2023

By:
Lily Lewis
Contributors:
Special thanks to our Contributors:
Dray Agha
Sharon Martin
Joe Slowik
Ethan Tancredi
Henry Washburn
Share icon
Glitch effectGlitch effectGlitch effect


Happy National Cybersecurity Awareness Month! In an era where it feels like threats are coming at us from all angles, it’s more crucial than ever to be vigilant and proactive in protecting your digital assets. Every October, this nationwide initiative—started by the U.S. Department of Homeland Security and the National Cyber Security Alliance—aims to raise awareness about the importance of cybersecurity and promote best practices for staying safe online.

While cybersecurity holds a certain significance during the month of October, we believe it’s a year-round initiative. In this blog post, we'll be sharing our most top-of-mind cybersecurity tips and trends to help you stay secure not only during this awareness month, but all year long.

Also fair warning: This isn’t your average “tips and tricks” roundup. Yes, there will be practical tips (it is Cybersecurity Awareness Month after all), but I’ve also included some hot takes that I hope provide just the right amount of spice.

Salt

1. Small Things Can Make a Big Difference

Sometimes, it’s the small things that can make the biggest impact—that’s definitely the case with measures like multi-factor authentication and password security. These are fundamental basics of security, but they don’t always get the attention they deserve.

Let's explore some of these crucial yet often overlooked measures and why you shouldn’t toss them aside so easily.


Multi-Factor Authentication (MFA)

SSOMFA - 2FA

MFA should be like Frank’s RedHot sauce—put that sh*t on everything. MFA adds an extra layer of protection by requiring two or more methods of authentication to verify your identity. This makes it harder for cybercriminals to access your accounts, even if they have your password.

Although MFA seems like a minor inconvenience for some, it's a simple yet powerful deterrent against cybercriminals.

For example, at Huntress, we see a ton of business email compromise (BEC) attacks that could have been thwarted if only more users had MFA. At this point, not enforcing MFA is like locking your door and taping your keys to the outside so that anyone can grab them.

Here are some tips to think about when enforcing MFA:

  • Implement it everywhere! MFA should be enabled for all critical applications and services—and this is a non-negotiable for any user with administrative power.
  • Instead of using text- or email-based authentication, opt for an authenticator app like Duo Mobile or Google Authenticator. These apps can generate a more secure code or even use your fingerprint or facial recognition to log in, which adds an extra layer and substantially reduces your risk.
MFA Quote

Access Control and Least Privilege

Implementing access control measures might seem like a small administrative task, but it's a simple way to set more secure controls around your networks, users, and devices. Here are some tips:

  • Consider using conditional access policies to increase security measures for suspicious or irregular login attempts. This includes things like blocking access for unknown or unsupported devices, or controlling access based on the network location to prevent users from logging in from countries they are not expected to be in.
  • Implement the principle of least privilege (POLP) in your organization. POLP means only giving employees the access they need to perform their job functions. Restricting access to sensitive data and systems reduces the risk of unauthorized access should a user’s account fall into the wrong hands.

Password Hygiene

While it may appear routine, managing passwords effectively is a linchpin of basic cybersecurity. Use these quick tips to strengthen your password security and avoid common password pitfalls:

  • Don’t use easily guessed passwords, such as “password” or “qwerty,” or ones that use personal information, user, or network names.
  • Do use unique passwords. Try out a passphrase or use different combinations of words, numbers, symbols, etc.
  • Don’t reuse passwords across multiple accounts or store them in easily accessible places (looking at you, sticky notes).
  • Do use a password manager to securely store and generate strong passwords for each of your accounts.

2.We Haven’t Solved EDR Yet

Traditional Antivirus vs Managed Antivirus - Blog Thumbnail

Ten years ago, Anton Chuvakin organized a handful of products into a group called “endpoint threat detection and response” during his time at Gartner. Since then, endpoint detection and response (EDR) has become a market-accepted category and mandatory capability by most cyber insurance underwriters today.

However, with the emergence of EDR came way too many *DR acronyms (MDR, XDR, the list goes on and on). This means many organizations are still grappling with the intricacies and figuring out which flavor of DR is right for them.

In the case of EDR, these are the most common challenges we are noticing:

Managing EDR: Some organizations struggle to manage their existing EDR solutions effectively, which can leave them overwhelmed and vulnerable to threats. EDR solutions are inherently noisy. Without the right resources, the effort it takes to manage EDR and its alerts can exceed the availability or expertise of the average in-house security team.  

Outsourcing EDR: Fully outsourcing EDR analysis, management, and maintenance can be cost-prohibitive. Some EDR vendors (but not all EDR vendors 😉) even put EDR management behind expensive tiers or add-ons. Consider the costs and benefits carefully of the tool or tier that you’re paying for.

Vendor Management: Be aware that vendors managing multiple products may have less agility and expertise compared to a team that fully owns and manages its own product.

Recommended Reading: Need help finding the right EDR solution for your business? Start with our EDR Buyer’s Guide.


3. Identity Is the Next Frontier to Protect

Let's face it: ransomware and endpoint security are old news—the new target for adversaries is your own personal identity.

identity02

Identity-based attacks using compromised credentials are continuing to surge, probably as a way to get around defensive measures like EDR. And what’s more, digital identities and profiles can be easily faked, especially with the advancement of AI, adding to the uncertainty.

As Joe Slowik puts it in this blog post, “Identity has become its own class of security.” Identity is something to be stolen, spoofed, or manipulated, especially in cases of business email compromise (BEC).

An example of this is invoice fraud, a common BEC tactic. This is when an attacker poses as a vendor and sends an invoice to an intended victim with their own account number. But attackers are upping their game with this tactic. They infiltrate the victim's account, set up rules to reroute incoming invoices to themselves, delete the originals to hide their tracks, and then tweak the invoices, replacing the legitimate account number with their own before sending them back to the victim.

Here are some ways you can stay vigilant against identity-based attacks and BEC:

  • We said it once, and we’ll say it again: enforce MFA on all accounts that offer it.
  • Scrutinize email addresses, URLs, and spelling in email correspondence, as scammers often use subtle variations to deceive their victims.
  • Avoid clicking on links or opening attachments in unsolicited emails, especially if they request sensitive information or immediate action.
  • Manually navigate to websites when entering personal information instead of following links from emails.
  • Verify any requests for payment or financial information with a phone call before taking any action.

Closing Thoughts

While National Cybersecurity Awareness Month reminds us that security is a collective responsibility, it should be at the forefront of your every decision. We hope these tips will help you stay informed about the latest threats and raise your cyber awareness—no matter the time of year.

Shoutout to Dray Agha, Joe Slowik, Kyle Hanslovan, Sharon Martin, Ethan Tancredi, and Henry Washburn for contributing their thoughts, tips, and hot takes to this blog post.

Categories
Cybersecurity Trends
Cybersecurity Education
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Top 4 Tips for Cybersecurity Awareness Month

    In honor of National Cybersecurity Awareness Month, here are four critical tips to help you take both your cybersecurity hygiene and knowledge up a notch.
  • One Order of Tips, Tricks & Hot Takes for Cybersecurity Awareness Month 2024

    Our hottest security tips, tricks, and opinions to kick this Cybersecurity Awareness Month off right.
  • So Fresh, So Clean: Huntress’ Top Cyber Hygiene Tips

    Secure your systems with these essential cyber hygiene tips, from using MFA to patching software and spotting phishing scams. Stay safe. Stay updated.
  • How To Speak To SMBs About Cybersecurity

    Need help approaching the security sales conversation? Use these tips to walk into your next client meeting armed with points for selling cybersecurity.
  • 36 Must-Know Password Statistics To Boost Cybersecurity (2026)

    The top password statistics might surprise you. Learn how common poor password hygiene is, plus tips for protecting your precious credentials better.
  • The Lamest Cybersecurity Tips We’re Tired of Hearing (and What to Do Instead)

    Tired of hearing the same old cybersecurity tips? Learn actionable, modern strategies to protect yourself and your organization from bad threat actors.
  • Let’s Be Offensive This Cybersecurity Awareness Month

    Over 20 years of Cybersecurity Awareness Month, and we’ve had enough. This October, Huntress is taking a new attitude with an offensive-minded approach to defense.
  • 9 Pro Tips for Better Endpoint Security

    Secure endpoints are critical to your cyber defenses. Here’s a list of endpoint security tips every IT and security professional should know.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy