Blog > Page 2

Stay sharp with security insights

hCaptcha

hCaptcha

hCaptcha is a bot mitigation and anti-spam service that helps websites distinguish between real human users and...

Read more
Quishing

Quishing

Quishing is a type of phishing attack that targets users via QR codes. Attackers create malicious QR codes that,...

Read more
Malvertising

Malvertising

Malvertising is short for malicious advertising. It refers to the use of online ads to deliver malware to...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Privacy-Enhancing Computation (PEC)

Privacy-Enhancing Computation (PEC)

Privacy-Enhancing Computation (PEC) refers to a set of technologies and methods that allow organizations to...

Read more
Clear Text

Clear Text

Clear Text (or plaintext) is data that is stored or transmitted without any form of encryption or obfuscation. In...

Read more
Privileged Access Management (PAM)

Privileged Access Management (PAM)

Privileged Access Management (PAM) is a cybersecurity framework and set of tools designed to secure, manage, and...

Read more
Identity Management (IDM)

Identity Management (IDM)

Identity Management (IDM) is the framework of policies, processes, and technologies used to ensure the right...

Read more
Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more
Advisory: CISA Issues Emergency Directive for Critical Microsoft Exchange Flaw

Advisory: CISA Issues Emergency Directive for Critical Microsoft Exchange Flaw

Overview The Cybersecurity and Infrastructure Security Agency (CISA), acting as the U.S. government's cyber...

Read more
Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more
Shoot the Hoot with CyberHoot …RAW – Episode 8

Shoot the Hoot with CyberHoot …RAW – Episode 8

Welcome to Shoot the Hoot…RAW! Welcome back to Episode 8 of Shoot the Hoot—the weekly livestream hosted by...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."
Cris White, cyberSuite, Head of Cyber Advisory
"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Jeremy Treister, CMIT Solutions of Chicago Downtown, President
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner