Blog > Page 24

Stay sharp with security insights

LastPass Corporate Network Breach – What You Should Know

LastPass Corporate Network Breach – What You Should Know

Mon. Aug. 29th Update: CyberHoot isn't the only one to caution about throwing the Baby out with the Bath Water...

Read more
HowTo: Complete an Assignment-based Phishing Test

HowTo: Complete an Assignment-based Phishing Test

This video provides end users with a quick overview in 2 min. of their Phishing Test by Assignment service.  End...

Read more
DeepFake Porn:  95% of Online DeepFake Media is Porn

DeepFake Porn: 95% of Online DeepFake Media is Porn

CyberHoot monitors for trends in attacks whether against organizations or individuals. Recently we learned of a...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

CyberHoot Newsletter – August 2022

CyberHoot Newsletter – August 2022

Remote Worker Security and ProductivityThe 2020 Coronavirus...

Read more
CyberHoot Newsletter – July 2022

CyberHoot Newsletter – July 2022

Restaurant Cloud-based POS Systems Hacked Multiple POS systems used by restaurants all over...

Read more
Restaurant Ordering Platforms Targeted By Hackers

Restaurant Ordering Platforms Targeted By Hackers

Secure your business with CyberHoot Today!!! Sign Up Now Customers from over 300 restaurants' had...

Read more
Security Advisory: Critical Patches in Adobe and Microsoft Products

Security Advisory: Critical Patches in Adobe and Microsoft Products

CyberHoot Vulnerability Alert Management Process (VAMP) Rating: Critical/Red July 19th, 2022:...

Read more
1 Billion Records Exposed in Chinese Data Leak

1 Billion Records Exposed in Chinese Data Leak

Secure your business with CyberHoot Today!!! Sign Up Now China has landed in the middle of one of the...

Read more
Time-To-Live (TTL)

Time-To-Live (TTL)

Secure your business with CyberHoot Today!!! Sign Up Now Time-To-Live (TTL) is a value for the period...

Read more
Call Admission Control (CAC)

Call Admission Control (CAC)

Secure your business with CyberHoot Today!!! Sign Up Now Call Admission Control (CAC) is the method...

Read more
Voice Firewall

Voice Firewall

Source: Mobileum Secure your business with CyberHoot Today!!! Sign Up Now A Voice Firewall...

Read more
Traceroute

Traceroute

Secure your business with CyberHoot Today!!! Sign Up Now Traceroute is a network diagnostic tool used...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO
"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director