Blog > Page 33

Stay sharp with security insights

Mean Time To Respond (MTTR)

Mean Time To Respond (MTTR)

Mean Time To Respond (MTTR) is the average time required to return a system to operational condition...

Read more
CyberHoot Newsletter – December 2021

CyberHoot Newsletter – December 2021

Software as a Service (SaaS) Risks and ChallengesSoftware as a...

Read more
Malicious ‘Fleeceware’ App Downloaded 600M Times

Malicious ‘Fleeceware’ App Downloaded 600M Times

Google has tried to eliminate malicious apps from its Android platform on the Google Play...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Mean Time To Detect (MTTD)

Mean Time To Detect (MTTD)

Mean Time To Detect (MTTD), also known as Mean Time To Identify (MTTI), is one of the main key...

Read more
Software as a Service (SaaS) Risks and Challenges

Software as a Service (SaaS) Risks and Challenges

Software as a Service (SaaS) applications have transformed businesses over the last decade with...

Read more
Security Orchestration, Automation, and Response (SOAR)

Security Orchestration, Automation, and Response (SOAR)

Security Orchestration, Automation, and Response (SOAR) is a stack of compatible software programs...

Read more
Vulnerability Advisory: Apache Log Binary (Log4J)

Vulnerability Advisory: Apache Log Binary (Log4J)

Dec 22nd 2022: UPDATES to Log4j, Log4Shell vulnerability details CISA has just released a new advisory:...

Read more
Individual Training Confirmation

Individual Training Confirmation

Thank you for signing up with CyberHoot for your 'Individual' Cybersecurity Awareness Training. You will be...

Read more
Periodic Backups

Periodic Backups

For decades now, Periodic Backups have been used to backup and safeguard critical data. Periodic...

Read more
Job Scam Attack: Fake Offers and Checks

Job Scam Attack: Fake Offers and Checks

The pandemic has created new opportunities for social engineering attacks on unsuspecting users. One...

Read more
GoDaddy Password Breach Affects Over A Million Users

GoDaddy Password Breach Affects Over A Million Users

The US Securities and Exchange Commission (SEC) has published a “Security Incident” submitted...

Read more
Backup Versioning

Backup Versioning

Backup Versioning is when a backup solution allows a computer file to exist with several archived...

Read more
Testimonials

See who's talking about Cyberhoot

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology