Blog > Page 34

Stay sharp with security insights

Job Scam Attack: Fake Offers and Checks

Job Scam Attack: Fake Offers and Checks

The pandemic has created new opportunities for social engineering attacks on unsuspecting users. One...

Read more
GoDaddy Password Breach Affects Over A Million Users

GoDaddy Password Breach Affects Over A Million Users

The US Securities and Exchange Commission (SEC) has published a “Security Incident” submitted...

Read more
Backup Versioning

Backup Versioning

Backup Versioning is when a backup solution allows a computer file to exist with several archived...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Be Wary of ‘Black Friday’ Scams

Be Wary of ‘Black Friday’ Scams

Finally, we've made it through the majority of 2021 and into the Holiday season, allowing us to...

Read more
Castle-and-Moat Network Security Model

Castle-and-Moat Network Security Model

Castle-And-Moat refers to a network security model in which no one outside the network is able to...

Read more
Employee SSNs Exposed in California Pizza Kitchen Breach

Employee SSNs Exposed in California Pizza Kitchen Breach

California Pizza Kitchen (CPK) founded in Beverly Hills, California in 1985, has more than 250...

Read more
‘Tis The Season To Be Smished

‘Tis The Season To Be Smished

The holiday shopping season means big business for retailers around the world, but it unfortunately...

Read more
CyberHoot Newsletter – November 2021

CyberHoot Newsletter – November 2021

‘Tis The Season To Be SmishedThe holiday shopping season means...

Read more
Network Attached Storage (NAS)

Network Attached Storage (NAS)

Network Attached Storage (NAS) is high-capacity storage that connects to your home or office network so...

Read more
Monero Coin (XMR)

Monero Coin (XMR)

Monero Coin (XMR) is a cryptocurrency focused on ‘Privacy and Anonymity’. The privacy token runs on...

Read more
CyberHoot’s 3-2-1 Backup Guide

CyberHoot’s 3-2-1 Backup Guide

As the number of areas where data is stored increases, the concept of following a 3-2-1 Backup Strategy...

Read more
Vulnerability Alert Management Policy (VAMP)

Vulnerability Alert Management Policy (VAMP)

A Vulnerability Alert Management Policy (VAMP) is created within an organization to establish consistent rules...

Read more
Testimonials

See who's talking about Cyberhoot

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President