Blog > Page 35

Stay sharp with security insights

Periodic Backups

Periodic Backups

For decades now, Periodic Backups have been used to backup and safeguard critical data. Periodic...

Read more
Job Scam Attack: Fake Offers and Checks

Job Scam Attack: Fake Offers and Checks

The pandemic has created new opportunities for social engineering attacks on unsuspecting users. One...

Read more
GoDaddy Password Breach Affects Over A Million Users

GoDaddy Password Breach Affects Over A Million Users

The US Securities and Exchange Commission (SEC) has published a “Security Incident” submitted...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Backup Versioning

Backup Versioning

Backup Versioning is when a backup solution allows a computer file to exist with several archived...

Read more
Be Wary of ‘Black Friday’ Scams

Be Wary of ‘Black Friday’ Scams

Finally, we've made it through the majority of 2021 and into the Holiday season, allowing us to...

Read more
Castle-and-Moat Network Security Model

Castle-and-Moat Network Security Model

Castle-And-Moat refers to a network security model in which no one outside the network is able to...

Read more
Employee SSNs Exposed in California Pizza Kitchen Breach

Employee SSNs Exposed in California Pizza Kitchen Breach

California Pizza Kitchen (CPK) founded in Beverly Hills, California in 1985, has more than 250...

Read more
‘Tis The Season To Be Smished

‘Tis The Season To Be Smished

The holiday shopping season means big business for retailers around the world, but it unfortunately...

Read more
CyberHoot Newsletter – November 2021

CyberHoot Newsletter – November 2021

‘Tis The Season To Be SmishedThe holiday shopping season means...

Read more
Network Attached Storage (NAS)

Network Attached Storage (NAS)

Network Attached Storage (NAS) is high-capacity storage that connects to your home or office network so...

Read more
Monero Coin (XMR)

Monero Coin (XMR)

Monero Coin (XMR) is a cryptocurrency focused on ‘Privacy and Anonymity’. The privacy token runs on...

Read more
CyberHoot’s 3-2-1 Backup Guide

CyberHoot’s 3-2-1 Backup Guide

As the number of areas where data is stored increases, the concept of following a 3-2-1 Backup Strategy...

Read more
Testimonials

See who's talking about Cyberhoot

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."
Ahmed Albalooshi, Advantari Digital Solutions, CEO
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director