Blog > Page 40

Stay sharp with security insights

Apple Zero-Day Patch for Macs & iPhones

Apple Zero-Day Patch for Macs & iPhones

An anonymous Apple researcher found a security flaw in Macs and iPhones that hackers are actively...

Read more
Ransomware, Backups, and Testing your Plan

Ransomware, Backups, and Testing your Plan

The news headlines seem to be filled with ransomware attacks of late. Business owners are taking note...

Read more
CyberHoot Best Practices, Updates, and Q&A – 3rd Thursday Each Month

CyberHoot Best Practices, Updates, and Q&A – 3rd Thursday Each Month

We are offering different webinar topics on a weekly basis, below you will find links to the other three weeks...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Selling Cybersecurity to Prospects and Clients – 2nd Thursday Each Month

Selling Cybersecurity to Prospects and Clients – 2nd Thursday Each Month

We are offering different webinar topics on a weekly basis, below you will find links to the other three weeks...

Read more
CyberHoot Best Practices, Updates, and Q&A – 1st Thursday Each Month

CyberHoot Best Practices, Updates, and Q&A – 1st Thursday Each Month

We are offering different webinar topics on a weekly basis, below you will find links to the other three weeks...

Read more
Pegasus Spyware

Pegasus Spyware

NSO, the Israeli technology company has been working with governments around the world by selling them...

Read more
Microsoft’s PrintNightmare Vulnerability

Microsoft’s PrintNightmare Vulnerability

Microsoft's released an Out-Of-Band (OOB) emergency patch, affecting windows systems' print-spooler...

Read more
Starlink

Starlink

Starlink is a satellite Internet constellation constructed by SpaceX to provide satellite Internet...

Read more
Full-Disk Encryption (FDE)

Full-Disk Encryption (FDE)

Full-Disk Encryption (FDE) is the encryption of all data on a disk drive. It's often done by disk...

Read more
On-Access Scanning

On-Access Scanning

On-Access Scanning refers to a security tool configured to deliver real-time scans of each file for...

Read more
Nextdoor App Security

Nextdoor App Security

A new social media service, Nextdoor, is gaining steam as we come out of the COVID-19 pandemic. The...

Read more
Kaseya RMM Spreads Ransomware

Kaseya RMM Spreads Ransomware

Update and Correction - 3:30pm 7/3/21: CyberHoot has confirmed from Kaseya and other cybersecurity news...

Read more
Testimonials

See who's talking about Cyberhoot

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."

Ahmed Albalooshi, Advantari Digital Solutions, CEO

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory