Blog > Page 43

Stay sharp with security insights

Cryptocurrency Wallet

Cryptocurrency Wallet

A Cryptocurrency Wallet, also known as a Crypto Coin Wallet, is an application that allows...

Read more
FBI Recovers Colonial Bitcoin Payment

FBI Recovers Colonial Bitcoin Payment

In May of 2021, the United States’ largest pipeline, Colonial Pipeline, halted operations due to...

Read more
Service Set Identifier (SSID)

Service Set Identifier (SSID)

A Service Set Identifier (SSID) is a series of characters that uniquely names a Wireless Local...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Input Validation

Input Validation

Input Validation, also known as data validation, is the testing of any input (or data) provided by a...

Read more
JBS Ransomware Attack Shows Importance of Backups

JBS Ransomware Attack Shows Importance of Backups

[Update on JBS Ransomware attack: June 10, 2021 CyberHoot learned that backups and a strong disaster...

Read more
HowTo:  Optional Training Assignments

HowTo: Optional Training Assignments

Overview CyberHoot provides the ability to optionally assign policies, videos, and programs to your users....

Read more
FBI: Watch Out For Fake Job Listings

FBI: Watch Out For Fake Job Listings

The FBI released a statement in April 2021, warning of cybercriminals using fake job listings to target...

Read more
5G

5G

5G is the fifth generation of cellular data technology. It lives alongside 4G and related technologies,...

Read more
Business Email Compromise (BEC)

Business Email Compromise (BEC)

Business Email Compromise (BEC) is when an email account, often in a company's finance department, is broken into...

Read more
Decentralized Finance (DeFi) In A Nutshell

Decentralized Finance (DeFi) In A Nutshell

A phrase that has been making waves in the financial world is Decentralized Finance (aka: DeFi). DeFi...

Read more
CyberHoot May Press Release

CyberHoot May Press Release

Click the image below to view a larger version CyberHoot For MSPs <- Click Here CMIT MSP...

Read more
Quick Response (QR) Code

Quick Response (QR) Code

A Quick Response (QR) Code is a type of barcode that contains a pattern of dots and lines. It can...

Read more
Testimonials

See who's talking about Cyberhoot

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director
"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner