Blog > Page 44

Stay sharp with security insights

Third-Party Risk Management (TPRM)

Third-Party Risk Management (TPRM)

Third-Party Risk Management (TPRM) is the process of identifying, assessing, and controlling risks...

Read more
BYOD

BYOD

BYOD, also known as Bring Your Own Device, is a common practice of allowing employee-owned devices to...

Read more
Israel Launches ‘Stuxnet 3.0’ On Iran

Israel Launches ‘Stuxnet 3.0’ On Iran

Iran announced that a blackout occurred at its uranium enrichment facility in Natanz. Iran blamed...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Personal Information Protection and Electronic Documents Act (PIPEDA)

Personal Information Protection and Electronic Documents Act (PIPEDA)

The Personal Information Protection and Electronic Documents Act (PIPEDA) is Canada's main...

Read more
HowTo: Determine Roles in CyberHoot

HowTo: Determine Roles in CyberHoot

Unique Roles (5) within the CyberHoot Tool:  These five (5) roles are all mutually exclusive. Because you are...

Read more
General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) was passed in the European Union (EU) in 2016 and...

Read more
Booking.com Fined Following Vishing Attack

Booking.com Fined Following Vishing Attack

Summary Message: Working out your Breach Notification during a Breach is a recipe for disaster. Back in...

Read more
Facebook Exploit – Cybersecurity Advisory

Facebook Exploit – Cybersecurity Advisory

April 2021: CyberHoot received notification of a hacking forum publishing the stolen phone numbers and...

Read more
UK Census Smishing Attack

UK Census Smishing Attack

As many know, the United States had its decennial (every ten years) census in 2020, helping determine...

Read more
Instagram Scams: How To Avoid Them

Instagram Scams: How To Avoid Them

Since Instagram's official launch in 2010, it's seen more than 1 billion accounts opened with users...

Read more
CyberHoot Newsletter – Volume XIV

CyberHoot Newsletter – Volume XIV

Twitter Steganography Risks Steganography is the interesting but potentially dangerous...

Read more
Data Sanitization

Data Sanitization

Data Sanitization is the process of permanently and irreversibly destroying data on a storage device in...

Read more
Testimonials

See who's talking about Cyberhoot

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director