Blog > Page 61

Stay sharp with security insights

Internet of Things (IoT)

Internet of Things (IoT)

The Internet of Things (IoT) is any device or machine that has the ability to transfer data over a...

Read more
Credential Stuffing

Credential Stuffing

Credential Stuffing is the autonomous injection of stolen username and password credentials in a web...

Read more
Password Salting

Password Salting

Password Salting is a technique used to help protect passwords stored in a database from being...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Commercial Off-The-Shelf (COTS)

Commercial Off-The-Shelf (COTS)

Commercial Off-The-Shelf (COTS) in cybersecurity is a computer hardware or software product made for...

Read more
Anti-Malware

Anti-Malware

Anti-Malware is a solution that maintains computer security and protects sensitive data that is transmitted by a...

Read more
Three (3) Reasons Policies and Processes are Key

Three (3) Reasons Policies and Processes are Key

Three (3) Reasons for Policies and Procedures: All businesses are governed by laws, regulations, and legislative...

Read more
MAZE Ransomware: 3x Threat to Data Security

MAZE Ransomware: 3x Threat to Data Security

Ransomware has grown in popularity as a tool used by hacking groups to attack any and all companies as evidenced...

Read more
Safe Links | URL Protection | Link Protection

Safe Links | URL Protection | Link Protection

Safe Links (also known as URL Protection) are tools used by anti-SPAM technology solutions that...

Read more
End-Of-Life (EOL) – End-Of-Support (EOS)

End-Of-Life (EOL) – End-Of-Support (EOS)

End-of-Life (EOL)/End-of-Support(EOS) describe the final stage of a product's lifecycle. Once a product...

Read more
Cybersecurity Maturity Model Certification (CMMC)

Cybersecurity Maturity Model Certification (CMMC)

The Department of Defense (DoD) has been working on a new universal standard called the...

Read more
Remote Monitoring and Management (RMM)

Remote Monitoring and Management (RMM)

Remote Monitoring and Management (RMM) is a set of Information Technology (IT) tools that are...

Read more
CyberHoot Newsletter – Volume 5

CyberHoot Newsletter – Volume 5

Stay Secure While Working Remotely Working remotely will help slow the worldwide spread of...

Read more
Testimonials

See who's talking about Cyberhoot

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer
"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."
Robyn Dunlap, Franklin Schools, Director of Technology