Blog > Page 69

Stay sharp with security insights

Facial Recognition

Facial Recognition

Facial Recognition is an increasingly effective and popular technology capable of identifying a...

Read more
User Datagram Protocol (UDP)

User Datagram Protocol (UDP)

User Datagram Protocol (UDP) is an alternative communications protocol to Transmission Control Protocol...

Read more
Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) is a special type of packet used for inter-device...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Transmission Control Protocol (TCP)

Transmission Control Protocol (TCP)

Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a...

Read more
DNS Reflection and Amplification Attacks

DNS Reflection and Amplification Attacks

A DNS Reflection Attack, also known as a DNS Amplification Attack, is a form of a Distributed Denial of...

Read more
SIM Swapping by Hacking Telecom Companies

SIM Swapping by Hacking Telecom Companies

Hackers never cease to stop evolving and finding new ways to get your information. Hackers...

Read more
Remote Desktop Protocol (RDP)

Remote Desktop Protocol (RDP)

Remote Desktop Protocol (RDP) is software commonly used by customer support representatives...

Read more
False Flag

False Flag

A False Flag is the pretending to be one hacking entity when you are in fact another. False...

Read more
Critical Microsoft Vulnerabilities

Critical Microsoft Vulnerabilities

January 14th, 2020: Today Microsoft released their monthly patches and amongst them were three critical Severity...

Read more
SIM Swapping

SIM Swapping

SIM Swapping is a term used when hackers steal a victims phone number and port or switch that...

Read more
Attribution

Attribution

Attribution in the cybersecurity world refers to the process of tracking, identifying and...

Read more
3-2-1 Backup Method

3-2-1 Backup Method

The 3-2-1 Backup Method refers to the "3-2-1 Rule" when backing up information from your...

Read more
Testimonials

See who's talking about Cyberhoot

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."

Ahmed Albalooshi, Advantari Digital Solutions, CEO

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer