"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."
Intellectual Property (IP) refers to the ownership of a specific idea, design, manuscript, etc. by the...
Read moreThe ILOVEYOU Virus, also known as, the Love Bug, is a computer worm that infected over 10 million...
Read moreThis support HowTo video shows you exactly how to add a new manager into...
Read moreThis HowTo video outlines how to add a single new user/employee into CyberHoot. If you would like to add multiple...
Read moreThis HowTo video outlines how to restore an archived user or employee in a Training Program. When an archived...
Read moreThis HowTo video demonstrates how to resend all outstanding assignments to a single employee's email...
Read moreThis support HowTo video illustrates exactly how to electronically sign your name to complete any assignment in...
Read moreThis support HowTo video shows how to move a single user/employee to a new manager. If you wish to assign multiple...
Read moreMandatory Controls, also known as Mandatory Access Controls (MAC), are a type of access control that...
Read moreDiscretionary Access Controls, also known as DAC, are types of cybersecurity measures that allow or...
Read moreSensitive (or restricted) Information is data from a company or organization that is generally not...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.