Blog > Page 72

Stay sharp with security insights

False Flag

False Flag

A False Flag is the pretending to be one hacking entity when you are in fact another. False...

Read more
Critical Microsoft Vulnerabilities

Critical Microsoft Vulnerabilities

January 14th, 2020: Today Microsoft released their monthly patches and amongst them were three critical Severity...

Read more
SIM Swapping

SIM Swapping

SIM Swapping is a term used when hackers steal a victims phone number and port or switch that...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Attribution

Attribution

Attribution in the cybersecurity world refers to the process of tracking, identifying and...

Read more
3-2-1 Backup Method

3-2-1 Backup Method

The 3-2-1 Backup Method refers to the "3-2-1 Rule" when backing up information from your...

Read more
Off Boarding Process

Off Boarding Process

An Off Boarding Process refers to the process an organization follows to deprovision access...

Read more
Two-Factor Authentication

Two-Factor Authentication

Two-Factor Authentication (2FA) is the use of two of the following three identification...

Read more
DHS Warns of Potential Cyber Attacks from Iran

DHS Warns of Potential Cyber Attacks from Iran

Only a few days after a drone strike killed Iran's highest ranked military leader, Qassim...

Read more
Root Cause Analysis

Root Cause Analysis

Root Cause Analysis (or RCA) is a vital tool for all businesses to use when evaluating...

Read more
Identification

Identification

Identification refers to the first step in the incident response process where an organization...

Read more
Remote Access Trojan (RAT)

Remote Access Trojan (RAT)

A Remote Access Trojan (RAT) is malware that includes a backdoor for administrative control...

Read more
Countermeasure

Countermeasure

A countermeasure in the cybersecurity world, is an action, procedure, or technique that...

Read more
Testimonials

See who's talking about Cyberhoot

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology