Blog > Page 86

Stay sharp with security insights

LastPass Overview

LastPass Overview

This video provides a very good overview of LastPass password manager and its various features from secure...

Read more
Phishing Training

Phishing Training

This 3 minute video by the Government of Canada outlines how phishing occurs online. Problems online occur when...

Read more
How to Create a Strong Passphrase

How to Create a Strong Passphrase

This 3-minute video outlines how to create strong passphrases by using at least five (5) discrete words that are...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

How to Protect Yourself From Malware

How to Protect Yourself From Malware

This short 3 min video outlines how to combat malware by preventing it from being installed in the first...

Read more
Bitcoin

Bitcoin

  Image Source Bitcoin is a type of digital currency in which a record of transactions is maintained and...

Read more
New Orleans State of Emergency Following Cyber Attack

New Orleans State of Emergency Following Cyber Attack

  Image Source It was only about a week ago that the government facility in Pensacola, Florida was...

Read more
Network Segmentation

Network Segmentation

Network Segmentation is creating sub-networks within a corporate, enterprise, or another large network....

Read more
Ransomware

Ransomware

Ransomware is a type of malicious software designed to block access to a computer system, and more...

Read more
Phishing

Phishing

Phishing is a digital form of social engineering to deceive individuals into providing sensitive...

Read more
Keylogger

Keylogger

A Keylogger is software or hardware that tracks all keystrokes and keyboard events, usually without the...

Read more
Deepfakes: Hackers Newest Trick

Deepfakes: Hackers Newest Trick

So similar to the real deal as to be disconcerting... Technology is always improving and hackers are always...

Read more
Access Control (Physical and Logical)

Access Control (Physical and Logical)

Access Control Access control is a security technique that regulates who or what can view or use...

Read more
Testimonials

See who's talking about Cyberhoot

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."

Ahmed Albalooshi, Advantari Digital Solutions, CEO

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director