Blog > Page 87

Stay sharp with security insights

WannaCry Ransomware Explained and How to Protect Yourself From It

WannaCry Ransomware Explained and How to Protect Yourself From It

This video documents what the Wannacry ransomware virus did to companies and individuals throughout the world in...

Read more
LastPass Overview

LastPass Overview

This video provides a very good overview of LastPass password manager and its various features from secure...

Read more
Phishing Training

Phishing Training

This 3 minute video by the Government of Canada outlines how phishing occurs online. Problems online occur when...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

How to Create a Strong Passphrase

How to Create a Strong Passphrase

This 3-minute video outlines how to create strong passphrases by using at least five (5) discrete words that are...

Read more
How to Protect Yourself From Malware

How to Protect Yourself From Malware

This short 3 min video outlines how to combat malware by preventing it from being installed in the first...

Read more
Bitcoin

Bitcoin

  Image Source Bitcoin is a type of digital currency in which a record of transactions is maintained and...

Read more
New Orleans State of Emergency Following Cyber Attack

New Orleans State of Emergency Following Cyber Attack

  Image Source It was only about a week ago that the government facility in Pensacola, Florida was...

Read more
Network Segmentation

Network Segmentation

Network Segmentation is creating sub-networks within a corporate, enterprise, or another large network....

Read more
Ransomware

Ransomware

Ransomware is a type of malicious software designed to block access to a computer system, and more...

Read more
Phishing

Phishing

Phishing is a digital form of social engineering to deceive individuals into providing sensitive...

Read more
Keylogger

Keylogger

A Keylogger is software or hardware that tracks all keystrokes and keyboard events, usually without the...

Read more
Deepfakes: Hackers Newest Trick

Deepfakes: Hackers Newest Trick

So similar to the real deal as to be disconcerting... Technology is always improving and hackers are always...

Read more
Testimonials

See who's talking about Cyberhoot

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."
Robyn Dunlap, Franklin Schools, Director of Technology
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer