Blog > Page 88

Stay sharp with security insights

Access Control (Physical and Logical)

Access Control (Physical and Logical)

Access Control Access control is a security technique that regulates who or what can view or use...

Read more
Advanced Persistent Threat

Advanced Persistent Threat

An Advanced Persistent Threat (APT) is an adversary that possesses sophisticated levels of expertise and...

Read more
Air Gap

Air Gap

An air gap is a security measure in which computers, computer systems, or networks are not connected in any...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Public Key Cryptography

Public Key Cryptography

  Image Source Public Key Cryptography is technically known as asymmetric encryption, is a...

Read more
Adversary (or Attacker)

Adversary (or Attacker)

  Image Source An Adversary is an individual, group, organization, or government that conducts or has...

Read more
Antivirus Software

Antivirus Software

  Image Source Antivirus Software is a program that monitors a computer or network to detect or...

Read more
Compromised Credentials

Compromised Credentials

Compromised Credentials occurs when an unsuspecting user's login username and password are in the possession...

Read more
RYUK Ransomware infects 110 Healthcare Facilities

RYUK Ransomware infects 110 Healthcare Facilities

This past Thanksgiving weekend, 110 healthcare facilities were infected by a ransomware attack on their IT...

Read more
Watch out for Cyber Monday Phishing Scams

Watch out for Cyber Monday Phishing Scams

Who is most likely to fall victim to Cyber Monday phishing scams? People who don't know about phishing scams,...

Read more
Typosquatting

Typosquatting

Typosquatting is also called URL hijacking. It is a form of cybersquatting which relies on mistakes such as...

Read more
BlueKeep is MS Blaster

BlueKeep is MS Blaster

George Santayana (Sketch artist: Samuel Johnson Woolf) "Those who cannot remember the past are condemned to...

Read more
Google Chrome Zero Day in the Wild

Google Chrome Zero Day in the Wild

CyberHoot has learned there is a new Zero-Day vulnerability in Chrome actively being exploited in the Wild. Your...

Read more
Testimonials

See who's talking about Cyberhoot

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst