Blog > Page 41

Stay sharp with security insights

Kaseya RMM Spreads Ransomware

Kaseya RMM Spreads Ransomware

Update and Correction - 3:30pm 7/3/21: CyberHoot has confirmed from Kaseya and other cybersecurity news...

Read more
CyberHoot July Press Release

CyberHoot July Press Release

Click the image below to view a larger version CyberHoot’s Press Releases are published on a monthly...

Read more
Selling Cybersecurity to Prospects and Clients – 4th Thursday Each Month

Selling Cybersecurity to Prospects and Clients – 4th Thursday Each Month

We are offering different webinar topics on a weekly basis, below you will find links to the other three weeks...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Quarantine

Quarantine

Quarantine in the cybersecurity world happens when files containing malware are placed into isolation...

Read more
Transaction Lock

Transaction Lock

A Transaction Lock refers to the step taken by mobile payment app users to secure their accounts...

Read more
How Secure Are Payment Apps?

How Secure Are Payment Apps?

Cash is King, for now. The use of electronic payment applications has been steadily growing, according...

Read more
Knowledge-Based Verification (KBV)

Knowledge-Based Verification (KBV)

Knowledge-Based Verification (KBV) is a strategy used to verify identities based on knowledge of...

Read more
Tactics, Techniques, and Procedures (TTP)

Tactics, Techniques, and Procedures (TTP)

Tactics, Techniques, and Procedures (TTP) is the method used by IT and military professionals to...

Read more
CyberHoot Newsletter – Volume XVI

CyberHoot Newsletter – Volume XVI

Prevention Absent: Congress Cybersecurity Bill  Highly publicized ransomware breaches at...

Read more
Bipartisan Cybersecurity Bill Impending

Bipartisan Cybersecurity Bill Impending

Lawmakers on Capitol Hill are scrambling to introduce legislation addressing overwhelming spikes in...

Read more
Stalkerware

Stalkerware

Stalkerware refers to tools, apps, software programs, and devices that let another person (a stalker)...

Read more
Cryptocurrency Wallet

Cryptocurrency Wallet

A Cryptocurrency Wallet, also known as a Crypto Coin Wallet, is an application that allows...

Read more
Testimonials

See who's talking about Cyberhoot

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."

Ahmed Albalooshi, Advantari Digital Solutions, CEO

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."

Tim Ward, Goodwill of Chattanooga, Director, Information Technology

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer