Blog > Page 42

Stay sharp with security insights

FBI Recovers Colonial Bitcoin Payment

FBI Recovers Colonial Bitcoin Payment

In May of 2021, the United States’ largest pipeline, Colonial Pipeline, halted operations due to...

Read more
Service Set Identifier (SSID)

Service Set Identifier (SSID)

A Service Set Identifier (SSID) is a series of characters that uniquely names a Wireless Local...

Read more
Input Validation

Input Validation

Input Validation, also known as data validation, is the testing of any input (or data) provided by a...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

JBS Ransomware Attack Shows Importance of Backups

JBS Ransomware Attack Shows Importance of Backups

[Update on JBS Ransomware attack: June 10, 2021 CyberHoot learned that backups and a strong disaster...

Read more
HowTo:  Optional Training Assignments

HowTo: Optional Training Assignments

Overview CyberHoot provides the ability to optionally assign policies, videos, and programs to your users....

Read more
FBI: Watch Out For Fake Job Listings

FBI: Watch Out For Fake Job Listings

The FBI released a statement in April 2021, warning of cybercriminals using fake job listings to target...

Read more
5G

5G

5G is the fifth generation of cellular data technology. It lives alongside 4G and related technologies,...

Read more
Business Email Compromise (BEC)

Business Email Compromise (BEC)

Business Email Compromise (BEC) is when an email account, often in a company's finance department, is...

Read more
Decentralized Finance (DeFi) In A Nutshell

Decentralized Finance (DeFi) In A Nutshell

A phrase that has been making waves in the financial world is Decentralized Finance (aka: DeFi). DeFi...

Read more
CyberHoot May Press Release

CyberHoot May Press Release

Click the image below to view a larger version CyberHoot For MSPs <- Click Here CMIT MSP...

Read more
Quick Response (QR) Code

Quick Response (QR) Code

A Quick Response (QR) Code is a type of barcode that contains a pattern of dots and lines. It can...

Read more
Zero Trust

Zero Trust

Zero Trust is a security strategy focused on the belief that organizations shouldn't automatically...

Read more
Testimonials

See who's talking about Cyberhoot

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer