Blog > Page 47

Stay sharp with security insights

Apple’s New Privacy Initiative

Apple’s New Privacy Initiative

Apple’s tracking-optional iOS 14.5 update provides privacy-preserving features, giving users the...

Read more
Leakware

Leakware

Leakware, also known as Doxware, is a new more potent, and dangerous form of ransomware. When a...

Read more
CyberHoot February Press Release – Referral Program

CyberHoot February Press Release – Referral Program

Click the image below to visit the referral registration page CyberHoot’s Press Releases are...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

FTC Warns of ‘Romance Scammers’

FTC Warns of ‘Romance Scammers’

For people searching for love online, it has become a little difficult due to scammers' hell-bent on...

Read more
Packet

Packet

A Packet is the unit of data that is routed between an origin and a destination on the Internet or any...

Read more
Ping of Death (PoD)

Ping of Death (PoD)

A Ping of Death (PoD) is a type of Denial of Service (DoS) attack that deliberately sends IP packets...

Read more
CyberHoot Newsletter – Volume XIII

CyberHoot Newsletter – Volume XIII

Emotet Operation Takedown In January of 2021, law enforcement and judicial authorities across...

Read more
CyberHoot February Press Release

CyberHoot February Press Release

Click on the image below and select the 'learn more' links to take you to the HowTo tutorials. Here are...

Read more
Canada Rules Clearview AI’s Illegal

Canada Rules Clearview AI’s Illegal

Clearview AI has created one of the broadest and most powerful facial recognition databases in the...

Read more
Synthetic Transaction Monitoring (STM)

Synthetic Transaction Monitoring (STM)

Synthetic Transaction Monitoring (STM), also known as Synthetic Monitoring, is a web monitoring tool...

Read more
Common Vulnerabilities and Exposures (CVE)

Common Vulnerabilities and Exposures (CVE)

Common Vulnerabilities and Exposures (CVE) is a list of computer security flaws ranked on critical...

Read more
Real User Monitoring (RUM)

Real User Monitoring (RUM)

Real User Monitoring (RUM) is a form of performance monitoring that captures and analyzes user activity...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer