Blog > Page 5

Stay sharp with security insights

End-to-End Encryption (E2EE)

End-to-End Encryption (E2EE)

End-to-End Encryption (E2EE) is a method of securing digital communications so that only the sender and the...

Read more
Ad-blockers

Ad-blockers

Ad-blockers are software tools, often installed as browser extensions, apps, or built into browsers, that prevent...

Read more
Operational Disruption

Operational Disruption

Operational Disruption is any unexpected event, failure, or interruption that prevents normal business processes,...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Microsegmentation

Microsegmentation

Microsegmentation is a security technique that divides a network into smaller, isolated zones down to the...

Read more
Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more
Advisory: CISA Issues Emergency Directive for Critical Microsoft Exchange Flaw

Advisory: CISA Issues Emergency Directive for Critical Microsoft Exchange Flaw

Overview The Cybersecurity and Infrastructure Security Agency (CISA), acting as the U.S. government's cyber...

Read more
Shoot the Hoot with CyberHoot …RAW – Episode 10

Shoot the Hoot with CyberHoot …RAW – Episode 10

Welcome to Shoot the Hoot…RAW! Welcome back to Episode 10 of Shoot the Hoot RAW—a special milestone...

Read more
Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Shoot the Hoot with CyberHoot …RAW – Episode 9: Part 1 of our 4-Part Founder Series

Shoot the Hoot with CyberHoot …RAW – Episode 9: Part 1 of our 4-Part Founder Series

Welcome to Shoot the Hoot…RAW! Welcome back to Episode 9 of Shoot the Hoot RAW—and the first flight in our...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more
Shoot the Hoot with CyberHoot …RAW – Episode 8

Shoot the Hoot with CyberHoot …RAW – Episode 8

Welcome to Shoot the Hoot…RAW! Welcome back to Episode 8 of Shoot the Hoot—the weekly livestream hosted by...

Read more
HowTo: Delete a Customer in CyberHoot.

HowTo: Delete a Customer in CyberHoot.

These instructions provide a step-by-step guide for deleting a customer in CyberHoot’s multi-tenant platforms...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer
"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director