Blog > Page 88

Stay sharp with security insights

Adversary (or Attacker)

Adversary (or Attacker)

  Image Source An Adversary is an individual, group, organization, or government that conducts or has...

Read more
Antivirus Software

Antivirus Software

  Image Source Antivirus Software is a program that monitors a computer or network to detect or...

Read more
Compromised Credentials

Compromised Credentials

Compromised Credentials occurs when an unsuspecting user's login username and password are in the possession...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

RYUK Ransomware infects 110 Healthcare Facilities

RYUK Ransomware infects 110 Healthcare Facilities

This past Thanksgiving weekend, 110 healthcare facilities were infected by a ransomware attack on their IT...

Read more
Watch out for Cyber Monday Phishing Scams

Watch out for Cyber Monday Phishing Scams

Who is most likely to fall victim to Cyber Monday phishing scams? People who don't know about phishing scams,...

Read more
Typosquatting

Typosquatting

Typosquatting is also called URL hijacking. It is a form of cybersquatting which relies on mistakes such as...

Read more
BlueKeep is MS Blaster

BlueKeep is MS Blaster

George Santayana (Sketch artist: Samuel Johnson Woolf) "Those who cannot remember the past are condemned to...

Read more
Google Chrome Zero Day in the Wild

Google Chrome Zero Day in the Wild

CyberHoot has learned there is a new Zero-Day vulnerability in Chrome actively being exploited in the Wild. Your...

Read more
Nightmare for the City of Johanessburg Persists Past Halloween

Nightmare for the City of Johanessburg Persists Past Halloween

The City of Johanessburg (COJ) experienced its second ransomware attack this year. In July a Database, internal...

Read more
3.5 Million Unfilled Cybersecurity Jobs by 2021

3.5 Million Unfilled Cybersecurity Jobs by 2021

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and...

Read more
MSP Attacks increasing but their Ability to Defend is Lacking

MSP Attacks increasing but their Ability to Defend is Lacking

The FBI issued a stern warning in February 2019.  They witnessed multiple Managed Service Providers...

Read more
Building a Culture of Security – “Elevate” Your Awareness

Building a Culture of Security – “Elevate” Your Awareness

As part of  National Cybersecurity Awareness Month (NCAM), CyberHoot strives to share topics that broaden...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."

Ahmed Albalooshi, Advantari Digital Solutions, CEO

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer