Blog > Page 89

Stay sharp with security insights

Tokenization

Tokenization

Image Source Tokenization is a way for credit card information (also called the Primary Account Number or...

Read more
Continuity of Operations Plan

Continuity of Operations Plan

Image Source Continuity of Operations Plan (COOP) is a document that sets forth procedures for the...

Read more
White Team

White Team

  Image Source A White Team is a group responsible for refereeing an engagement between a Red Team...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Learn about Security Dangers of Public Wi-Fi Networks

Learn about Security Dangers of Public Wi-Fi Networks

This video outlines the common WiFi security risks unsuspecting public wifi users are liable to face. This 3 min...

Read more
WannaCry Ransomware Explained and How to Protect Yourself From It

WannaCry Ransomware Explained and How to Protect Yourself From It

This video documents what the Wannacry ransomware virus did to companies and individuals throughout the world in...

Read more
LastPass Overview

LastPass Overview

This video provides a very good overview of LastPass password manager and its various features from secure...

Read more
Phishing Training

Phishing Training

This 3 minute video by the Government of Canada outlines how phishing occurs online. Problems online occur when...

Read more
How to Create a Strong Passphrase

How to Create a Strong Passphrase

This 3-minute video outlines how to create strong passphrases by using at least five (5) discrete words that are...

Read more
How to Protect Yourself From Malware

How to Protect Yourself From Malware

This short 3 min video outlines how to combat malware by preventing it from being installed in the first...

Read more
Bitcoin

Bitcoin

  Image Source Bitcoin is a type of digital currency in which a record of transactions is maintained and...

Read more
New Orleans State of Emergency Following Cyber Attack

New Orleans State of Emergency Following Cyber Attack

  Image Source It was only about a week ago that the government facility in Pensacola, Florida was...

Read more
Network Segmentation

Network Segmentation

Network Segmentation is creating sub-networks within a corporate, enterprise, or another large network....

Read more
Testimonials

See who's talking about Cyberhoot

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO
"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology
"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."
Robyn Dunlap, Franklin Schools, Director of Technology
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer