Blog > Page 95

Stay sharp with security insights

Our Employees Deserve Security Training

Our Employees Deserve Security Training

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and...

Read more
Top 10 Cybersecurity Tips to Protect Your Business Brand

Top 10 Cybersecurity Tips to Protect Your Business Brand

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and...

Read more
NCAM CyberHoot: Business E-mail Compromise

NCAM CyberHoot: Business E-mail Compromise

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

NCAM CyberHoot: Passwords & Password Managers

NCAM CyberHoot: Passwords & Password Managers

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and...

Read more
NCAM CyberHoot: Two-Factor Authentication

NCAM CyberHoot: Two-Factor Authentication

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and...

Read more
NCAM CyberHoot: Reduce WiFi Risks

NCAM CyberHoot: Reduce WiFi Risks

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and...

Read more
Three Hospitals Shut Down Due to Ransomware Attack

Three Hospitals Shut Down Due to Ransomware Attack

“Education is learning what you didn’t even know you didn’t know.” – Daniel J....

Read more
How The FISA Process Works

How The FISA Process Works

This video explains how the Foreign Intelligence Surveillance Act (FISA) system works and is fulfilled law...

Read more
Confessions of a CyberSpy Hunter

Confessions of a CyberSpy Hunter

This 20 minute Ted Talk discusses how a hidden cyberwar is being perpetrated for the past 2 decades online not...

Read more
How the IoT is making Cybercrime Investigations Easier

How the IoT is making Cybercrime Investigations Easier

This 12 minute Ted Talk outlines how the IoT is making investigations easier.  Digital forensics looks for a...

Read more
Digital Forensics Explained

Digital Forensics Explained

  This 16 minute Ted talk outlines the work of a digital forensics investigator.  He describes his work...

Read more
How to setup a DMARC record

How to setup a DMARC record

This video outlines the steps you need to take to setup your DMARC and DKIM email records in the Domain Name...

Read more
Testimonials

See who's talking about Cyberhoot

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO
"I reviewed over a dozen learning management platforms, and I have to say, CyberHoot is soaring way above the others."
Nick Marteney, MotherBear Security, Co-Founder & CEO
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."
Ahmed Albalooshi, Advantari Digital Solutions, CEO