Blog > Page 12

Blog


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Top 10 Tools Every MSP Needs in their Toolbox

Top 10 Tools Every MSP Needs in their Toolbox

Editors Note: 3/13/2023: This article has turned into a 2-part series.  In Part 1 below we...

Read more
ConnectWise_Recover_ZK_Framework_Vulnerability

ConnectWise_Recover_ZK_Framework_Vulnerability

March 1st, 2023: Multiple vulnerabilities found in ConnectWise Recover and R1Software leveraging...

Read more
CyberHoot Newsletter – February 2023

CyberHoot Newsletter – February 2023

ChatGPT Authors a Humorous Cyber Breach Article Relating to T-Mobile CyberHoot examined ChatGPT ourselves...

Read more
OpenSSL Releases Vulnerabilities Patches

OpenSSL Releases Vulnerabilities Patches

Image Source:...

Read more
Top 10 MSP Cybersecurity Risks

Top 10 MSP Cybersecurity Risks

MSPs are under siege by hackers. They must learn how to combat the top 10 MSP cybersecurity risks they face. ...

Read more
Top 10 Security Awareness Training Challenges and Solutions

Top 10 Security Awareness Training Challenges and Solutions

Learn the awareness training challenges you face and how to solve them. Breach numbers grew 41% in 2022 from 2021...

Read more
A Humorous AI Story Detailing the T-Mobile Breach

A Humorous AI Story Detailing the T-Mobile Breach

AI Generated Image of an All Knowing Author from Jasper.io to accompany...

Read more
The Last Straw for LastPass – Migration Time

The Last Straw for LastPass – Migration Time

Jan. 17th, 2022 - Final Update to the LastPass BreachPrior Blog Article:  LastPass Breach Blog...

Read more
Natural Language AI-Based ChatGPT Creating Opportunities and Challenges

Natural Language AI-Based ChatGPT Creating Opportunities and Challenges

When Technology Outpaces the Social Norms Needed to Govern ITArtificial Intelligence (AI)...

Read more
CyberHoot Newsletter – January 2023

CyberHoot Newsletter – January 2023

FBI’s Vetted Cybersecurity Organization “Infragard”...

Read more
LastPass Breach Update – August 22 – December 22

LastPass Breach Update – August 22 – December 22

Jan 26th Update 3: CyberHoot drafted a new LastPass article: Last Straw for LastPass separately with criteria for...

Read more
New Linux Kernel Bug is a Patch Now or Disable Scenario

New Linux Kernel Bug is a Patch Now or Disable Scenario

Vulnerability Details Just in time for Christmas, we have a 9.6 vulnerability (out of 10) in some Linux Kernels...

Read more
Testimonials

See who's talking about Cyberhoot

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director