Blog > Page 6

Blog


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
CyberHoot Newsletter – May 2024

CyberHoot Newsletter – May 2024

Time-Intensive Mobile Hacks Are Causing Big Headaches for Companies Time-Intensive Mobile Hacks: Discover...

Read more
Understanding Credential Stuffing Attacks

Understanding Credential Stuffing Attacks

One of the latest concerns in cybersecurity is credential stuffing, a type of cyberattack that is causing...

Read more
FireTail Podcast: CyberHoot CEO Craig Taylor

FireTail Podcast: CyberHoot CEO Craig Taylor

CyberHoot CEO on FireTail: Modern Cyber's Podcast In this episode, FireTail's host Andrew speaks with Craig...

Read more
Advanced Phishing Tactics: A Hacker’s Playbook

Advanced Phishing Tactics: A Hacker’s Playbook

Phishing attacks continue to be a persistent threat. Recent developments highlight the use of innovative...

Read more
Advisory: Protecting Yourself After the Ticketmaster Data Breach

Advisory: Protecting Yourself After the Ticketmaster Data Breach

May 30th, 2024: Recent news highlighted a significant breach at Ticketmaster, affecting 560...

Read more
Time-Intensive Mobile Hacks Are Causing Big Headaches for Companies

Time-Intensive Mobile Hacks Are Causing Big Headaches for Companies

In today's world, our smartphones are like an extra limb. We use them for everything—keeping up...

Read more
CyberHoot Newsletter – April 2024

CyberHoot Newsletter – April 2024

Understanding the Change Healthcare Cyberattack Change Healthcare Cyberattack: Gain valuable insights into...

Read more
Ransomware Defense: Protection from Remote Access Risks

Ransomware Defense: Protection from Remote Access Risks

Ransomware Risks from Remote Access ToolsHackers are constantly evolving their tactics and...

Read more
Protecting Your Data: Lessons from the “Dropbox Sign” API and OAuth Breach

Protecting Your Data: Lessons from the “Dropbox Sign” API and OAuth Breach

Safeguarding Against API Key and OAuth Token TheftOne of the risks of using an expanding cadre of...

Read more
Why Ditching Passwords is the Future of Online Security

Why Ditching Passwords is the Future of Online Security

Passwordless Authentication + Enhanced Online Security = Passkeys In today's online world, the trusty password is...

Read more
CyberHoot Newsletter – Q1 2024 January, February, March

CyberHoot Newsletter – Q1 2024 January, February, March

"CyberHoot's Newsletter has been on a brief hiatus as we focused on critical product improvements, finished 2024...

Read more
Understanding the Change Healthcare Cyberattack

Understanding the Change Healthcare Cyberattack

Lessons Learned from the Change Healthcare BreachA recent cyberattack has put "a substantial...

Read more
Testimonials

See who's talking about Cyberhoot

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering