Blog > Page 17

Cybrary


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
JavaScript

JavaScript

JavaScript is a programming language developed by Netscape commonly used in web development; used to...

Read more
Cyberspace

Cyberspace

Cyberspace is the complex environment of interdependent networks of IT infrastructures including the...

Read more
JBOH (JavaScript-Binding-Over-HTTP)

JBOH (JavaScript-Binding-Over-HTTP)

JBOH (JavaScript-Binding-Over-HTTP) is a mobile device attack that enables an attacker to...

Read more
Situational Awareness

Situational Awareness

Situational awareness is knowledge combined with attitudes and behaviors that work to protect our IT...

Read more
Cryptanalysis

Cryptanalysis

Cryptanalysis is the decryption and analysis of codes, ciphers or encrypted text. Cryptanalysis uses...

Read more
Bloatware

Bloatware

Bloatware is software that comes pre-installed with the purchase of a new computer or device. Many...

Read more
Trialware

Trialware

Trialware is software that can be used for a short period of time before it expires. In order to keep...

Read more
Piggybacking

Piggybacking

Piggybacking is a form of cyber attack where a hacker(s) gain access to an unauthorized network,...

Read more
Adware

Adware

Adware and Madware are advertising supported software that displays, typically unwanted advertisements,...

Read more
Disinformation

Disinformation

Disinformation is false or misleading information intentionally spread to deceive viewers and/or...

Read more
Cookie

Cookie

A Cookie, or web cookie, is a small data file used by computers to track website communications and...

Read more
Recovery Point Objective (RPO)

Recovery Point Objective (RPO)

A Recovery Point Objective (RPO) is the maximum amount of data that your company is willing to...

Read more
Testimonials

See who's talking about Cyberhoot

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO