Blog > Page 43

Cybrary


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Work Factor

Work Factor

Image Source A Work Factor is an estimate of the effort or time needed by a potential adversary, with...

Read more
Worm

Worm

A worm is a self-replicating, self-propagating, self-contained program that uses networking mechanisms to...

Read more
Tokenization

Tokenization

Image Source Tokenization is a way for credit card information (also called the Primary Account Number or...

Read more
Continuity of Operations Plan

Continuity of Operations Plan

Image Source Continuity of Operations Plan (COOP) is a document that sets forth procedures for the...

Read more
White Team

White Team

  Image Source A White Team is a group responsible for refereeing an engagement between a Red Team...

Read more
Bitcoin

Bitcoin

  Image Source Bitcoin is a type of digital currency in which a record of transactions is maintained and...

Read more
Network Segmentation

Network Segmentation

Network Segmentation is creating sub-networks within a corporate, enterprise, or another large network....

Read more
Ransomware

Ransomware

Ransomware is a type of malicious software designed to block access to a computer system, and more...

Read more
Phishing

Phishing

Phishing is a digital form of social engineering to deceive individuals into providing sensitive...

Read more
Keylogger

Keylogger

A Keylogger is software or hardware that tracks all keystrokes and keyboard events, usually without the...

Read more
Access Control (Physical and Logical)

Access Control (Physical and Logical)

Access Control Access control is a security technique that regulates who or what can view or use...

Read more
Advanced Persistent Threat

Advanced Persistent Threat

An Advanced Persistent Threat (APT) is an adversary that possesses sophisticated levels of expertise and...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director