Blog > Page 7

Cybrary


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Peer-to-Peer (P2P) Network

Peer-to-Peer (P2P) Network

Peer-to-Peer (P2P) Networks exist where groups or "peers" of computer systems are linked to each other through...

Read more
Torrent

Torrent

A Torrent is a file type used by the BitTorrent file-sharing protocol. The protocol authorizes and...

Read more
Mean Time To Respond (MTTR)

Mean Time To Respond (MTTR)

Mean Time To Respond (MTTR) is the average time required to return a system to operational condition...

Read more
Mean Time To Detect (MTTD)

Mean Time To Detect (MTTD)

Mean Time To Detect (MTTD), also known as Mean Time To Identify (MTTI), is one of the main key...

Read more
Security Orchestration, Automation, and Response (SOAR)

Security Orchestration, Automation, and Response (SOAR)

Security Orchestration, Automation, and Response (SOAR) is a stack of compatible software programs...

Read more
Periodic Backups

Periodic Backups

For decades now, Periodic Backups have been used to backup and safeguard critical data. Periodic...

Read more
Backup Versioning

Backup Versioning

Backup Versioning is when a backup solution allows a computer file to exist with several archived...

Read more
Castle-and-Moat Network Security Model

Castle-and-Moat Network Security Model

Castle-And-Moat refers to a network security model in which no one outside the network is able to...

Read more
Network Attached Storage (NAS)

Network Attached Storage (NAS)

Network Attached Storage (NAS) is high-capacity storage that connects to your home or office network so...

Read more
Monero Coin (XMR)

Monero Coin (XMR)

Monero Coin (XMR) is a cryptocurrency focused on ‘Privacy and Anonymity’. The privacy token runs on...

Read more
Vulnerability Alert Management Policy (VAMP)

Vulnerability Alert Management Policy (VAMP)

A Vulnerability Alert Management Policy (VAMP) is created within an organization to establish consistent rules...

Read more
Vulnerability Scanning

Vulnerability Scanning

Vulnerability Scanning is the process of identifying security weaknesses and coding flaws in systems and...

Read more
Testimonials

See who's talking about Cyberhoot

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer