Blog > Page 7

Cybrary


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Peer-to-Peer (P2P) Network

Peer-to-Peer (P2P) Network

Peer-to-Peer (P2P) Networks exist where groups or "peers" of computer systems are linked to each other through...

Read more
Torrent

Torrent

A Torrent is a file type used by the BitTorrent file-sharing protocol. The protocol authorizes and...

Read more
Mean Time To Respond (MTTR)

Mean Time To Respond (MTTR)

Mean Time To Respond (MTTR) is the average time required to return a system to operational condition...

Read more
Mean Time To Detect (MTTD)

Mean Time To Detect (MTTD)

Mean Time To Detect (MTTD), also known as Mean Time To Identify (MTTI), is one of the main key...

Read more
Security Orchestration, Automation, and Response (SOAR)

Security Orchestration, Automation, and Response (SOAR)

Security Orchestration, Automation, and Response (SOAR) is a stack of compatible software programs...

Read more
Periodic Backups

Periodic Backups

For decades now, Periodic Backups have been used to backup and safeguard critical data. Periodic...

Read more
Backup Versioning

Backup Versioning

Backup Versioning is when a backup solution allows a computer file to exist with several archived...

Read more
Castle-and-Moat Network Security Model

Castle-and-Moat Network Security Model

Castle-And-Moat refers to a network security model in which no one outside the network is able to...

Read more
Network Attached Storage (NAS)

Network Attached Storage (NAS)

Network Attached Storage (NAS) is high-capacity storage that connects to your home or office network so...

Read more
Monero Coin (XMR)

Monero Coin (XMR)

Monero Coin (XMR) is a cryptocurrency focused on ‘Privacy and Anonymity’. The privacy token runs on...

Read more
Vulnerability Alert Management Policy (VAMP)

Vulnerability Alert Management Policy (VAMP)

A Vulnerability Alert Management Policy (VAMP) is created within an organization to establish consistent rules...

Read more
Vulnerability Scanning

Vulnerability Scanning

Vulnerability Scanning is the process of identifying security weaknesses and coding flaws in systems and...

Read more
Testimonials

See who's talking about Cyberhoot

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."

Tim Ward, Goodwill of Chattanooga, Director, Information Technology

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator