Blog > Page 9

Cybrary


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Mantrap

Mantrap

A Mantrap is a small room with an entry door on one wall and an exit door on the opposite wall....

Read more
Out-Of-Band (OOB) Patch

Out-Of-Band (OOB) Patch

An Out-Of-Band (OOB) Patch is a security update released outside of the normal frequency. Typically,...

Read more
Managed Service Provider (MSP)

Managed Service Provider (MSP)

A Managed Service Provider (MSP) is a third-party business that provides network, application, and...

Read more
Starlink

Starlink

Starlink is a satellite Internet constellation constructed by SpaceX to provide satellite Internet...

Read more
Full-Disk Encryption (FDE)

Full-Disk Encryption (FDE)

Full-Disk Encryption (FDE) is the encryption of all data on a disk drive. It's often done by disk...

Read more
On-Access Scanning

On-Access Scanning

On-Access Scanning refers to a security tool configured to deliver real-time scans of each file for...

Read more
Quarantine

Quarantine

Quarantine in the cybersecurity world happens when files containing malware are placed into isolation...

Read more
Transaction Lock

Transaction Lock

A Transaction Lock refers to the step taken by mobile payment app users to secure their accounts...

Read more
Knowledge-Based Verification (KBV)

Knowledge-Based Verification (KBV)

Knowledge-Based Verification (KBV) is a strategy used to verify identities based on knowledge of...

Read more
Tactics, Techniques, and Procedures (TTP)

Tactics, Techniques, and Procedures (TTP)

Tactics, Techniques, and Procedures (TTP) is the method used by IT and military professionals to...

Read more
Stalkerware

Stalkerware

Stalkerware refers to tools, apps, software programs, and devices that let another person (a stalker)...

Read more
Cryptocurrency Wallet

Cryptocurrency Wallet

A Cryptocurrency Wallet, also known as a Crypto Coin Wallet, is an application that allows...

Read more
Testimonials

See who's talking about Cyberhoot

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director
"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer