Blog > Page 6

Sticky


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
MAZE Ransomware: 3x Threat to Data Security

MAZE Ransomware: 3x Threat to Data Security

Ransomware has grown in popularity as a tool used by hacking groups to attack any and all companies as evidenced...

Read more
Cybersecurity Maturity Model Certification (CMMC)

Cybersecurity Maturity Model Certification (CMMC)

The Department of Defense (DoD) has been working on a new universal standard called the...

Read more
CyberHoot Newsletter – Volume 5

CyberHoot Newsletter – Volume 5

Stay Secure While Working Remotely Working remotely will help slow the worldwide spread of...

Read more
MSPs Should Require Risk Assessments

MSPs Should Require Risk Assessments

Cybersecurity threats are evolving everyday, requiring businesses to update their security postures...

Read more
Attacks on Mobile Devices Increasing

Attacks on Mobile Devices Increasing

In 2020, the number of daily smartphone users in the world totals 3.5 Billion or 45% of the...

Read more
Facial Recognition Technology Through Coronavirus Masks

Facial Recognition Technology Through Coronavirus Masks

With the issues we are facing today with the coronavirus, many technology companies are looking for...

Read more
Zoom Bombing

Zoom Bombing

Zoom Bombing is where an unauthorized person enters your Zoom video conference to cause disruptions or to gain...

Read more
Shark Tank Host Phished For Nearly $400K

Shark Tank Host Phished For Nearly $400K

Barbara Corcoran, a world famous Shark Tank host, was scammed out of nearly $400,000 in late February....

Read more
Stay Secure While Working Remotely

Stay Secure While Working Remotely

In the last two weeks, most of us in the workforce have been being asked or forced to work from home...

Read more
97% Top International Airports Fail Cybersecurity Test

97% Top International Airports Fail Cybersecurity Test

A few weeks ago a report was published by a cybersecurity firm, ImmuniWeb. This report revealed that...

Read more
Trello Exposes Personally Identifiable Information

Trello Exposes Personally Identifiable Information

Trello, the platform used by many businesses for organizing to-do lists and coordinating team tasks has...

Read more
Coronavirus Advisory

Coronavirus Advisory

Last Updated: Sun. March 8th, 2020 The Coronavirus (COVID-19), has infected nearly 90,000 people worldwide as...

Read more
Testimonials

See who's talking about Cyberhoot

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management