Blog > Page 32

Blog


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Top 10 Cybersecurity Tips to Protect Your Business Brand

Top 10 Cybersecurity Tips to Protect Your Business Brand

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and...

Read more
NCAM CyberHoot: Business E-mail Compromise

NCAM CyberHoot: Business E-mail Compromise

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and...

Read more
NCAM CyberHoot: Passwords & Password Managers

NCAM CyberHoot: Passwords & Password Managers

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and...

Read more
NCAM CyberHoot: Two-Factor Authentication

NCAM CyberHoot: Two-Factor Authentication

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and...

Read more
NCAM CyberHoot: Reduce WiFi Risks

NCAM CyberHoot: Reduce WiFi Risks

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and...

Read more
Three Hospitals Shut Down Due to Ransomware Attack

Three Hospitals Shut Down Due to Ransomware Attack

“Education is learning what you didn’t even know you didn’t know.” – Daniel J....

Read more
Phishing and Spear Phishing Explained

Phishing and Spear Phishing Explained

This video explains the common form of phishing simply called phishing.  It then goes on to differentiate a more...

Read more
“Brush, Floss and Don’t Skip Your Security Training..”

“Brush, Floss and Don’t Skip Your Security Training..”

https://drnammypatel.com/2019/03/13/5-ways-our-dentist-office-is-like-a-spa/ "It had a devastating effect on...

Read more
Hackers Taken Down by FBI

Hackers Taken Down by FBI

Operation ReWired Arrests 281 and Recovers $118M Score 1 for the good guys. The FBI's project Operation...

Read more
Hacked Charging Cables Send Data Wirelessly

Hacked Charging Cables Send Data Wirelessly

Image Source Hack a Charging Cable via Wi-Fi? Most of us have tethered our mobile phones to...

Read more
Smartphones Targeted by Drive-by Malware

Smartphones Targeted by Drive-by Malware

Cyber "Events" that Shape History Only a few events in the history of "Cyber" and "Security" cause security...

Read more
SMB’s Attacked 15x More Often

SMB’s Attacked 15x More Often

Small to Medium-sized Businesses (SMB's) are attacked fifteen times more often than smaller firms (>10...

Read more
Testimonials

See who's talking about Cyberhoot

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director