Blog > Page 10

Cybrary


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Full-Disk Encryption (FDE)

Full-Disk Encryption (FDE)

Full-Disk Encryption (FDE) is the encryption of all data on a disk drive. It's often done by disk...

Read more
On-Access Scanning

On-Access Scanning

On-Access Scanning refers to a security tool configured to deliver real-time scans of each file for...

Read more
Quarantine

Quarantine

Quarantine in the cybersecurity world happens when files containing malware are placed into isolation...

Read more
Transaction Lock

Transaction Lock

A Transaction Lock refers to the step taken by mobile payment app users to secure their accounts...

Read more
Knowledge-Based Verification (KBV)

Knowledge-Based Verification (KBV)

Knowledge-Based Verification (KBV) is a strategy used to verify identities based on knowledge of...

Read more
Tactics, Techniques, and Procedures (TTP)

Tactics, Techniques, and Procedures (TTP)

Tactics, Techniques, and Procedures (TTP) is the method used by IT and military professionals to...

Read more
Stalkerware

Stalkerware

Stalkerware refers to tools, apps, software programs, and devices that let another person (a stalker)...

Read more
Cryptocurrency Wallet

Cryptocurrency Wallet

A Cryptocurrency Wallet, also known as a Crypto Coin Wallet, is an application that allows...

Read more
Service Set Identifier (SSID)

Service Set Identifier (SSID)

A Service Set Identifier (SSID) is a series of characters that uniquely names a Wireless Local...

Read more
Input Validation

Input Validation

Input Validation, also known as data validation, is the testing of any input (or data) provided by a...

Read more
5G

5G

5G is the fifth generation of cellular data technology. It lives alongside 4G and related technologies,...

Read more
Business Email Compromise (BEC)

Business Email Compromise (BEC)

Business Email Compromise (BEC) is when an email account, often in a company's finance department, is broken into...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."
Cris White, cyberSuite, Head of Cyber Advisory
"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director
"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst