Blog > Page 28

Cybrary


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
SIM Swapping

SIM Swapping

SIM Swapping is a term used when hackers steal a victims phone number and port or switch that...

Read more
Attribution

Attribution

Attribution in the cybersecurity world refers to the process of tracking, identifying and...

Read more
3-2-1 Backup Method

3-2-1 Backup Method

The 3-2-1 Backup Method refers to the "3-2-1 Rule" when backing up information from your...

Read more
Off Boarding Process

Off Boarding Process

An Off Boarding Process refers to the process an organization follows to deprovision access...

Read more
Two-Factor Authentication

Two-Factor Authentication

Two-Factor Authentication (2FA) is the use of two of the following three identification...

Read more
Root Cause Analysis

Root Cause Analysis

Root Cause Analysis (or RCA) is a vital tool for all businesses to use when evaluating...

Read more
Identification

Identification

Identification refers to the first step in the incident response process where an organization...

Read more
Remote Access Trojan (RAT)

Remote Access Trojan (RAT)

A Remote Access Trojan (RAT) is malware that includes a backdoor for administrative control...

Read more
Countermeasure

Countermeasure

A countermeasure in the cybersecurity world, is an action, procedure, or technique that...

Read more
Exploit Chain

Exploit Chain

An Exploit Chain is an attack that involves multiple exploits or attacks that are chained...

Read more
RADIUS Authentication

RADIUS Authentication

RADIUS Authentication, also known as Remote Authentication Dial-In User Service (RADIUS), is a...

Read more
Demilitarized Zone (DMZ)

Demilitarized Zone (DMZ)

The Demilitarized Zone (DMZ) is sometimes referred to as a "perimeter network", its primary...

Read more
Testimonials

See who's talking about Cyberhoot

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer