Blog > Page 45

Cybrary


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Network Segmentation

Network Segmentation

Network Segmentation is creating sub-networks within a corporate, enterprise, or another large network....

Read more
Ransomware

Ransomware

Ransomware is a type of malicious software designed to block access to a computer system, and more...

Read more
Phishing

Phishing

Phishing is a digital form of social engineering to deceive individuals into providing sensitive...

Read more
Keylogger

Keylogger

A Keylogger is software or hardware that tracks all keystrokes and keyboard events, usually without the...

Read more
Access Control (Physical and Logical)

Access Control (Physical and Logical)

Access Control Access control is a security technique that regulates who or what can view or use...

Read more
Advanced Persistent Threat

Advanced Persistent Threat

An Advanced Persistent Threat (APT) is an adversary that possesses sophisticated levels of expertise and...

Read more
Air Gap

Air Gap

An air gap is a security measure in which computers, computer systems, or networks are not connected in any...

Read more
Public Key Cryptography

Public Key Cryptography

  Image Source Public Key Cryptography is technically known as asymmetric encryption, is a...

Read more
Adversary (or Attacker)

Adversary (or Attacker)

  Image Source An Adversary is an individual, group, organization, or government that conducts or has...

Read more
Antivirus Software

Antivirus Software

  Image Source Antivirus Software is a program that monitors a computer or network to detect or...

Read more
Compromised Credentials

Compromised Credentials

Compromised Credentials occurs when an unsuspecting user's login username and password are in the possession...

Read more
Typosquatting

Typosquatting

Typosquatting is also called URL hijacking. It is a form of cybersquatting which relies on mistakes such as...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."
Ahmed Albalooshi, Advantari Digital Solutions, CEO
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO
“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer