Blog

Training


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
You’ve Been Phished!

You’ve Been Phished!

But please don't panic.  This was only a test. Before landing here, you clicked on a phishing email sent by...

Read more
CyberHoot: Phishing Attacks

CyberHoot: Phishing Attacks

Spotting and Avoiding Phishing Attacks This foundational CyberHoot video teaches critical skills to identify...

Read more
CyberHoot: An Introduction to our Platform

CyberHoot: An Introduction to our Platform

Welcome to CyberHoot's cyber literacy 101 core curriculum videos.  This introductory video introduces end users...

Read more
CyberHoot: Two-Factor Authentication (2FA)

CyberHoot: Two-Factor Authentication (2FA)

What is 2FA and why is it Important? This video is part of CyberHoot's foundational cyber literacy 101 video...

Read more
CyberHoot: The Many Benefits of a Password Manager

CyberHoot: The Many Benefits of a Password Manager

This video is part of CyberHoot's Cyber Literacy program of six (6) videos.  It outlines the critical need for...

Read more
CyberHoot: Passwords, Passphrases, and More

CyberHoot: Passwords, Passphrases, and More

This video is part of CyberHoot's cyber literacy 101 program.  It summarizes the importance of password hygiene...

Read more
CyberHoot: WiFi Insecurities Explained

CyberHoot: WiFi Insecurities Explained

How to Reduce your WiFi Risks This is the sixth and final cyberliteracy 101 video in CyberHoot's core...

Read more
PCI Compliance Training

PCI Compliance Training

Payment Card Industry Card Brands and Governance Structure Payment Card Industry (PCI) compliance is important...

Read more
Chip and Pin Benefits Training

Chip and Pin Benefits Training

All credit and debit cards are now being made with "a computer that is 1/4 the size of a postage stamp" this...

Read more
PCI DSS Training

PCI DSS Training

PCI DSS stands for Payment Card Industry Data Security Standard. This is the standard that all organizations must...

Read more
Tokenization

Tokenization

Tokenization is a way for credit card information (also called the Primary Account Number or PAN) to not be used...

Read more
WannaCry Ransomware Explained and How to Protect Yourself From It

WannaCry Ransomware Explained and How to Protect Yourself From It

This video documents what the Wannacry ransomware virus did to companies and individuals throughout the world in...

Read more
Testimonials

See who's talking about Cyberhoot

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President