Blog

Training


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
You’ve Been Phished!

You’ve Been Phished!

But please don't panic.  This was only a test. Before landing here, you clicked on a phishing email sent by...

Read more
CyberHoot: Phishing Attacks

CyberHoot: Phishing Attacks

Spotting and Avoiding Phishing Attacks This foundational CyberHoot video teaches critical skills to identify...

Read more
CyberHoot: An Introduction to our Platform

CyberHoot: An Introduction to our Platform

Welcome to CyberHoot's cyber literacy 101 core curriculum videos.  This introductory video introduces end users...

Read more
CyberHoot: Two-Factor Authentication (2FA)

CyberHoot: Two-Factor Authentication (2FA)

What is 2FA and why is it Important? This video is part of CyberHoot's foundational cyber literacy 101 video...

Read more
CyberHoot: The Many Benefits of a Password Manager

CyberHoot: The Many Benefits of a Password Manager

This video is part of CyberHoot's Cyber Literacy program of six (6) videos.  It outlines the critical need for...

Read more
CyberHoot: Passwords, Passphrases, and More

CyberHoot: Passwords, Passphrases, and More

This video is part of CyberHoot's cyber literacy 101 program.  It summarizes the importance of password hygiene...

Read more
CyberHoot: WiFi Insecurities Explained

CyberHoot: WiFi Insecurities Explained

How to Reduce your WiFi Risks This is the sixth and final cyberliteracy 101 video in CyberHoot's core...

Read more
PCI Compliance Training

PCI Compliance Training

Payment Card Industry Card Brands and Governance Structure Payment Card Industry (PCI) compliance is important...

Read more
Chip and Pin Benefits Training

Chip and Pin Benefits Training

All credit and debit cards are now being made with "a computer that is 1/4 the size of a postage stamp" this...

Read more
PCI DSS Training

PCI DSS Training

PCI DSS stands for Payment Card Industry Data Security Standard. This is the standard that all organizations must...

Read more
Tokenization

Tokenization

Tokenization is a way for credit card information (also called the Primary Account Number or PAN) to not be used...

Read more
WannaCry Ransomware Explained and How to Protect Yourself From It

WannaCry Ransomware Explained and How to Protect Yourself From It

This video documents what the Wannacry ransomware virus did to companies and individuals throughout the world in...

Read more
Testimonials

See who's talking about Cyberhoot

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
"I reviewed over a dozen learning management platforms, and I have to say, CyberHoot is soaring way above the others."
Nick Marteney, MotherBear Security, Co-Founder & CEO
"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."
Ahmed Albalooshi, Advantari Digital Solutions, CEO
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer