Blog

Training


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
You’ve Been Phished!

You’ve Been Phished!

But please don't panic.  This was only a test. Before landing here, you clicked on a phishing email sent by...

Read more
CyberHoot: Phishing Attacks

CyberHoot: Phishing Attacks

Spotting and Avoiding Phishing Attacks This foundational CyberHoot video teaches critical skills to identify...

Read more
CyberHoot: An Introduction to our Platform

CyberHoot: An Introduction to our Platform

Welcome to CyberHoot's cyber literacy 101 core curriculum videos.  This introductory video introduces end users...

Read more
CyberHoot: Two-Factor Authentication (2FA)

CyberHoot: Two-Factor Authentication (2FA)

What is 2FA and why is it Important? This video is part of CyberHoot's foundational cyber literacy 101 video...

Read more
CyberHoot: The Many Benefits of a Password Manager

CyberHoot: The Many Benefits of a Password Manager

This video is part of CyberHoot's Cyber Literacy program of six (6) videos.  It outlines the critical need for...

Read more
CyberHoot: Passwords, Passphrases, and More

CyberHoot: Passwords, Passphrases, and More

This video is part of CyberHoot's cyber literacy 101 program.  It summarizes the importance of password hygiene...

Read more
CyberHoot: WiFi Insecurities Explained

CyberHoot: WiFi Insecurities Explained

How to Reduce your WiFi Risks This is the sixth and final cyberliteracy 101 video in CyberHoot's core...

Read more
PCI Compliance Training

PCI Compliance Training

Payment Card Industry Card Brands and Governance Structure Payment Card Industry (PCI) compliance is important...

Read more
Chip and Pin Benefits Training

Chip and Pin Benefits Training

All credit and debit cards are now being made with "a computer that is 1/4 the size of a postage stamp" this...

Read more
PCI DSS Training

PCI DSS Training

PCI DSS stands for Payment Card Industry Data Security Standard. This is the standard that all organizations must...

Read more
Tokenization

Tokenization

Tokenization is a way for credit card information (also called the Primary Account Number or PAN) to not be used...

Read more
WannaCry Ransomware Explained and How to Protect Yourself From It

WannaCry Ransomware Explained and How to Protect Yourself From It

This video documents what the Wannacry ransomware virus did to companies and individuals throughout the world in...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer