Blog > Page 2

Training


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
How to Create a Strong Passphrase

How to Create a Strong Passphrase

This 3-minute video outlines how to create strong passphrases by using at least five (5) discrete words that are...

Read more
How to Protect Yourself From Malware

How to Protect Yourself From Malware

This short 3 min video outlines how to combat malware by preventing it from being installed in the first...

Read more
Confessions of a CyberSpy Hunter

Confessions of a CyberSpy Hunter

This 20 minute Ted Talk discusses how a hidden cyberwar is being perpetrated for the past 2 decades online not...

Read more
How the IoT is making Cybercrime Investigations Easier

How the IoT is making Cybercrime Investigations Easier

This 12 minute Ted Talk outlines how the IoT is making investigations easier.  Digital forensics looks for a...

Read more
Digital Forensics Explained

Digital Forensics Explained

  This 16 minute Ted talk outlines the work of a digital forensics investigator.  He describes his work...

Read more
How to setup a DMARC record

How to setup a DMARC record

This video outlines the steps you need to take to setup your DMARC and DKIM email records in the Domain Name...

Read more
Insider Threat 201

Insider Threat 201

https://www.youtube.com/embed/5XbSNeVsQYcThis video covers the most common types of insiders who threaten your...

Read more
The Importance of Social Media and Email Security

The Importance of Social Media and Email Security

https://www.youtube.com/embed/xLyPhLHlyXE This Fox News special outlines an alert posted by Twitter about hacker...

Read more
Physical Security Awareness Training for Employees

Physical Security Awareness Training for Employees

Computer security in the 21st century isn’t solely about password hygiene and phishing attacks. It must also...

Read more
OSHA Safety Video Orientation for Healthcare Workers

OSHA Safety Video Orientation for Healthcare Workers

https://www.youtube.com/embed/qbuSZ9rOKNk Hospitals must train all their employees on how to remain safe while...

Read more
What is Business Email Compromise?

What is Business Email Compromise?

https://www.youtube.com/embed/sxybmE1rrZg The FBI claims that over 50% of the 6 Trillion dollars lost to hackers...

Read more
HIPAA Training 2019

HIPAA Training 2019

The Healthcare market is required to provide training on legislation that was passed over a decade ago and called...

Read more
Testimonials

See who's talking about Cyberhoot

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."

Ahmed Albalooshi, Advantari Digital Solutions, CEO