Blog > Page 2

Training


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
How to Create a Strong Passphrase

How to Create a Strong Passphrase

This 3-minute video outlines how to create strong passphrases by using at least five (5) discrete words that are...

Read more
How to Protect Yourself From Malware

How to Protect Yourself From Malware

This short 3 min video outlines how to combat malware by preventing it from being installed in the first...

Read more
Confessions of a CyberSpy Hunter

Confessions of a CyberSpy Hunter

This 20 minute Ted Talk discusses how a hidden cyberwar is being perpetrated for the past 2 decades online not...

Read more
How the IoT is making Cybercrime Investigations Easier

How the IoT is making Cybercrime Investigations Easier

This 12 minute Ted Talk outlines how the IoT is making investigations easier.  Digital forensics looks for a...

Read more
Digital Forensics Explained

Digital Forensics Explained

  This 16 minute Ted talk outlines the work of a digital forensics investigator.  He describes his work...

Read more
How to setup a DMARC record

How to setup a DMARC record

This video outlines the steps you need to take to setup your DMARC and DKIM email records in the Domain Name...

Read more
Insider Threat 201

Insider Threat 201

https://www.youtube.com/embed/5XbSNeVsQYcThis video covers the most common types of insiders who threaten your...

Read more
The Importance of Social Media and Email Security

The Importance of Social Media and Email Security

https://www.youtube.com/embed/xLyPhLHlyXE This Fox News special outlines an alert posted by Twitter about hacker...

Read more
Physical Security Awareness Training for Employees

Physical Security Awareness Training for Employees

Computer security in the 21st century isn’t solely about password hygiene and phishing attacks. It must also...

Read more
OSHA Safety Video Orientation for Healthcare Workers

OSHA Safety Video Orientation for Healthcare Workers

https://www.youtube.com/embed/qbuSZ9rOKNk Hospitals must train all their employees on how to remain safe while...

Read more
What is Business Email Compromise?

What is Business Email Compromise?

https://www.youtube.com/embed/sxybmE1rrZg The FBI claims that over 50% of the 6 Trillion dollars lost to hackers...

Read more
HIPAA Training 2019

HIPAA Training 2019

The Healthcare market is required to provide training on legislation that was passed over a decade ago and called...

Read more
Testimonials

See who's talking about Cyberhoot

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Jeremy Treister, CMIT Solutions of Chicago Downtown, President
"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst