Blog > Page 2

VLOG


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Business Email Compromise (BEC) – Day 22 of CSAM

Business Email Compromise (BEC) – Day 22 of CSAM

Today is Day 22 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Dark Web Exposures – Day 21 of Cybersecurity Awareness Month

Dark Web Exposures – Day 21 of Cybersecurity Awareness Month

Today is Day 21 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Hackers – Day 20 of Cybersecurity Awareness Month

Hackers – Day 20 of Cybersecurity Awareness Month

Today is Day 20 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Risk Assessments Importance – Day 19 of Cybersecurity Awareness Month

Risk Assessments Importance – Day 19 of Cybersecurity Awareness Month

Today is Day 19 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Mobile Device Security – Day 18 of Cybersecurity Awareness Month

Mobile Device Security – Day 18 of Cybersecurity Awareness Month

Today is Day 18 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Social Media Risks – Day 17 of Cybersecurity Awareness Month

Social Media Risks – Day 17 of Cybersecurity Awareness Month

Today is Day 17 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Incident Management Process – Day 16 of CSAM

Incident Management Process – Day 16 of CSAM

Today is Day 16 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Vulnerability Alert Management Process (VAMP) – Day 15 of NCAM

Vulnerability Alert Management Process (VAMP) – Day 15 of NCAM

Today is Day 15 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Importance of Patching – Day 14 of Cybersecurity Awareness Month

Importance of Patching – Day 14 of Cybersecurity Awareness Month

Today is Day 14 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Wi-Fi Security Risks – Day 13 of Cybersecurity Awareness Month

Wi-Fi Security Risks – Day 13 of Cybersecurity Awareness Month

Today is Day 13 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
USB Drives & Charging Cables – Day 12 of Cybersecurity Awareness Month

USB Drives & Charging Cables – Day 12 of Cybersecurity Awareness Month

Today is Day 12 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Physical Security – Day 11 of Cybersecurity Awareness Month

Physical Security – Day 11 of Cybersecurity Awareness Month

Today is Day 11 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Testimonials

See who's talking about Cyberhoot

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology