Blog > Page 3

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
CyberHoot’s 3-2-1 Backup Guide

CyberHoot’s 3-2-1 Backup Guide

As the number of areas where data is stored increases, the concept of following a 3-2-1 Backup Strategy...

Read more
Monero – The New Crypto For Hackers

Monero – The New Crypto For Hackers

Cybercriminals had a wake-up call after the FBI successfully breached a cryptocurrency wallet held by the...

Read more
Cybersecurity Awareness Month Vlog Series 2021

Cybersecurity Awareness Month Vlog Series 2021

Each day this month, we published a short (3–5 minute) interview CyberHoot’s Co-Owner Craig Taylor had...

Read more
Preventing Identity Theft – Day 23 of CSAM

Preventing Identity Theft – Day 23 of CSAM

Today is Day 23 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
U.S. Water and Wastewater Systems Cyber Breach

U.S. Water and Wastewater Systems Cyber Breach

The Cybersecurity and Infrastructure Agency (CISA) released an alert of an ongoing cyber threat to the...

Read more
Risk Assessments Importance – Day 19 of Cybersecurity Awareness Month

Risk Assessments Importance – Day 19 of Cybersecurity Awareness Month

Today is Day 19 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Social Media Risks – Day 17 of Cybersecurity Awareness Month

Social Media Risks – Day 17 of Cybersecurity Awareness Month

Today is Day 17 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Gift Card Fraud

Gift Card Fraud

The cybersecurity world is continually inundated with the new strains of ransomware taking down large...

Read more
Cybersecurity Advisory – Urgent iOS Update

Cybersecurity Advisory – Urgent iOS Update

October 13th, 2021:  CyberHoot received notification of a Zero-Day Vulnerability on Apple's iPhone...

Read more
Apple AirTag Attack

Apple AirTag Attack

In April of 2021, Apple unveiled the AirTag, a tracking device that can be put on nearly anything so...

Read more
Outlook “Autodiscover” Leaking Passwords

Outlook “Autodiscover” Leaking Passwords

Cybersecurity experts at Guardicore published a report summarizing its research results involving...

Read more
WhatsApp Security Improvement: Encrypted Backups

WhatsApp Security Improvement: Encrypted Backups

WhatsApp, a Facebook-owned company, is a mobile application that allows users to send text messages,...

Read more
Testimonials

See who's talking about Cyberhoot

Thanks to CyberHoot, we were able to offer our customers an engaging and effective awareness training program. Our first customer who saw it was impressed, which speaks volume
Oscar Nunez, DSI, IT Solutions Architect
"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology
"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."
Ahmed Albalooshi, Advantari Digital Solutions, CEO