Blog

Stay sharp with security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Revenge Porn

Revenge Porn

Revenge Porn is sexually explicit images or videos of a person posted online without that person's...

Read more
Backdoor

Backdoor

A Backdoor in the world of cybersecurity refers to the strategy used to get around normal security...

Read more
Brute Force Attack

Brute Force Attack

A Brute Force Attack is a strategy used by hackers trying to break into your data, password, or...

Read more
DHS Warns of Potential Cyber Attacks from Iran

DHS Warns of Potential Cyber Attacks from Iran

Only a few days after a drone strike killed Iran's highest ranked military leader, Qassim...

Read more
Kill Chain

Kill Chain

A Kill Chain in cybersecurity reveals the phases of a cyber attack, from early reconnaissance...

Read more
Passive Attack

Passive Attack

Image Source A Passive Attack is an actual assault perpetrated by an intentional threat source that attempts...

Read more
Trojan Horse

Trojan Horse

A Trojan Horse is a computer program that appears to have a useful function, but also has a hidden and...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer