Blog > Page 7

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Cryptographic Algorithm

Cryptographic Algorithm

A Cryptographic Algorithm is a well-defined computational procedure that takes variable inputs, including a...

Read more
Industrial Control System

Industrial Control System

  Image Source An Industrial Control System is an information system used to control industrial...

Read more
Risk Acceptance (Accept)

Risk Acceptance (Accept)

  Image Source Risk Acceptance (Accept) refers to accepting the risk that is presented to you or your...

Read more
Risk Mitigation

Risk Mitigation

  Image Source Mitigation occurs when assessing risk. When assessing risk there are many ways to work...

Read more
Investigation

Investigation

  Image Source An investigation is a systematic and formal inquiry into a qualified threat or...

Read more
Work Factor

Work Factor

Image Source A Work Factor is an estimate of the effort or time needed by a potential adversary, with...

Read more
Tokenization

Tokenization

Image Source Tokenization is a way for credit card information (also called the Primary Account Number or...

Read more
Continuity of Operations Plan

Continuity of Operations Plan

Image Source Continuity of Operations Plan (COOP) is a document that sets forth procedures for the...

Read more
Keylogger

Keylogger

A Keylogger is software or hardware that tracks all keystrokes and keyboard events, usually without the...

Read more
Access Control (Physical and Logical)

Access Control (Physical and Logical)

Access Control Access control is a security technique that regulates who or what can view or use...

Read more
Advanced Persistent Threat

Advanced Persistent Threat

An Advanced Persistent Threat (APT) is an adversary that possesses sophisticated levels of expertise and...

Read more
Air Gap

Air Gap

An air gap is a security measure in which computers, computer systems, or networks are not connected in any...

Read more
Testimonials

See who's talking about Cyberhoot

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."

Ahmed Albalooshi, Advantari Digital Solutions, CEO