Blog > Page 4

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Prevention Techniques for Top 10 Common Cyber Attacks

Prevention Techniques for Top 10 Common Cyber Attacks

Last week we wrote about what an employee might first witness when facing 10 common cyber attacks. Then we...

Read more
Top 10 Cyber Attacks and How to Respond

Top 10 Cyber Attacks and How to Respond

Every workday brings new challenges and surprises, especially when it comes to cybersecurity. This guide helps...

Read more
Understanding the CrowdStrike Global Outage

Understanding the CrowdStrike Global Outage

On Fri. July 19th, CrowdStrike, a leading provider of Endpoint Detection and Response services, caused the...

Read more
Cybersecurity Perspective on the Ticketmaster-Taylor Swift Incident

Cybersecurity Perspective on the Ticketmaster-Taylor Swift Incident

Ticketmaster, the undisputed giant of event ticketing, recently found itself at the center of a unique...

Read more
How MFA Failures and Rising Ransomware Costs are Threatening Cybersecurity

How MFA Failures and Rising Ransomware Costs are Threatening Cybersecurity

The cybersecurity landscape is becoming increasingly perilous, with ransomware costs surging by an alarming 500%...

Read more
The Evolving Kill Chain (On-Premise vs. SaaS)

The Evolving Kill Chain (On-Premise vs. SaaS)

The Evolving Kill Chain Software as a Service (SaaS) has revolutionized business operations, offering convenience...

Read more
Hackers Exploiting Legitimate Websites

Hackers Exploiting Legitimate Websites

Hackers are always finding new ways to exploit vulnerabilities. Recently, a troubling trend has emerged where...

Read more
Understanding Credential Stuffing Attacks

Understanding Credential Stuffing Attacks

One of the latest concerns in cybersecurity is credential stuffing, a type of cyberattack that is causing...

Read more
Advanced Phishing Tactics: A Hacker’s Playbook

Advanced Phishing Tactics: A Hacker’s Playbook

Phishing attacks continue to be a persistent threat. Recent developments highlight the use of innovative...

Read more
Time-Intensive Mobile Hacks Are Causing Big Headaches for Companies

Time-Intensive Mobile Hacks Are Causing Big Headaches for Companies

In today's world, our smartphones are like an extra limb. We use them for everything—keeping up...

Read more
Ransomware Defense: Protection from Remote Access Risks

Ransomware Defense: Protection from Remote Access Risks

Ransomware Risks from Remote Access ToolsHackers are constantly evolving their tactics and...

Read more
Protecting Your Data: Lessons from the “Dropbox Sign” API and OAuth Breach

Protecting Your Data: Lessons from the “Dropbox Sign” API and OAuth Breach

Safeguarding Against API Key and OAuth Token TheftOne of the risks of using an expanding cadre of...

Read more
Testimonials

See who's talking about Cyberhoot

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director