Blog > Page 14

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Vulnerability

Vulnerability

  Image Source A vulnerability is a characteristic or specific weakness that renders an organization...

Read more
Allow List, Permit List

Allow List, Permit List

An Allow list, also known as a Permit List or (deprecated: White List), is a list of...

Read more
Work Factor

Work Factor

Image Source A Work Factor is an estimate of the effort or time needed by a potential adversary, with...

Read more
Worm

Worm

A worm is a self-replicating, self-propagating, self-contained program that uses networking mechanisms to...

Read more
White Team

White Team

  Image Source A White Team is a group responsible for refereeing an engagement between a Red Team...

Read more
Bitcoin

Bitcoin

  Image Source Bitcoin is a type of digital currency in which a record of transactions is maintained and...

Read more
Compromised Credentials

Compromised Credentials

Compromised Credentials occurs when an unsuspecting user's login username and password are in the possession...

Read more
RYUK Ransomware infects 110 Healthcare Facilities

RYUK Ransomware infects 110 Healthcare Facilities

This past Thanksgiving weekend, 110 healthcare facilities were infected by a ransomware attack on their IT...

Read more
Watch out for Cyber Monday Phishing Scams

Watch out for Cyber Monday Phishing Scams

Who is most likely to fall victim to Cyber Monday phishing scams? People who don't know about phishing scams,...

Read more
Typosquatting

Typosquatting

Typosquatting is also called URL hijacking. It is a form of cybersquatting which relies on mistakes such as...

Read more
BlueKeep is MS Blaster

BlueKeep is MS Blaster

George Santayana (Sketch artist: Samuel Johnson Woolf) "Those who cannot remember the past are condemned to...

Read more
MSP Attacks increasing but their Ability to Defend is Lacking

MSP Attacks increasing but their Ability to Defend is Lacking

The FBI issued a stern warning in February 2019.  They witnessed multiple Managed Service Providers...

Read more
Testimonials

See who's talking about Cyberhoot

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer