Blog > Page 3

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Five Easy Steps to Boost Your Cybersecurity

Five Easy Steps to Boost Your Cybersecurity

In today's digital landscape, where cyber threats loom large and data breaches are rampant, ensuring robust...

Read more
Understanding Privileged User Management (PUM) vs. Privileged Access Management (PAM)

Understanding Privileged User Management (PUM) vs. Privileged Access Management (PAM)

In today's digital landscape, where cyber threats loom large, organizations are increasingly...

Read more
Bridging the Gap: Superuser Protection for SMBs and MSPs

Bridging the Gap: Superuser Protection for SMBs and MSPs

In the world of cybersecurity, the role of superusers – those with elevated privileges within an...

Read more
Safeguarding Your SMB or MSP Against Deepfake Cybercrime: Insights from Hong Kong

Safeguarding Your SMB or MSP Against Deepfake Cybercrime: Insights from Hong Kong

In today's digital landscape, deepfake cybercrime presents a pressing threat demanding attention from SMBs and...

Read more
Passkeys: The Path to a Passwordless Future

Passkeys: The Path to a Passwordless Future

Welcome to 'Passkeys Unlocked: Navigating the New Era of Passwordless Authentication', your guide to the...

Read more
Understanding and Protecting Against the Telegram Scams

Understanding and Protecting Against the Telegram Scams

Overview of the Telekopye Scam:Emergence and Operation of the TelekopyeThe "Telekopye Scam"...

Read more
Hackers Turn SEC Snitches: The Evolution of Ransomware Tactics

Hackers Turn SEC Snitches: The Evolution of Ransomware Tactics

Once upon a time, ransomware was like the annoying cousin at a family reunion - it showed up,...

Read more
Malvertising Is Once Again on the Rise Leading to Malware Infections

Malvertising Is Once Again on the Rise Leading to Malware Infections

The Rise (again) of Malicious AdvertisementsIn the constantly evolving landscape of...

Read more
The SEC has Strengthened Cybersecurity Reporting Requirements – What you Need to Know

The SEC has Strengthened Cybersecurity Reporting Requirements – What you Need to Know

How has the SEC strengthened Cybersecurity Reporting Requirements and why does it matter?The SEC...

Read more
The Nuts and Bolts of a WISP

The Nuts and Bolts of a WISP

The Written Information Security Policy (WISP) is not another policy to collect dust on the...

Read more
Top Cybersecurity Questions of the Year: What Everyone Wants to Know

Top Cybersecurity Questions of the Year: What Everyone Wants to Know

In an ever-evolving digital landscape, cybersecurity remains a hot topic. Over the last year,...

Read more
Ghosts in the Machine: Spook-tacular Cybersecurity Basics for October

Ghosts in the Machine: Spook-tacular Cybersecurity Basics for October

October, with its eerie allure, also heralds Cybersecurity Awareness Month. As the nights grow longer, beware,...

Read more
Testimonials

See who's talking about Cyberhoot

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer