Blog > Page 8

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Jeff Bezos and the WhatsApp Security Flaw

Jeff Bezos and the WhatsApp Security Flaw

In May of 2018, Jeff Bezos received a message on the WhatsApp application on his smartphone, from an...

Read more
CyberHoot Newsletter – Volume 3

CyberHoot Newsletter – Volume 3

Hack Back Bill ​The Active Cyber Defense Certainty Act (ACDC), also known as the "Hack Back"...

Read more
US Government Entities are Waking Up to Cybersecurity

US Government Entities are Waking Up to Cybersecurity

Governments across the world are starting to realize how important cybersecurity really is....

Read more
CyberHoot Newsletter – Volume 1

CyberHoot Newsletter – Volume 1

CISA warns Vigilance Watching for Iran Cyber Attacks Jan. 4th 2020: The Cybersecurity and Infrastructure Security...

Read more
Need to Know

Need to Know

Need to Know is a term that applies to sensitive and often classified information. It is a...

Read more
5 Password Manager Myths

5 Password Manager Myths

The Internet is racing towards 10 Billion publicly documented breached accounts. You can check...

Read more
Access Control Mechanism

Access Control Mechanism

  Image Source An access control mechanism is a security safeguard (i.e., hardware and software...

Read more
Block List, Deny List

Block List, Deny List

A Block List or Deny List, (deprecated: Blacklist), is a list of entities that are blocked or...

Read more
Attack

Attack

  Image Source An Attack is an attempt to gain unauthorized access to system services, resources,...

Read more
Exploit

Exploit

Image Source An exploit is a technique to breach the security of a network or information system in...

Read more
Failure

Failure

Image Source A failure is the inability of a system or component to perform its required functions within...

Read more
Cybersecurity

Cybersecurity

Image Source Cybersecurity is the activity or process, ability or capability, or state whereby information...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."

Tim Ward, Goodwill of Chattanooga, Director, Information Technology

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President