Blog > Page 2

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC) is a strategy of limiting network access based on the roles of...

Read more
Synthetic Transaction Monitoring (STM)

Synthetic Transaction Monitoring (STM)

Synthetic Transaction Monitoring (STM), also known as Synthetic Monitoring, is a web monitoring tool...

Read more
Hard Disk Drive (HDD)

Hard Disk Drive (HDD)

A Hard Disk Drive (HDD), also known as a hard drive, is a computer storage device holding magnetic...

Read more
RAM Disk

RAM Disk

A RAM Disk is Random Access Memory (RAM) that has been adjusted to simulate a disk...

Read more
Polymorphic Virus

Polymorphic Virus

A Polymorphic Virus is a type of 'shape-shifting' virus, producing malicious code that is able to...

Read more
Apple Wireless Direct Link (AWDL)

Apple Wireless Direct Link (AWDL)

Apple Wireless Direct Link (AWDL) is a low latency/high-speed Wi-Fi peer-to peer-connection Apple uses...

Read more
Clickbait

Clickbait

Clickbait is Internet content that uses overemphasized or misleading headlines to lure a person into...

Read more
Biometrics

Biometrics

Biometrics identification refers to computer-based data that identifies a person based on unique...

Read more
Parasitic Virus

Parasitic Virus

A Parasitic Virus, also known as a file virus, is spread by attaching itself to executable programs....

Read more
Boot Sector Virus

Boot Sector Virus

A Boot Sector Virus is a virus that infects the 'boot sector' of floppy disks or the 'Master Boot...

Read more
Memory-Resident Virus

Memory-Resident Virus

A Memory-Resident Virus is a virus that is located in the memory of a computer, even after the 'host'...

Read more
Random Access Memory (RAM)

Random Access Memory (RAM)

Random Access Memory (RAM) is a machine's short-term memory. RAM is fundamental to computer processing,...

Read more
Testimonials

See who's talking about Cyberhoot

"I reviewed over a dozen learning management platforms, and I have to say, CyberHoot is soaring way above the others."
Nick Marteney, MotherBear Security, Co-Founder & CEO
“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer
"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer