Blog > Page 2

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC) is a strategy of limiting network access based on the roles of...

Read more
Synthetic Transaction Monitoring (STM)

Synthetic Transaction Monitoring (STM)

Synthetic Transaction Monitoring (STM), also known as Synthetic Monitoring, is a web monitoring tool...

Read more
Hard Disk Drive (HDD)

Hard Disk Drive (HDD)

A Hard Disk Drive (HDD), also known as a hard drive, is a computer storage device holding magnetic...

Read more
RAM Disk

RAM Disk

A RAM Disk is Random Access Memory (RAM) that has been adjusted to simulate a disk...

Read more
Polymorphic Virus

Polymorphic Virus

A Polymorphic Virus is a type of 'shape-shifting' virus, producing malicious code that is able to...

Read more
Apple Wireless Direct Link (AWDL)

Apple Wireless Direct Link (AWDL)

Apple Wireless Direct Link (AWDL) is a low latency/high-speed Wi-Fi peer-to peer-connection Apple uses...

Read more
Clickbait

Clickbait

Clickbait is Internet content that uses overemphasized or misleading headlines to lure a person into...

Read more
Biometrics

Biometrics

Biometrics identification refers to computer-based data that identifies a person based on unique...

Read more
Parasitic Virus

Parasitic Virus

A Parasitic Virus, also known as a file virus, is spread by attaching itself to executable programs....

Read more
Boot Sector Virus

Boot Sector Virus

A Boot Sector Virus is a virus that infects the 'boot sector' of floppy disks or the 'Master Boot...

Read more
Memory-Resident Virus

Memory-Resident Virus

A Memory-Resident Virus is a virus that is located in the memory of a computer, even after the 'host'...

Read more
Random Access Memory (RAM)

Random Access Memory (RAM)

Random Access Memory (RAM) is a machine's short-term memory. RAM is fundamental to computer processing,...

Read more
Testimonials

See who's talking about Cyberhoot

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."

Ahmed Albalooshi, Advantari Digital Solutions, CEO