Blog > Page 5

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Catfishing

Catfishing

Catfishing is a common technique used on social media sites to attack victims through fake...

Read more
Identity Theft

Identity Theft

Updated: 9/9/2024 with new links to Freeze your Credit.Identity Theft is when a hacker uses your...

Read more
Data Aggregation

Data Aggregation

Data Aggregation is any process where data is gathered and expressed in a summary form. Data...

Read more
Threat Actor

Threat Actor

A Threat Actor is a person or group performing malicious or hostile actions which cause harm to the...

Read more
JavaScript

JavaScript

JavaScript is a programming language developed by Netscape commonly used in web development; used to...

Read more
Cyberspace

Cyberspace

Cyberspace is the complex environment of interdependent networks of IT infrastructures including the...

Read more
JBOH (JavaScript-Binding-Over-HTTP)

JBOH (JavaScript-Binding-Over-HTTP)

JBOH (JavaScript-Binding-Over-HTTP) is a mobile device attack that enables an attacker to...

Read more
Situational Awareness

Situational Awareness

Situational awareness is knowledge combined with attitudes and behaviors that work to protect our IT...

Read more
Cryptanalysis

Cryptanalysis

Cryptanalysis is the decryption and analysis of codes, ciphers or encrypted text. Cryptanalysis uses...

Read more
Bloatware

Bloatware

Bloatware is software that comes pre-installed with the purchase of a new computer or device. Many...

Read more
Trialware

Trialware

Trialware is software that can be used for a short period of time before it expires. In order to keep...

Read more
Piggybacking

Piggybacking

Piggybacking is a form of cyber attack where a hacker(s) gain access to an unauthorized network,...

Read more
Testimonials

See who's talking about Cyberhoot

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory