Blog > Page 6

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Adware

Adware

Adware and Madware are advertising supported software that displays, typically unwanted advertisements,...

Read more
Disinformation

Disinformation

Disinformation is false or misleading information intentionally spread to deceive viewers and/or...

Read more
Cookie

Cookie

A Cookie, or web cookie, is a small data file used by computers to track website communications and...

Read more
reCAPTCHA

reCAPTCHA

reCAPTCHA is a security measure created by Google to help protect websites from spam, automated hacking...

Read more
Patch

Patch

A Patch is a software component that is installed onto a device that modifies files or device settings....

Read more
Restore (Recovery)

Restore (Recovery)

The term Restore, also known as Recovery, is the process of retrieving production data from a backup...

Read more
Eavesdropping

Eavesdropping

Eavesdropping in the cybersecurity world refers to the interception of communication between two...

Read more
POS Intrusions

POS Intrusions

A POS Intrusion is an attack that happens at the Point-of-Sale device. The POS device in retail stores...

Read more
Cyber Espionage

Cyber Espionage

Cyber Espionage is a cyber attack that leads to stolen classified, sensitive, or critical data often in...

Read more
Data Mining

Data Mining

Data Mining refers to the mathematical techniques used to exam large data sets including but not limited to...

Read more
Password Sniffing

Password Sniffing

Password Sniffing is a hacking technique that uses a special software application that allows a hacker...

Read more
Testimonials

See who's talking about Cyberhoot

"I reviewed over a dozen learning management platforms, and I have to say, CyberHoot is soaring way above the others."
Nick Marteney, MotherBear Security, Co-Founder & CEO
"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology
"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator