"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Remote Desktop Protocol (RDP) is software commonly used by customer support representatives...
Read moreA False Flag is the pretending to be one hacking entity when you are in fact another. False...
Read moreAttribution in the cybersecurity world refers to the process of tracking, identifying and...
Read moreThe 3-2-1 Backup Method refers to the "3-2-1 Rule" when backing up information from your...
Read moreAn Off Boarding Process refers to the process an organization follows to deprovision access...
Read moreTwo-Factor Authentication (2FA) is the use of two of the following three identification...
Read moreRoot Cause Analysis (or RCA) is a vital tool for all businesses to use when evaluating...
Read moreIdentification refers to the first step in the incident response process where an organization...
Read moreA Remote Access Trojan (RAT) is malware that includes a backdoor for administrative control...
Read moreA countermeasure in the cybersecurity world, is an action, procedure, or technique that...
Read moreAn Exploit Chain is an attack that involves multiple exploits or attacks that are chained...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.