Blog > Page 17

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
RADIUS Authentication

RADIUS Authentication

RADIUS Authentication, also known as Remote Authentication Dial-In User Service (RADIUS), is a...

Read more
Demilitarized Zone (DMZ)

Demilitarized Zone (DMZ)

The Demilitarized Zone (DMZ) is sometimes referred to as a "perimeter network", its primary...

Read more
Guest Wi-Fi Network

Guest Wi-Fi Network

A Guest Wi-Fi Network is a separate network that gives users access to your router. A Guest...

Read more
Trusted Wi-Fi Network

Trusted Wi-Fi Network

Trusted Wi-Fi Network refers to a network that is password protected and often is AD (active...

Read more
VLAN (Virtual Local Area Network)

VLAN (Virtual Local Area Network)

A Virtual Local Area Network (VLAN) is a logical grouping of devices in the same broadcast...

Read more
Kill Chain

Kill Chain

A Kill Chain in cybersecurity reveals the phases of a cyber attack, from early reconnaissance...

Read more
Business Continuity and Disaster Recovery Plan

Business Continuity and Disaster Recovery Plan

A Business Continuity and Disaster Recovery (BCDR) Plan is a set of techniques and processes...

Read more
Revision

Revision

Revision refers to the final aspect of incident response, that of revising procedures and systems to ensure an...

Read more
Virtual Private Network (VPN)

Virtual Private Network (VPN)

A Virtual Private Network (VPN) is a way to create online privacy and anonymity by creating a...

Read more
Hacktivists

Hacktivists

A Hacktivist is someone who uses technology systems or networks maliciously to promote a...

Read more
Containment

Containment

Containment refers to the limiting and preventing of further damage to a computer system or...

Read more
Eradication

Eradication

Eradication refers to what happens following containment of a cyber attack incident. After the...

Read more
Testimonials

See who's talking about Cyberhoot

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst