Blog > Page 9

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Sender Policy Framework (SPF)

Sender Policy Framework (SPF)

Sender Policy Framework (SPF) is an anti-spam tool where email domains of the senders can be...

Read more
DKIM

DKIM

DKIM (DomainKeys Identified Mail) is an email authentication tool that verifies messages are sent from a...

Read more
DMARC

DMARC

DMARC which stands for Domain-based Message Authentication, Reporting, and Conformance is an email...

Read more
Non-Public Personal Information (NPPI)

Non-Public Personal Information (NPPI)

Non-Public Personal Information (NPPI) is personal and private information that's provided by a...

Read more
Anti-Censorship

Anti-Censorship

Anti-Censorship are methods to combat censorship – for example, preventing search results from being...

Read more
Graphical User Interface (GUI)

Graphical User Interface (GUI)

A Graphical User Interface (GUI), often pronounced 'gooey', is a user interface that includes...

Read more
Solid State Drive (SSD)

Solid State Drive (SSD)

A Solid State Drive (SSD) is a type of storage device that supports reading and writing data and stores...

Read more
Cyberwarfare

Cyberwarfare

Cyberwarfare is the use of sophisticated cyber weapons (viruses, worms, trojans, etc.) by one...

Read more
Garmin Ransomware Attack

Garmin Ransomware Attack

If you run or bike, you probably heard about the Garmin Ransomware attack, taking down its...

Read more
Jackpotting: Asian ATM Hacking Reaches the US

Jackpotting: Asian ATM Hacking Reaches the US

Automatic Teller Machines (ATM) have long been a target of enterprising criminals. In the 1980's when...

Read more
Internet of Things (IoT)

Internet of Things (IoT)

The Internet of Things (IoT) is any device or machine that has the ability to transfer data over a...

Read more
Zoom Bombing

Zoom Bombing

Zoom Bombing is where an unauthorized person enters your Zoom video conference to cause disruptions or to gain...

Read more
Testimonials

See who's talking about Cyberhoot

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator