Blog > Page 9

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Sender Policy Framework (SPF)

Sender Policy Framework (SPF)

Sender Policy Framework (SPF) is an anti-spam tool where email domains of the senders can be...

Read more
DKIM

DKIM

DKIM (DomainKeys Identified Mail) is an email authentication tool that verifies messages are sent from a...

Read more
DMARC

DMARC

DMARC which stands for Domain-based Message Authentication, Reporting, and Conformance is an email...

Read more
Non-Public Personal Information (NPPI)

Non-Public Personal Information (NPPI)

Non-Public Personal Information (NPPI) is personal and private information that's provided by a...

Read more
Anti-Censorship

Anti-Censorship

Anti-Censorship are methods to combat censorship – for example, preventing search results from being...

Read more
Graphical User Interface (GUI)

Graphical User Interface (GUI)

A Graphical User Interface (GUI), often pronounced 'gooey', is a user interface that includes...

Read more
Solid State Drive (SSD)

Solid State Drive (SSD)

A Solid State Drive (SSD) is a type of storage device that supports reading and writing data and stores...

Read more
Cyberwarfare

Cyberwarfare

Cyberwarfare is the use of sophisticated cyber weapons (viruses, worms, trojans, etc.) by one...

Read more
Garmin Ransomware Attack

Garmin Ransomware Attack

If you run or bike, you probably heard about the Garmin Ransomware attack, taking down its...

Read more
Jackpotting: Asian ATM Hacking Reaches the US

Jackpotting: Asian ATM Hacking Reaches the US

Automatic Teller Machines (ATM) have long been a target of enterprising criminals. In the 1980's when...

Read more
Internet of Things (IoT)

Internet of Things (IoT)

The Internet of Things (IoT) is any device or machine that has the ability to transfer data over a...

Read more
Zoom Bombing

Zoom Bombing

Zoom Bombing is where an unauthorized person enters your Zoom video conference to cause disruptions or to gain...

Read more
Testimonials

See who's talking about Cyberhoot

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer