Blog

Stay sharp with security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
You’ve Been Phished!

You’ve Been Phished!

But please don't panic.  This was only a test. Before landing here, you clicked on a phishing email sent by...

Read more
Social Engineering 101

Social Engineering 101

Image Source This 2-minute video outlines how social engineers manipulate people in social settings to gain...

Read more
CyberHoot: Phishing Attacks

CyberHoot: Phishing Attacks

Spotting and Avoiding Phishing Attacks This foundational CyberHoot video teaches critical skills to identify...

Read more
Hardware Security Module (HSM)

Hardware Security Module (HSM)

A Hardware Security Module (HSM) is a physical security device that safeguards and manages digital...

Read more
Building A Human Firewall

Building A Human Firewall

Work environments are evolving, presenting new opportunities for cybercriminals to compromise company...

Read more
Michigan School District Shut Down by Ransomware

Michigan School District Shut Down by Ransomware

The Richmond school district in Michigan started off the decade on the wrong foot, falling victim to ransomware...

Read more
PCI Compliance Training

PCI Compliance Training

Payment Card Industry Card Brands and Governance Structure Payment Card Industry (PCI) compliance is important...

Read more
Education and Training

Education and Training

Image Source In the NICE Workforce Framework, Education and Training in cybersecurity work is where a person...

Read more
Encrypt

Encrypt

Encrypt is the generic term encompassing encipher and encode, which means to convert plaintext to...

Read more
Indicator

Indicator

Image Source An indicator is an occurrence or sign that an incident may have occurred or may be in...

Read more
Chip and Pin Benefits Training

Chip and Pin Benefits Training

All credit and debit cards are now being made with "a computer that is 1/4 the size of a postage stamp" this...

Read more
PCI DSS Training

PCI DSS Training

PCI DSS stands for Payment Card Industry Data Security Standard. This is the standard that all organizations must...

Read more
Testimonials

See who's talking about Cyberhoot

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director
"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Jeremy Treister, CMIT Solutions of Chicago Downtown, President
"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management