Blog

Training


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
You’ve Been Phished!

You’ve Been Phished!

But please don't panic.  This was only a test. Before landing here, you clicked on a phishing email sent by...

Read more
CyberHoot: Phishing Attacks

CyberHoot: Phishing Attacks

Spotting and Avoiding Phishing Attacks This foundational CyberHoot video teaches critical skills to identify...

Read more
CyberHoot: An Introduction to our Platform

CyberHoot: An Introduction to our Platform

Welcome to CyberHoot's cyber literacy 101 core curriculum videos.  This introductory video introduces end users...

Read more
CyberHoot: Two-Factor Authentication (2FA)

CyberHoot: Two-Factor Authentication (2FA)

What is 2FA and why is it Important? This video is part of CyberHoot's foundational cyber literacy 101 video...

Read more
CyberHoot: The Many Benefits of a Password Manager

CyberHoot: The Many Benefits of a Password Manager

This video is part of CyberHoot's Cyber Literacy program of six (6) videos.  It outlines the critical need for...

Read more
CyberHoot: Passwords, Passphrases, and More

CyberHoot: Passwords, Passphrases, and More

This video is part of CyberHoot's cyber literacy 101 program.  It summarizes the importance of password hygiene...

Read more
CyberHoot: WiFi Insecurities Explained

CyberHoot: WiFi Insecurities Explained

How to Reduce your WiFi Risks This is the sixth and final cyberliteracy 101 video in CyberHoot's core...

Read more
PCI Compliance Training

PCI Compliance Training

Payment Card Industry Card Brands and Governance Structure Payment Card Industry (PCI) compliance is important...

Read more
Chip and Pin Benefits Training

Chip and Pin Benefits Training

All credit and debit cards are now being made with "a computer that is 1/4 the size of a postage stamp" this...

Read more
PCI DSS Training

PCI DSS Training

PCI DSS stands for Payment Card Industry Data Security Standard. This is the standard that all organizations must...

Read more
Tokenization

Tokenization

Tokenization is a way for credit card information (also called the Primary Account Number or PAN) to not be used...

Read more
WannaCry Ransomware Explained and How to Protect Yourself From It

WannaCry Ransomware Explained and How to Protect Yourself From It

This video documents what the Wannacry ransomware virus did to companies and individuals throughout the world in...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Jeremy Treister, CMIT Solutions of Chicago Downtown, President
"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."
Ahmed Albalooshi, Advantari Digital Solutions, CEO
"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology