Blog

Stay sharp with security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Shoot the Hoot with CyberHoot …RAW – Episode 2

Shoot the Hoot with CyberHoot …RAW – Episode 2

Welcome to Shoot the Hoot…RAW! Welcome back to Episode 2 of Shoot the Hoot—the weekly livestream hosted by...

Read more
Make Phishing Training Count with HootPhish

Make Phishing Training Count with HootPhish

Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...

Read more
Shoot the Hoot with CyberHoot …RAW – Episode 1

Shoot the Hoot with CyberHoot …RAW – Episode 1

Welcome to Shoot the Hoot…RAW! Welcome to the very first episode of Shoot the Hoot, a new weekly livestream...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Partner Spotlight Interview with Leslie Chiorazzi!

Partner Spotlight Interview with Leslie Chiorazzi!

Welcome to CyberHoot's Partner Spotlight! In this series, we celebrate outstanding MSPs who go above and...

Read more
HowTo: Allow-List CyberHoot’s AttackPhish Simulation Servers in M365
HowTo: Allow-list CyberHoot Phishing in AppRiver

HowTo: Allow-list CyberHoot Phishing in AppRiver

How to Allow-list in AppRiverIf you're using AppRiver's SpamLab spam filtering, you can add CyberHoot to your...

Read more
HowTo: Allow-List CyberHoot’s Mail-Relay IP Address – Mimecast

HowTo: Allow-List CyberHoot’s Mail-Relay IP Address – Mimecast

This article will walk you through setting up allow list in Mimecast. The required IP address and Domain name...

Read more
HowTo Restore an Archived User

HowTo Restore an Archived User

These steps will guide you on how to restore an archived user.How to restore local archived users on the Power...

Read more
HowTo: Send User Outstanding Assignments

HowTo: Send User Outstanding Assignments

These instructions will guide you through the process of sending reminders for outstanding assignments to all...

Read more
HowTo: Dark Web Workflow

HowTo: Dark Web Workflow

Dark Web Reporting Within CyberHoot:CyberHoot offers dark web monitoring and reporting for its...

Read more
HowTo: Complete a HootPhish Assignment

HowTo: Complete a HootPhish Assignment

This brief video (under 2 minutes) gives users a quick overview of their HootPhish assignment. If you're unsure...

Read more
HowTo: Access My Assignments

HowTo: Access My Assignments

The "My Assignments" section helps you stay on top of your training. You can:See which assignments are still...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator