"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Welcome to Shoot the Hoot…RAW! Welcome back to Episode 5 of Shoot the Hoot—the weekly livestream hosted by...
Read moreWelcome to Shoot the Hoot…RAW! Welcome back to Episode 4 of Shoot the Hoot—the weekly livestream hosted by...
Read moreSpoiler alert: If you’re still using “password123” or “iloveyou” for your login… it’s time for an...
Read moreThese instructions provide a step-by-step walkthrough on how to upload a new video to CyberHoot and assign it to a...
Read moreThese instructions provide a step-by-step guide for adding a Super Admin to CyberHoot’s multi-tenant platforms...
Read moreThis article explains how to add Local Users to CyberHoot on both Power and Autopilot Platforms. To add users via...
Read moreThese instructions will provide you with the steps to assign local user to a local manager on the Power...
Read moreThis article explains how to add a new local manager into CyberHoot's Platforms. If you prefer CyberHoot to...
Read moreThese are the steps to archive/remove a training program: Log InLog in to your account and make sure you're on...
Read moreHR Contacts are edited and assigned under each Group. The process to update the HR Contact for your MSP or a...
Read moreUnique Roles within CyberHoot There are five distinct roles within the CyberHoot platform. These roles are...
Read moreMicrosoft M365 PowerShell Scripts: Bypass SPAM, Clutter and Junk in M365. Microsoft PowerShell scripts...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.