Blog > Page 2

Stay sharp with security insights

HowTo: Microsoft PowerShell Script: Add Phishing Domains

HowTo: Microsoft PowerShell Script: Add Phishing Domains

Add CyberHoot to Safe Senders Listing Adding senders to end-users "safe senders" list will remove the "Some...

Read more
HowTo: Setup Automatic Mode in CyberHoot on the Power Platform

HowTo: Setup Automatic Mode in CyberHoot on the Power Platform

CyberHoot Power Platform: Automatic Mode. The instructions below provide a walkthrough on how to add a customer...

Read more
HowTo: Add a New PDF Policy

HowTo: Add a New PDF Policy

This article provides steps on how to add a new governance policy into CyberHoot. How to Add a Policy to a Group...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

HowTo: Assign Existing Training Programs from Program Library

HowTo: Assign Existing Training Programs from Program Library

These steps outline how to assign a training program and the frequency at which the videos are being sent out to...

Read more
HowTo: Create Your Own Unique Training Program

HowTo: Create Your Own Unique Training Program

This video helps you create your own unique training program within CyberHoot. The video shows how to set a...

Read more
HowTo: Manually Send Welcome Emails

HowTo: Manually Send Welcome Emails

Power Platform: You can manually send the welcome email two ways: Individually: Under "User-Group-Manager" in...

Read more
HowTo: Avanan Allow-Listing in Microsoft O365

HowTo: Avanan Allow-Listing in Microsoft O365

This HowTo article explains how to configure Avanan's Allow Listing rules to allow Attack Phishing tests to reach...

Read more
HowTo: Avanan Allow-Listing in Google Workspace

HowTo: Avanan Allow-Listing in Google Workspace

This HowTo article explains how to configure Avanan's Allow Listing to allow Attack Phishing tests to reach end...

Read more
HowTo: How to Add Users via Google Workspace Sync

HowTo: How to Add Users via Google Workspace Sync

Adding users to CyberHoot's Power and Autopilot Platforms via Google Workspace Sync If your company uses Google...

Read more
HowTo: Allow-List in Barracuda

HowTo: Allow-List in Barracuda

If you're utilizing Barracuda's Email Security Gateway, you can white-list CyberHoot IP Addresses and Domain Name...

Read more
HowTo: How to Archive Users via Azure Sync (Entra ID)

HowTo: How to Archive Users via Azure Sync (Entra ID)

Archiving users on CyberHoot's Power Platform via Azure AD Sync (using Graph API) If your company uses Microsoft...

Read more
HowTo: Send User Outstanding Assignments

HowTo: Send User Outstanding Assignments

These instructions will guide you through the process of sending reminders for outstanding assignments to all...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer