Blog

Stay sharp with security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

CyberHoot Newsletter – June 2025

CyberHoot Newsletter – June 2025

CyberHoot June Newsletter: Stay Informed, Stay Secure Welcome to the June edition of CyberHoot’s newsletter,...

Read more
Shoot the Hoot with CyberHoot …RAW – Episode 2

Shoot the Hoot with CyberHoot …RAW – Episode 2

Welcome to Shoot the Hoot…RAW! Welcome back to Episode 2 of Shoot the Hoot—the weekly livestream hosted by...

Read more
Make Phishing Training Count with HootPhish

Make Phishing Training Count with HootPhish

Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Shoot the Hoot with CyberHoot …RAW – Episode 1

Shoot the Hoot with CyberHoot …RAW – Episode 1

Welcome to Shoot the Hoot…RAW! Welcome to the very first episode of Shoot the Hoot, a new weekly livestream...

Read more
Partner Spotlight Interview with Leslie Chiorazzi!

Partner Spotlight Interview with Leslie Chiorazzi!

Welcome to CyberHoot's Partner Spotlight! In this series, we celebrate outstanding MSPs who go above and...

Read more
HowTo: Allow-List CyberHoot’s AttackPhish Simulation Servers in M365
HowTo: Allow-list CyberHoot Phishing in AppRiver

HowTo: Allow-list CyberHoot Phishing in AppRiver

How to Allow-list in AppRiverIf you're using AppRiver's SpamLab spam filtering, you can add CyberHoot to your...

Read more
HowTo: Allow-List CyberHoot’s Mail-Relay IP Address – Mimecast

HowTo: Allow-List CyberHoot’s Mail-Relay IP Address – Mimecast

This article will walk you through setting up allow list in Mimecast. The required IP address and Domain name...

Read more
HowTo Restore an Archived User

HowTo Restore an Archived User

These steps will guide you on how to restore an archived user.How to restore local archived users on the Power...

Read more
HowTo: Send User Outstanding Assignments

HowTo: Send User Outstanding Assignments

These instructions will guide you through the process of sending reminders for outstanding assignments to all...

Read more
HowTo: Dark Web Workflow

HowTo: Dark Web Workflow

Dark Web Reporting Within CyberHoot:CyberHoot offers dark web monitoring and reporting for its...

Read more
HowTo: Complete a HootPhish Assignment

HowTo: Complete a HootPhish Assignment

This brief video (under 2 minutes) gives users a quick overview of their HootPhish assignment. If you're unsure...

Read more
Testimonials

See who's talking about Cyberhoot

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director