Blog

Stay sharp with security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Your WiFi Might Be Watching You… Sort Of

Your WiFi Might Be Watching You… Sort Of

As smart homes get smarter, so do their habits of watching, sensing, and reporting. Enter WiFi Motion Detection, a...

Read more
Shoot the Hoot with CyberHoot …RAW – Episode 5

Shoot the Hoot with CyberHoot …RAW – Episode 5

Welcome to Shoot the Hoot…RAW! Welcome back to Episode 5 of Shoot the Hoot—the weekly livestream hosted by...

Read more
Shoot the Hoot with CyberHoot …RAW – Episode 4

Shoot the Hoot with CyberHoot …RAW – Episode 4

Welcome to Shoot the Hoot…RAW! Welcome back to Episode 4 of Shoot the Hoot—the weekly livestream hosted by...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

184 Million Passwords Leaked: Is Your Digital Doppelgänger Out There?

184 Million Passwords Leaked: Is Your Digital Doppelgänger Out There?

Spoiler alert: If you’re still using “password123” or “iloveyou” for your login… it’s time for an...

Read more
HowTo: Add and Assign a New Video to a User Group in the Power Platform

HowTo: Add and Assign a New Video to a User Group in the Power Platform

These instructions provide a step-by-step walkthrough on how to upload a new video to CyberHoot and assign it to a...

Read more
HowTo: Add an MSP Super Admin to CyberHoot.

HowTo: Add an MSP Super Admin to CyberHoot.

These instructions provide a step-by-step guide for adding a Super Admin to CyberHoot’s multi-tenant platforms...

Read more
HowTo: Add Users to CyberHoot

HowTo: Add Users to CyberHoot

This article explains how to add Local Users to CyberHoot on both Power and Autopilot Platforms. To add users via...

Read more
HowTo: Move an Employee to a New Manager

HowTo: Move an Employee to a New Manager

These instructions will provide you with the steps to assign local user to a local  manager on the Power...

Read more
HowTo: Add a New Local Manager

HowTo: Add a New Local Manager

This article explains how to add a new local manager into CyberHoot's Platforms. If you prefer CyberHoot to...

Read more
HowTo: Archive A Training Program

HowTo: Archive A Training Program

These are the steps to archive/remove a training program: Log InLog in to your account and make sure you're on...

Read more
HowTo: Add/Edit Human Resources (HR) Contacts

HowTo: Add/Edit Human Resources (HR) Contacts

HR Contacts are edited and assigned under each Group. The process to update the HR Contact for your MSP or a...

Read more
HowTo: Determine Roles in CyberHoot

HowTo: Determine Roles in CyberHoot

Unique Roles within CyberHoot There are five distinct roles within the CyberHoot platform. These roles are...

Read more
Testimonials

See who's talking about Cyberhoot

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator