Blog > Page 2

Stay sharp with security insights

HowTo: Add/Edit Human Resources (HR) Contacts

HowTo: Add/Edit Human Resources (HR) Contacts

HR Contacts are edited and assigned under each Group. The process to update the HR Contact for your MSP or a...

Read more
HowTo: Determine Roles in CyberHoot

HowTo: Determine Roles in CyberHoot

Unique Roles within CyberHoot There are five distinct roles within the CyberHoot platform. These roles are...

Read more
HowTo: Powershell script for avoiding SPAM, Clutter, Junk in 365

HowTo: Powershell script for avoiding SPAM, Clutter, Junk in 365

Microsoft M365 PowerShell Scripts:  Bypass SPAM, Clutter and Junk in M365. Microsoft PowerShell scripts...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

HowTo: Microsoft PowerShell Script: Add Phishing Domains

HowTo: Microsoft PowerShell Script: Add Phishing Domains

Add CyberHoot to Safe Senders Listing Adding senders to end-users "safe senders" list will remove the "Some...

Read more
HowTo: Setup Automatic Mode in CyberHoot on the Power Platform

HowTo: Setup Automatic Mode in CyberHoot on the Power Platform

CyberHoot Power Platform: Automatic Mode. The instructions below provide a walkthrough on how to add a customer...

Read more
HowTo: Add a New PDF Policy

HowTo: Add a New PDF Policy

This article provides steps on how to add a new governance policy into CyberHoot. How to Add a Policy to a Group...

Read more
HowTo: Assign Existing Training Programs from Program Library

HowTo: Assign Existing Training Programs from Program Library

These steps outline how to assign a training program and the frequency at which the videos are being sent out to...

Read more
HowTo: Create Your Own Unique Training Program

HowTo: Create Your Own Unique Training Program

This video helps you create your own unique training program within CyberHoot.  This can be done as a direct...

Read more
HowTo: Manually Send Welcome Emails

HowTo: Manually Send Welcome Emails

Power Platform: You can manually send the welcome email two ways: Individually: Under "User-Group-Manager" in...

Read more
HowTo: Avanan Allow-Listing in Microsoft O365

HowTo: Avanan Allow-Listing in Microsoft O365

This HowTo article explains how to configure Avanan's Allow Listing rules to allow Attack Phishing tests to reach...

Read more
HowTo: Avanan Allow-Listing in Google Workspace

HowTo: Avanan Allow-Listing in Google Workspace

This HowTo article explains how to configure Avanan's Allow Listing to allow Attack Phishing tests to reach end...

Read more
HowTo: How to Add Users via Google Workspace Sync

HowTo: How to Add Users via Google Workspace Sync

Adding users to CyberHoot's Power and Autopilot Platforms via Google Workspace Sync If your company uses Google...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."

Ahmed Albalooshi, Advantari Digital Solutions, CEO

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director