Blog > Page 4

Stay sharp with security insights

HowTo: Add Users to CyberHoot

HowTo: Add Users to CyberHoot

This article explains how to add Local Users to CyberHoot on both Power and Autopilot Platforms. To add users via...

Read more
HowTo: Move an Employee to a New Manager

HowTo: Move an Employee to a New Manager

These instructions will provide you with the steps to assign local user to a local  manager on the Power...

Read more
HowTo: Add a New Local Manager

HowTo: Add a New Local Manager

This article explains how to add a new local manager into CyberHoot's Platforms. If you prefer CyberHoot to...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

HowTo: Archive A Training Program

HowTo: Archive A Training Program

These are the steps to archive/remove a training program: Log InLog in to your account and make sure you're on...

Read more
HowTo: Add/Edit Human Resources (HR) Contacts

HowTo: Add/Edit Human Resources (HR) Contacts

HR Contacts are edited and assigned under each Group. The process to update the HR Contact for your MSP or a...

Read more
HowTo: Determine Roles in CyberHoot

HowTo: Determine Roles in CyberHoot

Unique Roles within CyberHoot There are five distinct roles within the CyberHoot platform. These roles are...

Read more
HowTo: Powershell script for avoiding SPAM, Clutter, Junk in 365

HowTo: Powershell script for avoiding SPAM, Clutter, Junk in 365

Microsoft M365 PowerShell Scripts:  Bypass SPAM, Clutter and Junk in M365. Microsoft PowerShell scripts...

Read more
HowTo: Microsoft PowerShell Script: Add Phishing Domains

HowTo: Microsoft PowerShell Script: Add Phishing Domains

Add CyberHoot to Safe Senders Listing Adding senders to end-users "safe senders" list will remove the "Some...

Read more
HowTo: Setup Automatic Mode in CyberHoot on the Power Platform

HowTo: Setup Automatic Mode in CyberHoot on the Power Platform

CyberHoot Power Platform: Automatic Mode. The instructions below provide a walkthrough on how to add a customer...

Read more
HowTo: Add a New PDF Policy

HowTo: Add a New PDF Policy

This article provides steps on how to add a new governance policy into CyberHoot. How to Add a Policy to a Group...

Read more
HowTo: Assign Existing Training Programs from Program Library

HowTo: Assign Existing Training Programs from Program Library

These steps outline how to assign a training program and the frequency at which the videos are being sent out to...

Read more
HowTo: Create Your Own Unique Training Program

HowTo: Create Your Own Unique Training Program

This video helps you create your own unique training program within CyberHoot.  This can be done as a direct...

Read more
Testimonials

See who's talking about Cyberhoot

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Jeremy Treister, CMIT Solutions of Chicago Downtown, President
"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."
Robyn Dunlap, Franklin Schools, Director of Technology
"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO
"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator