"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
This HowTo article explains how to configure Avanan's Allow Listing rules to allow Attack Phishing tests to reach...
Read more
This HowTo article explains how to configure Avanan's Allow Listing to allow Attack Phishing tests to reach end...
Read more
Adding users to CyberHoot's Power and Autopilot Platforms via Google Workspace Sync If your company uses Google...
Read more
Archiving users on CyberHoot's Power Platform via Azure AD Sync (using Graph API) If your company uses Microsoft...
Read more
These instructions will guide you through the process of sending reminders for outstanding assignments to all...
Read more
These steps will show you how to send a nudge to all non-compliant users. In the Power Platform: Click on...
Read more
Are your users having issues with an endless looping with authentication emails after trying to reach your 'My...
Read more
Dark Web Reporting Within CyberHoot: CyberHoot offers dark web monitoring and reporting for its clients by...
Read more
CyberHoot delivers tremendous value to businesses and Managed Service Providers (MSPs) through a steady stream of...
Read more
How to Allow-list in AppRiverIf you're using AppRiver's SpamLab spam filtering, you can add CyberHoot to your...
Read more
Defining managers for each employee in CyberHoot is very important. Employee managers are Carbon Copied (CC’d)...
Read more
Detailed Instructions From...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
