"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."
Detailed Instructions From...
Read moreThese steps will guide you on how to restore an archived user.How to restore local archived users on the Power...
Read moreThis brief video (under 2 minutes) gives users a quick overview of their HootPhish assignment. If you're unsure...
Read moreThis article details how to setup and edit your billing information in CyberHoot's Power platform. Once...
Read moreOverview CyberHoot gives you the flexibility to assign policies, videos, and programs to your users as...
Read moreThe Challenges of Traditional Phish Testing Traditional attack-based phishing tests have often felt punitive to...
Read moreOverview CyberHoot's API allows for the following information to be pulled from the platform: Customers...
Read moreThe Importance of Multi-Factor Authentication (MFA) into Cloud/SaaS Applications: CyberHoot recommends clients...
Read moreCyberHoot Power Platform: Automatic Type Customers The instructions below provide a walkthrough on how to add a...
Read moreIf you're using Proofpoint's spam filtering software, you can safelist (whitelist) CyberHoot to allow your users...
Read moreWelcome to the CyberHoot Autopilot Platform: A Guided Tour for New Administrators Starting with a new platform can...
Read moreWelcome to the CyberHoot Power Platform: A Guided Tour for New Administrators Starting with a new platform can...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.