"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Welcome to the CyberHoot Power Platform: A Guided Tour for New Administrators Starting with a new platform can...
Read moreAdding users to CyberHoot's Power Platform via Azure AD/ Entra ID Sync (using Graph API) If your company uses...
Read moreThis video was created specifically for MSPs with Super Admin access to CyberHoot's Power Platform and its...
Read moreThe Entra ID sync is not functioning because the provided client secret has expired. To resolve this, you will...
Read moreAllow-Listing X-Headers is necessary in order for CyberHoot to send simulated phishing emails to bypass your...
Read moreThis video provides end users with a quick overview in 2 min. of their Phishing Test by Assignment service. End...
Read morePlease note: Only Azure AD Government Community Cloud (GCC) environments need to follow these...
Read morePlease note: Only Azure AD Government Community Cloud (GCC) environments need to follow these...
Read morePlease note: Only Azure AD Government Community Cloud (GCC) environments need to follow these...
Read moreOverview CyberHoot provides the ability to optionally assign policies, videos, and programs to your users....
Read moreThis video outlines how an MSP or Client admin can download and customize CyberHoot cybersecurity template...
Read moreIf you sign up to receive CyberHoot BootCamp as an individual, you may need to allow-list the CyberHoot Domain in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.