HowTo: Dark Web Workflow
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
MSP helpful resources involving CyberHoot.
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
Sending Attack emails to your users for Phish Testing requires writing an Allow-List for CyberHoot Mail relays exempting them from filtration by ProofPoint. This is true for all phish testing platforms.
When Phish testing environments where Sophos EDR is present, you will need to enable allow listing of the CyberHoot CIDR. Otherwise the Website Management defenses will intercept any attempt to …
Unique Roles (5) within the CyberHoot Tool: These five (5) roles are all mutually exclusive. Because you are a Manager, does not mean you are a user. Same for Administrators …
Watch this video on YouTube Overview CyberHoot provides a free trial module for MSPs to pursue new cybersecurity business. This new CyberHoot Sales module enables MSPs to perform a quick …
Allow-Listing X-Headers is necessary in order for CyberHoot to send simulated phishing emails to bypass your mail filter. We recommend whitelisting by IP address or hostname but depending on your …
This HowTo will walk you through how to set Microsoft Azure to allow CyberHoot to sync users, groups, and managers into the CyberHoot Training Platform. Here are the three main …
One of the greatest value contributions CyberHoot can make to any Business or Managed Service Provider is the wealth of Social Media content we produce. Our Cybrary contains over 500 …
Attack-based phishing tests are becoming less common as they are replaced with more positive, educational, and effective Assignment-based tests. This video and overview teaches you how to configure the attack-based phishing tests in CyberHoot. You should also consider switching to assignment-based in the future if possible.
This video will walk you through how to share a survey in CyberHoot once you have either created one or found one in our Survey Library to share with people. …
This video outlines how to add a local Client Administrator to CyberHoot. This is not to be confused with adding an MSP Super User, which is outlined in this video …
This video will give you step by step directions on how to add a Super User to CyberHoot’s multi-tenant SaaS platform. You typically want to add your own staff at …
This video outlines step by step how to add a new video into CyberHoot and then assign that video to a specific user group. Make sure when adding a video …
This video gives you an overview of all the features available on CyberHoot’s dashboard. Watch this video to see where each button brings you and how to navigate the CyberHoot …
In this HowTo video you’ll learn how to assign a PDF document (policy, process, memorandum) to a specific group of users in your organization.
To learn how to send users that haven’t completed their assignments an email reminder in less than the time it takes to brush your teeth, watch this very short informational …
Watch this HowTo video to get an overview of CyberHoot’s “Manager Compliance Report” that is sent out every Monday to all manager’s inboxes. You can now generate customized reports in …
This video outlines how an MSP or Client admin can download and customize CyberHoot cybersecurity template policies to suite their purposes. The video reviews the important steps you need to …
If you’re utilizing Barracuda’s Email Security Gateway, you can white-list CyberHoot IP Addresses and Domain Name to allow our simulated phishing test emails and training notifications to get through to …
If you sign up to receive CyberHoot BootCamp as an individual, you may need to allow-list the CyberHoot Domain in your own personal Gmail account. Here’s the instructions in a …
Before CyberHoot can email training assignments, policies, surveys, or phishing tests reliably to targeted email accounts, our mail relays need to be permitted to do so through whitelisting. Here’s how you do that in a few easy steps and videos.
This HowTo video demonstrates how to resend all outstanding assignments to a single employee’s email address. Note: This email will contain links to ALL the employee’s outstanding assignments. It will …
This support HowTo video illustrates exactly how to electronically sign your name to complete any assignment in CyberHoot. Pro Tip: Make sure to type your name exactly as shown in …
This HowTo provides instructions for uploading a PDF policy to CyberHoot to govern your employees.
This support HowTo video outlines how to upload users by creating a CSV file and uploading it to CyberHoot for a bulk upload of users. This process is easier to …
What is Two-Factor or Multi-Factor Authentication? Multi-Factor, also known as Two-Factor Authentication (aka: MFA and 2FA) is the gold standard for strong authentication. Banks mandate its use when logging into …
This video was created specifically for MSP’s with SuperUser access to CyberHoot and its multi-tenant deployments. Regular Administrators will not have access to these menus. This video provides you a …