"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
This document explains how CyberHoot AttackPhish populates the various tracking fields when running phishing...
Read more
This guide explains how the Customer HootScore works. It describes what it measures, how it is calculated, and how...
Read more
This guide explains how the user scoring system works so you can configure and monitor it effectively for your...
Read more
These instructions provide a step-by-step guide for deleting a customer in CyberHoot’s multi-tenant platforms...
Read more
These instructions provide a step-by-step walkthrough on how to upload a new video to CyberHoot and assign it to a...
Read more
These instructions provide a step-by-step guide for adding a Super Admin to CyberHoot’s multi-tenant platforms...
Read more
This article explains how to add Local Users to CyberHoot on both Power and Autopilot Platforms. To add users via...
Read more
Unique Roles within CyberHoot There are five distinct roles within the CyberHoot platform. These roles are...
Read more
This article provides steps on how to add a new governance policy into CyberHoot. How to Add a Policy to a Group...
Read more
Power Platform: You can manually send the welcome email two ways: Individually: Under "User-Group-Manager" in...
Read more
This HowTo article explains how to configure Avanan's Allow Listing rules to allow Attack Phishing tests to reach...
Read more
This HowTo article explains how to configure Avanan's Allow Listing to allow Attack Phishing tests to reach end...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
