"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Quickly access our step-by-step guides and answers to help you make the most of CyberHoot.
These steps will guide you on how to restore an archived user.How to restore local archived users on the Power...
Read moreThis brief video (under 2 minutes) gives users a quick overview of their HootPhish assignment. If you're unsure...
Read moreThe "My Assignments" section helps you stay on top of your training. You can:See which assignments are still...
Read moreThese instructions provide a step-by-step walkthrough on how to upload a new video to CyberHoot and assign it to a...
Read moreThese instructions provide a step-by-step guide for adding a Super Admin to CyberHoot’s multi-tenant Power...
Read moreThe following steps explain how to add a local Client Administrator to CyberHoot within the Power Platform,...
Read moreThis article details how to setup and edit your billing information in CyberHoot's Power platform. Once...
Read moreOverview CyberHoot gives you the flexibility to assign policies, videos, and programs to your users as...
Read moreThe Challenges of Traditional Phish Testing Traditional attack-based phishing tests have often felt punitive to...
Read moreOverview CyberHoot's API allows for the following information to be pulled from the platform: Customers...
Read moreThe Importance of Multi-Factor Authentication (MFA) into Cloud/SaaS Applications: CyberHoot recommends clients...
Read moreNew CyberHoot businesses need to allow our training and phishing emails to reach their user's inboxes directly....
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.