"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Quickly access our step-by-step guides and answers to help you make the most of CyberHoot.
The Importance of Multi-Factor Authentication (MFA) into Cloud/SaaS Applications: CyberHoot recommends clients...
Read moreNew CyberHoot businesses need to allow our training and phishing emails to reach their user's inboxes directly....
Read moreUpdated: May 8th, 2025 This article is a reference to CyberHoot's mail relay IP Addresses and Domain names. The...
Read moreWhen Phish testing environments where Sophos EDR is present, you will need to enable allow listing and add the...
Read moreCyberHoot Power Platform: Automatic Type Customers The instructions below provide a walkthrough on how to add a...
Read moreIf you're using Proofpoint's spam filtering software, you can safelist (whitelist) CyberHoot to allow your users...
Read moreWelcome to the CyberHoot Autopilot Platform: A Guided Tour for New Administrators Starting with a new platform can...
Read moreWelcome to the CyberHoot Power Platform: A Guided Tour for New Administrators Starting with a new platform can...
Read moreAdding users to CyberHoot's Power Platform via Azure AD/ Entra ID Sync (using Graph API) If your company uses...
Read moreThis video was created specifically for MSPs with Super Admin access to CyberHoot's Power Platform and its...
Read moreThe Entra ID sync is not functioning because the provided client secret has expired. To resolve this, you will...
Read moreAllow-Listing X-Headers is necessary in order for CyberHoot to send simulated phishing emails to bypass your...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.