HowTo

Soar through set up with ease.

Quickly access our step-by-step guides and answers to help you make the most of CyberHoot.

HowTo: Allow-List by X-Header in Exchange 2013, 2016, or Microsoft 365

HowTo: Allow-List by X-Header in Exchange 2013, 2016, or Microsoft 365

Allow-Listing X-Headers is necessary in order for CyberHoot to send simulated phishing emails to bypass your...

Read more
HowTo: Complete an Assignment-based Phishing Test

HowTo: Complete an Assignment-based Phishing Test

This video provides end users with a quick overview in 2 min. of their Phishing Test by Assignment service.  End...

Read more
HowTo:  Optional Training Assignments

HowTo: Optional Training Assignments

Overview CyberHoot provides the ability to optionally assign policies, videos, and programs to your users....

Read more
HowTo: Edit CyberHoot Policy Templates for your Use

HowTo: Edit CyberHoot Policy Templates for your Use

This video outlines how an MSP or Client admin can download and customize CyberHoot cybersecurity template...

Read more
HowTo: Allow-List CyberHoot – Personal Gmail Account

HowTo: Allow-List CyberHoot – Personal Gmail Account

If you sign up to receive CyberHoot BootCamp as an individual, you may need to allow-list the CyberHoot Domain in...

Read more
HowTo: Allow-List CyberHoot’s Mail-Relays in M365

HowTo: Allow-List CyberHoot’s Mail-Relays in M365

High-Level Instructions: This HowTo video walks you through allow-listing CyberHoot’s Mail-Relay by either...

Read more
HowTo Restore an Archived User in a Training Program

HowTo Restore an Archived User in a Training Program

This HowTo video outlines how to restore an archived user or employee in a Training Program. When an archived...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President