HowTo: Avanan Allow-Listing in Google Workspace
This HowTo article shows how to allow-list Avanan in Google Workspace.
How to use CyberHoot’s technology.
This HowTo article shows how to allow-list Avanan in Google Workspace.
This HowTo article shows how to allow-list Avanan in Microsoft O365.
This HowTo article shows how to manually send “Welcome Emails” within CyberHoot’s Power and Autopilot platforms.
Microsoft GCC Azure Sync requires an Enterprise Application currently within CyberHoot. This article explains how to set this up.
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
How to Allow-list in AppRiver If you’re using AppRiver’s SpamLab spam filtering, you can add CyberHoot to your whitelist to ensure that our simulated phishing test emails and training notifications …
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
When Phish testing environments where Sophos EDR is present, you will need to enable allow listing and add the CyberHoot addresses. Otherwise the Website Management defenses will intercept any attempt …
Are your users having issues with an endless looping with authentication emails after trying to reach your ‘My Assignments’ page on CyberHoot? One common factor that causes these issues are …
Unique Roles (5) within the CyberHoot Tool: These five (5) roles are all mutually exclusive. Because you are a Manager, does not mean you are a user. Same for Administrators …
Allow-Listing X-Headers is necessary in order for CyberHoot to send simulated phishing emails to bypass your mail filter. We recommend whitelisting by IP address or hostname but depending on your …
Microsoft GCC Azure Sync requires an Enterprise Application currently within CyberHoot. This article explains how to set this up.
One of the greatest value contributions CyberHoot can make to any Business or Managed Service Provider is the wealth of Social Media content we produce. Our Cybrary contains over 500 …
Attack-based phishing tests are becoming less common as they are replaced with more positive, educational, and effective Assignment-based tests. This video and overview teaches you how to configure the attack-based phishing tests in CyberHoot. You should also consider switching to assignment-based in the future if possible.
This video will walk you through how to share a survey in CyberHoot once you have either created one or found one in our Survey Library to share with people. …
This video outlines step by step how to find your BitLocker Recovery Key on your computer. Visit https://cyberhoot.com/howto/ for all of our HowTo instructional videos. Watch this video on YouTube …
This video outlines how to add a local Client Administrator to CyberHoot. This is not to be confused with adding an MSP Super User, which is outlined in this video …
This video will give you step by step directions on how to add a Super User to CyberHoot’s multi-tenant SaaS platform. You typically want to add your own staff at …
This video outlines step by step how to add a new video into CyberHoot and then assign that video to a specific user group. Make sure when adding a video …
This video gives you an overview of all the features available on CyberHoot’s dashboard. Watch this video to see where each button brings you and how to navigate the CyberHoot …
In this HowTo video you’ll learn how to assign a PDF document (policy, process, memorandum) to a specific group of users in your organization.
To learn how to send users that haven’t completed their assignments an email reminder in less than the time it takes to brush your teeth, watch this very short informational …
Watch this HowTo video to get an overview of CyberHoot’s “Manager Compliance Report” that is sent out every Monday to all manager’s inboxes. You can now generate customized reports in …
This video outlines how an MSP or Client admin can download and customize CyberHoot cybersecurity template policies to suite their purposes. The video reviews the important steps you need to …
If you’re utilizing Barracuda’s Email Security Gateway, you can white-list CyberHoot IP Addresses and Domain Name to allow our simulated phishing test emails and training notifications to get through to …
New CyberHoot businesses need to allow our training and phishing emails to reach their user’s inboxes directly. This article describes the two steps needed to make this happen. Note: If …
This video walks you through how to access ‘My Assignments‘. When you visit your assignments here you can view outstanding assignments and complete them, you can re-watch previous training videos …
Before CyberHoot can email training assignments, policies, surveys, or phishing tests reliably to targeted email accounts, our mail relays need to be permitted to do so through whitelisting. Here’s how you do that in a few easy steps and videos.
This article will walk you through setting up allow list in Mimecast. The required IP address and Domain name information is found in this HowTo article: CyberHoot Email-Relay IP Addresses, …
What is Two-Factor or Multi-Factor Authentication? Multi-Factor, also known as Two-Factor Authentication (aka: MFA and 2FA) is the gold standard for strong authentication. Banks mandate its use when logging into …