Blog

Technology


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
HowTo: Add and Assign a New Video to a User Group in the Power Platform

HowTo: Add and Assign a New Video to a User Group in the Power Platform

These instructions provide a step-by-step walkthrough on how to upload a new video to CyberHoot and assign it to a...

Read more
HowTo: Add an MSP Super Admin to CyberHoot.

HowTo: Add an MSP Super Admin to CyberHoot.

These instructions provide a step-by-step guide for adding a Super Admin to CyberHoot’s multi-tenant platforms...

Read more
HowTo: Determine Roles in CyberHoot

HowTo: Determine Roles in CyberHoot

Unique Roles within CyberHoot There are five distinct roles within the CyberHoot platform. These roles are...

Read more
HowTo: Manually Send Welcome Emails

HowTo: Manually Send Welcome Emails

Power Platform: You can manually send the welcome email two ways: Individually: Under "User-Group-Manager" in...

Read more
HowTo: Avanan Allow-Listing in Microsoft O365

HowTo: Avanan Allow-Listing in Microsoft O365

This HowTo article explains how to configure Avanan's Allow Listing rules to allow Attack Phishing tests to reach...

Read more
HowTo: Avanan Allow-Listing in Google Workspace

HowTo: Avanan Allow-Listing in Google Workspace

This HowTo article explains how to configure Avanan's Allow Listing to allow Attack Phishing tests to reach end...

Read more
HowTo: How to Add Users via Google Workspace Sync

HowTo: How to Add Users via Google Workspace Sync

Adding users to CyberHoot's Power and Autopilot Platforms via Google Workspace Sync If your company uses Google...

Read more
HowTo: Allow-List in Barracuda

HowTo: Allow-List in Barracuda

If you're utilizing Barracuda's Email Security Gateway, you can white-list CyberHoot IP Addresses and Domain Name...

Read more
HowTo: How to Archive Users via Azure Sync (Entra ID)

HowTo: How to Archive Users via Azure Sync (Entra ID)

Archiving users on CyberHoot's Power Platform via Azure AD Sync (using Graph API) If your company uses Microsoft...

Read more
HowTo: Send All Non-Compliant Users an Assignment Reminder

HowTo: Send All Non-Compliant Users an Assignment Reminder

These steps will show you how to send a nudge to all non-compliant users. In the Power Platform: Click on...

Read more
HowTo: Fix ‘My Assignment’ Link Issues (Looping)

HowTo: Fix ‘My Assignment’ Link Issues (Looping)

Are your users having issues with an endless looping with authentication emails after trying to reach your 'My...

Read more
HowTo: Dark Web Workflow

HowTo: Dark Web Workflow

Dark Web Reporting Within CyberHoot: CyberHoot offers dark web monitoring and reporting for its clients by...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."

Tim Ward, Goodwill of Chattanooga, Director, Information Technology

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering