"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Unique Roles within CyberHoot There are five distinct roles within the CyberHoot platform. These roles are...
Read moreThese instructions provide a step-by-step guide for adding a Super Admin to CyberHoot’s multi-tenant Power...
Read morePower Platform: You can manually send the welcome email two ways: Individually: Under "User-Group-Manager" in...
Read moreThis HowTo article explains how to configure Avanan's Allow Listing rules to allow Attack Phishing tests to reach...
Read moreThis HowTo article explains how to configure Avanan's Allow Listing to allow Attack Phishing tests to reach end...
Read moreAdding users to CyberHoot's Power and Autopilot Platforms via Google Workspace Sync If your company uses Google...
Read moreIf you're utilizing Barracuda's Email Security Gateway, you can white-list CyberHoot IP Addresses and Domain Name...
Read moreArchiving users on CyberHoot's Power Platform via Azure AD Sync (using Graph API) If your company uses Microsoft...
Read moreThese steps will show you how to send a nudge to all non-compliant users. In the Power Platform: Click on...
Read moreAre your users having issues with an endless looping with authentication emails after trying to reach your 'My...
Read moreDark Web Reporting Within CyberHoot: CyberHoot offers dark web monitoring and reporting for its clients by...
Read moreThis article will walk you through setting up allow list in Mimecast. The required IP address and Domain name...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.