HowTo: Determine Roles in CyberHoot
Unique Roles (5) within the CyberHoot Tool: These five (5) roles are all mutually exclusive. Because you are a Manager, does not mean you are a user. Same for Administrators …
How to use CyberHoot’s technology.
Unique Roles (5) within the CyberHoot Tool: These five (5) roles are all mutually exclusive. Because you are a Manager, does not mean you are a user. Same for Administrators …
Overview Email protection vendors like ProofPoint can make it hard for cybersecurity companies that engage in Phish Testing to deliver their tests to employee inboxes. This article outlines the steps …
Allow-Listing X-Headers is necessary in order for CyberHoot to send simulated phishing emails to bypass your mail filter. We recommend whitelisting by IP address or hostname but depending on your …
This HowTo will walk you through how to set Microsoft Azure to allow CyberHoot to sync users, groups, and managers into the CyberHoot Training Platform. Here are the three main …
One of the greatest value contributions CyberHoot can make to any Business or Managed Service Provider is the wealth of Social Media content we produce. Our Cybrary contains over 500 …
This video will walk you through how to setup a phishing campaign in CyberHoot. Ensure you read our HowTo articles on whitelisting to ensure the emails reach you and your …
This video will walk you through how to share a survey in CyberHoot once you have either created one or found one in our Survey Library to share with people. …
This video outlines step by step how to find your BitLocker Recovery Key on your computer. Visit https://cyberhoot.com/howto/ for all of our HowTo instructional videos. Watch this video on YouTube
This video outlines how to add a local Client Administrator to CyberHoot. This is not to be confused with adding an MSP Super User, which is outlined in this video …
This video will give you step by step directions on how to add an MSP Super User. You would want to add your own staff at an MSP as Super …
This video outlines step by step how to add a new video into CyberHoot and then assign that video to a specific user group. Make sure when adding a video …
This video gives you an overview of all the features available on CyberHoot’s dashboard. Watch this video to see where each button brings you and how to navigate the CyberHoot …
In this HowTo video you’ll learn how to assign a PDF document (policy, process, memorandum) to a specific group of users in your organization.
To learn how to send users that haven’t completed their assignments an email reminder in less than the time it takes to brush your teeth, watch this very short informational …
Watch this HowTo video to get an overview of CyberHoot’s “Manager Compliance Report” that is sent out every Monday to all manager’s inboxes. httpv://www.youtube.com/watch?v=embed/8fi-kj-61uE
This video outlines how an MSP or Client admin can download and customize CyberHoot cybersecurity template policies to suite their purposes. The video reviews the important steps you need to …
If you’re utilizing Barracuda’s Email Security Gateway, you can white-list CyberHoot IP Addresses and Domain Name to allow our simulated phishing test emails and training notifications to get through to …
New CyberHoot businesses need to allow our training and phishing emails to reach their user’s inboxes directly. This article describes the two steps needed to make this happen. Note: If …
This video walks you through how to access MyCyberHoot. This feature can be accessed in two ways: By clicking the “My CyberHoot” link found near the bottom of each CyberHoot …
Before CyberHoot can email training assignments, policies, surveys, or phishing tests reliably to targeted email accounts, our mail relays need to be permitted to do so through whitelisting. Here’s how you do that in a few easy steps and videos.
This HowTo video will walk you through how to allow-list CyberHoot’s Mail-Relay IP Address in the email system of Mimecast. The required IP address and Domain name information is found …
What is Two-Factor or Multi-Factor Authentication? Multi-Factor, also known as Two-Factor Authentication (aka: MFA and 2FA) is the gold standard for strong authentication. Banks mandate its use when logging into …