"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Defining managers for each employee in CyberHoot is very important. Employee managers are...
Read moreHow to Allow-list in AppRiverIf you're using AppRiver's SpamLab spam filtering, you can add CyberHoot to your...
Read moreSuper Admins on Power/Partner Platform:Super administrators on the Power/Partner platform...
Read moreDark Web Monitoring Within CyberHoot:CyberHoot provides dark web monitor for its clients. ...
Read moreThe Importance of Multi-Factor Authentication (MFA) into Cloud/SaaS Applications: CyberHoot recommends clients...
Read moreIf you're using Proofpoint's spam filtering software, you can safelist (whitelist) CyberHoot to...
Read moreWhen Phish testing environments where Sophos EDR is present, you will need to enable allow...
Read moreUnique Roles (5) within the CyberHoot Tool: These five (5) roles are all mutually exclusive. Because you are...
Read moreCyberHoot ONLY requires enterprise applications for GCC Azure AD integration. All non-GCC Azure AD environments...
Read moreOne of the greatest value contributions CyberHoot can make to any Business or Managed Service Provider is the...
Read moreThis video will walk you through how to setup a phishing campaign in CyberHoot. Ensure you read our HowTo articles...
Read moreThis video will walk you through how to share a survey in CyberHoot once you have either created one or found one...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.