Blog

Technology


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
HowTo: Allow-List in MailProtector

HowTo: Allow-List in MailProtector

This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end...

Read more
HowTo: Allow-List in DNS Filter

HowTo: Allow-List in DNS Filter

This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end...

Read more
HowTo: Allow-List in BitDefender

HowTo: Allow-List in BitDefender

This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end...

Read more
HowTo: Understand CyberHoot AttackPhish Field Definitions and Training Workflow

HowTo: Understand CyberHoot AttackPhish Field Definitions and Training Workflow

This document explains how CyberHoot AttackPhish populates the various tracking fields when running phishing...

Read more
HowTo: Understand Customer Hoot Scoring System

HowTo: Understand Customer Hoot Scoring System

This guide explains how the Customer HootScore works. It describes what it measures, how it is calculated, and how...

Read more
HowTo: Understand User Scoring System (HootScore)

HowTo: Understand User Scoring System (HootScore)

This guide explains how the user scoring system works so you can configure and monitor it effectively for your...

Read more
HowTo: Delete a Customer in CyberHoot.

HowTo: Delete a Customer in CyberHoot.

These instructions provide a step-by-step guide for deleting a customer in CyberHoot’s multi-tenant platforms...

Read more
HowTo: Add and Assign a New Video to a User Group in the Power Platform

HowTo: Add and Assign a New Video to a User Group in the Power Platform

These instructions provide a step-by-step walkthrough on how to upload a new video to CyberHoot and assign it to a...

Read more
HowTo: Add an MSP Super Admin to CyberHoot.

HowTo: Add an MSP Super Admin to CyberHoot.

These instructions provide a step-by-step guide for adding a Super Admin to CyberHoot’s multi-tenant platforms...

Read more
HowTo: Determine Roles in CyberHoot

HowTo: Determine Roles in CyberHoot

Unique Roles within CyberHoot There are five distinct roles within the CyberHoot platform. These roles are...

Read more
HowTo: Manually Send Welcome Emails

HowTo: Manually Send Welcome Emails

Power Platform: You can manually send the welcome email two ways: Individually: Under "User-Group-Manager" in...

Read more
HowTo: Avanan Allow-Listing in Microsoft O365

HowTo: Avanan Allow-Listing in Microsoft O365

This HowTo article explains how to configure Avanan's Allow Listing rules to allow Attack Phishing tests to reach...

Read more
Testimonials

See who's talking about Cyberhoot

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO
"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."
Robyn Dunlap, Franklin Schools, Director of Technology
"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Jeremy Treister, CMIT Solutions of Chicago Downtown, President