Blog

Technology


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
HowTo: Configure CyberHoot’s Report Phish Integration for Google Workspace

HowTo: Configure CyberHoot’s Report Phish Integration for Google Workspace

Google Workspace "Report Phish" Integration 🔹 Overview Gmail's built-in "Report Phishing" button...

Read more
HowTo: Configure CyberHoot’s Report Phish Integration for M365

HowTo: Configure CyberHoot’s Report Phish Integration for M365

Microsoft 365 Built-in “Report Phish” Integration 🔹Overview Microsoft 365 supports a...

Read more
HowTo: Allow-List in Perception Point

HowTo: Allow-List in Perception Point

CyberHoot – Perception Point Allowlisting Instructions Organizations using Perception Point for...

Read more
HowTo: Create Your Own Training with CustomHoots

HowTo: Create Your Own Training with CustomHoots

This article explains how Autopilot’s CustomHoots PowerUp works and provides guidance on creating your own...

Read more
HowTo: Report Delivery and Recipient Configuration Overview in Autopilot

HowTo: Report Delivery and Recipient Configuration Overview in Autopilot

This document outlines how report delivery and recipient configuration work across Partner and Tenant levels,...

Read more
HowTo: Fix False Opens and Clicks in AttackPhish Reports

HowTo: Fix False Opens and Clicks in AttackPhish Reports

Why Does My AttackPhish Report Show Users Opening and Clicking Emails They Never Saw? Overview ​If...

Read more
HowTo: Integrate CyberHoot with SyncroMSP (Autopilot Platform)

HowTo: Integrate CyberHoot with SyncroMSP (Autopilot Platform)

This guide walks you through setting up and managing the CyberHoot–SyncroMSP integration using the CyberHoot...

Read more
HowTo: Integrate CyberHoot with SyncroMSP (Power Platform)

HowTo: Integrate CyberHoot with SyncroMSP (Power Platform)

This guide walks you through setting up and managing the CyberHoot–SyncroMSP integration using the CyberHoot...

Read more
HowTo: Understand End-User Experience in CyberHoot

HowTo: Understand End-User Experience in CyberHoot

Overview CyberHoot provides a simple, engaging cybersecurity training experience designed to strengthen user...

Read more
HowTo: Allow-List in DNS Filter

HowTo: Allow-List in DNS Filter

This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end...

Read more
HowTo: Allow-List in BitDefender

HowTo: Allow-List in BitDefender

This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end...

Read more
HowTo: Allow-List in MailProtector

HowTo: Allow-List in MailProtector

This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."
Cris White, cyberSuite, Head of Cyber Advisory
“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer
"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst