Blog > Page 2

Technology


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
HowTo: Dark Web Workflow

HowTo: Dark Web Workflow

Dark Web Reporting Within CyberHoot: CyberHoot offers dark web monitoring and reporting for its clients by...

Read more
HowTo: Allow-List CyberHoot’s Mail-Relay IP Address – Mimecast

HowTo: Allow-List CyberHoot’s Mail-Relay IP Address – Mimecast

This article will walk you through setting up allow list in Mimecast. The required IP address and Domain name...

Read more
HowTo: Add CyberHoot’s RSS Feed

HowTo: Add CyberHoot’s RSS Feed

CyberHoot delivers tremendous value to businesses and Managed Service Providers (MSPs) through a steady stream of...

Read more
HowTo: Allow-list CyberHoot Phishing in AppRiver

HowTo: Allow-list CyberHoot Phishing in AppRiver

How to Allow-list in AppRiverIf you're using AppRiver's SpamLab spam filtering, you can add CyberHoot to your...

Read more
HowTo: Allow-List CyberHoot’s AttackPhish Simulation Servers in M365
HowTo: Access My Assignments

HowTo: Access My Assignments

The "My Assignments" section helps you stay on top of your training. You can: See which assignments are still...

Read more
HowTo: Enable Multifactor Authentication within CyberHoot

HowTo: Enable Multifactor Authentication within CyberHoot

The Importance of Multi-Factor Authentication (MFA) into Cloud/SaaS Applications: CyberHoot recommends clients...

Read more
HowTo: Allow-List CyberHoot’s Domain Name and IP Addresses – Google Workspace

HowTo: Allow-List CyberHoot’s Domain Name and IP Addresses – Google Workspace

New CyberHoot businesses need to allow our training and phishing emails to reach their user's inboxes directly....

Read more
Allow Listing CyberHoot in Sophos EndPoint Protection

Allow Listing CyberHoot in Sophos EndPoint Protection

When Phish testing environments where Sophos EDR is present, you will need to enable allow listing and add the...

Read more
HowTo: How to Add Users via M365 (Entra ID) on Power Platform

HowTo: How to Add Users via M365 (Entra ID) on Power Platform

Adding users to CyberHoot's Power Platform via Azure AD/ Entra ID Sync (using Graph API) If your company uses...

Read more
HowTo: Reauthorize Entra ID – Client Secret

HowTo: Reauthorize Entra ID – Client Secret

The Entra ID sync is not functioning because the provided client secret has expired. To resolve this, you will...

Read more
HowTo: Allow-List by X-Header in Exchange 2013, 2016, or Microsoft 365

HowTo: Allow-List by X-Header in Exchange 2013, 2016, or Microsoft 365

Allow-Listing X-Headers is necessary in order for CyberHoot to send simulated phishing emails to bypass your...

Read more
Testimonials

See who's talking about Cyberhoot

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer
"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."
Cris White, cyberSuite, Head of Cyber Advisory