HowTo

Soar through set up with ease.

Quickly access our step-by-step guides and answers to help you make the most of CyberHoot.

HowTo: Fix False Opens and Clicks in AttackPhish Reports

HowTo: Fix False Opens and Clicks in AttackPhish Reports

Why Does My AttackPhish Report Show Users Opening and Clicking Emails They Never Saw? Overview ​If...

Read more
HowTo: Integrate CyberHoot with SyncroMSP (Autopilot Platform)

HowTo: Integrate CyberHoot with SyncroMSP (Autopilot Platform)

This guide walks you through setting up and managing the CyberHoot–SyncroMSP integration using the CyberHoot...

Read more
HowTo: Integrate CyberHoot with SyncroMSP (Power Platform)

HowTo: Integrate CyberHoot with SyncroMSP (Power Platform)

This guide walks you through setting up and managing the CyberHoot–SyncroMSP integration using the CyberHoot...

Read more
HowTo: Understand End-User Experience in CyberHoot

HowTo: Understand End-User Experience in CyberHoot

Overview CyberHoot provides a simple, engaging cybersecurity training experience designed to strengthen user...

Read more
HowTo: Allow-List in DNS Filter

HowTo: Allow-List in DNS Filter

This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end...

Read more
HowTo: Allow-List in BitDefender

HowTo: Allow-List in BitDefender

This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end...

Read more
HowTo: Allow-List in MailProtector

HowTo: Allow-List in MailProtector

This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end...

Read more
HowTo: Understand CyberHoot AttackPhish Field Definitions and Training Workflow

HowTo: Understand CyberHoot AttackPhish Field Definitions and Training Workflow

This document explains how CyberHoot AttackPhish populates the various tracking fields when running phishing...

Read more
HowTo: Understand Customer Hoot Scoring System

HowTo: Understand Customer Hoot Scoring System

This guide explains how the Customer HootScore works. It describes what it measures, how it is calculated, and how...

Read more
HowTo: Understand User Scoring System (HootScore)

HowTo: Understand User Scoring System (HootScore)

This guide explains how the user scoring system works so you can configure and monitor it effectively for your...

Read more
HowTo: Delete a Customer in CyberHoot.

HowTo: Delete a Customer in CyberHoot.

These instructions provide a step-by-step guide for deleting a customer in CyberHoot’s multi-tenant platforms...

Read more
HowTo: Add and Assign a New Video to a User Group in the Power Platform

HowTo: Add and Assign a New Video to a User Group in the Power Platform

These instructions provide a step-by-step walkthrough on how to upload a new video to CyberHoot and assign it to a...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology
"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator