If your company uses Google Workspace, you can use it as a simple and effective way to manage users within CyberHoot. Follow the steps below:
The video below shows you how to accomplish these steps as well as how to set up managers for each user.
Defining managers for each employee in CyberHoot is very important. Employee managers are Carbon Copied (CC’d) on reminder emails sent to employees. This only happens when an Employee has not completed an assignment by the due date.
This short video shows how to set up Google Workspace sync in CyberHoot for the Power Platform.
https://www.youtube.com/embed/entho13wHLk?si=ujNHt3CMCD1I2huM
Step 1- Permission and Consent: Administrator logs into Google and CyberHoot is assigned read-only permissions using the principle of least privilege, assigning the permissions listed below.
Step 2 – Token Acquisition: CyberHoot requests an OAuth 2.0 token from Google Workspace. Note that CyberHoot will not know nor store the password used by the admin.
Step 3 – Token Grant: Google validates the request and, if successful, issues an access token. This token encapsulates the permissions granted to CyberHoot.
Step 4 – Accessing Resources with the Token: CyberHoot uses this token to access the information on the table above. This information is used to add users to CyberHoot.
Image Sources: DALL-E – OpenAI
CyberHoot has many resources available to you. Below are links to all of our resources; please check them out and use them whenever you like:
Note: If you’d like to subscribe to our newsletter, visit any link above (besides infographics) and enter your email address on the right-hand side of the page, and click ‘Send Me Newsletters’.
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.