Reducing SaaS Security Risks in 2024
Explore 5 essential strategies for SaaS security, including identity management, data encryption, SSPM tools and more! Read now!
The Meta Breach: Game of Thrones Level Walk of Shame
This article dives into the Meta lawsuit for the 2019 breach that exposed 600 million unencrypted passwords in plain text. Read now!
Securing Social Media: How SSPM Protects Against Cyber Threats
Learn how social media accounts pose a cybersecurity risk and how SSPM can protect your business through multiple different ways! Read now!
Session Hijacking: How Cybercriminals Take Over Your Online Sessions
Learn how to protect yourself from evolving Session Hijacking threats with expert tips on secure connections, encryption, 2FA, and more. Read now!
How to Spot a Phishing Link: Tips to Keep You Safe
Learn expert tips to spot phishing links and protect yourself from cyber threats, including how to check URLs, avoid scams, and stay secure online. Read now!
Customer Spotlight
Liking CyberHoot? We need your help. Please leave us a review using the links below!
TrustPilot.com | G2.com | Capterra.com | Google.com | TrustRadius.com | Gartner.com
-G2
For more information on how to leave a CyberHoot review, please watch the brief video overviews below. Note: to avoid fraudulent reviews, each review website will require to you to create and validate your identity through an email account registration process.
What our Clients think about HootPhish
Hear what Michael Gibby from SEQ IT Services has to say about HootPhish, our positive reinforcement, assignment-based phishing tool!
CyberHoot Awarded Badges From G2
A Session Hijacking Attack occurs when a user session is taken over by an attacker. A normal session starts when you log into a service, for example your banking application, and ends when you log out. The session hijacking attack relies on the attacker’s knowledge of your session cookie, so it is also called “cookie hijacking” or “cookie side-jacking”. Although any computer session could be hijacked, session hijacking most commonly applies to browser sessions and web applications. In most cases when you log into a web application, the server sets a temporary session cookie in your browser to remember that you are currently logged in and authenticated. HTTP is a stateless protocol and session cookies attached to every HTTP header are the most popular way for the server to identify your browser or your current session.
Recently Added Features
General Release Notes
- Implemented glacial and ultralight foundational program speeds and a fade-in effect on all cards in Power and Autopilot.
- Added transcripts to English videos.
- Added compliance assurance setting to power and updated quiz / phishing functionality to account for this setting and allow for unlimited amount of attempts on training.
- Added compliance assurance setting to Autopilot.
- Revamped my assignments and training to improve user experience.
- Updated quiz results to let users know when they missed selecting a correct answer on multiple choice questions.
- Updated emails and 2FA text message to use the name set in MSP settings instead of INI file for communication in Power.
- Updated ‘Unsafe’ labels in HootPhish to instead be ‘Suspicious’.
- Added walkthrough of tips/explanations in phishing results and made a few small design changes across phishing and quizzes.
- Improved Entra ID and Google sync error alerts and reporting.
- Added New HootPhish Challenge results page for any MSP seeking to promote CyberHoot’s HootPhish Challenge for their prospects and clients. HootPhish Challenge is a timed, gamified competition to measure how quickly someone can correctly label all the indicators of our Phishing Simulation Safe or Suspicious.
- Updated youtube embed URL to fix the issue with some users not being able to view youtube videos due to network restrictions.
- Updated restart user training to recalculate hoot scores clear attempt history.
- Updated Hoot Ranks in Power platform and Autopilot to show non-compliant owl and status instead of showing Hoot Scores when users are non-compliant.
- Updated emails to use customer name instead of MSP name in the header.
- Fixed issue with logo transparency and duplicates in the MSP marketing materials infographics.
- Added compliance checks to login.
- Updating the MSP name will also update the MSP customer name in the API in Autopilot.
- Fixed issue with HootPhish assignments preventing them from being assigned at the correct frequency.
- Added groups to upcoming assignments tables on the dashboard.
- Added ability to add multiple managers in Autopilot.
- Updated mass customer actions in Autopilot to only display if there are three or more customers in the system.
Enroll in CyberHoot’s Referral Program today and start earning a 20% share of all revenue generated for one year by those who register through your exclusive referral link. As a referral partner, not only will you receive financial rewards, but you’ll also experience the satisfaction of aiding others in becoming more security-conscious, safeguarding them against cyber threats. Don’t hesitate, sign up now at https://cyberhoot.com/referral-program/.
Referral through Autopilot’s Dashboard:
Join CyberHoot in our mission to create a more aware and better secured world! Recommend CyberHoot Autopilot to a friend, and they will enjoy a complimentary first month. For every new sign up who uses your referral link, you will receive a free month added to your account. This offer is exclusively for first-time CyberHoot registrants.
CyberHoot's Social Media
Instant Access
CyberHoot provides password-less access. End user frustration accessing training is gone. Click an email link for instant access!
Automatic
Compliance
Employee reminders to manager escalations, CyberHoot delivers automated, hands-off, extremely high compliance.
Product Training
CyberHoot includes limitless product training for your IT Projects. Teach users how to use new software on their terms how they want to learn.
Micro Training
Cyber"Hoots" are 5 minutes or less ensuring your staff get trained quickly and effectively.
The Power of Open
CyberHoot is an open. Any video or PDF can train and govern your employees.
Effective
Many clients routinely achieve 90% or greater compliance to policies, training, and phish testing.