Welcome to the CyberHoot Power Platform: A Guided Tour for New Administrators
Starting with a new platform can feel like a big lift, but we are here to make it easy. This page features a collection of short overview videos designed to help you get comfortable using CyberHoot’s Power platform quickly and effectively.
We cover the key areas every new customer should understand, including:
These videos will help you hit the ground running and deliver meaningful cybersecurity improvements to your organization from day one. Let’s get started.
In this video we provide an overview of CyberHoot’s automated training mode and Dashboard overview. Learn some of the most common practices in rolling CyberHoot out to teach Cyber Literacy to your company’s employees.
This video describes the customer branding and configuration options available inside CyberHoot. Learn how to add your own company logo and set color palette branding to personalize emails and the website assignments. This video goes through the most common settings you’ll want to configure during initial setup.
This next video provides an overview of our governance Policy Module inside CyberHoot. With our governance policy templates you can quickly download, edit, and then upload to the CyberHoot portal to secure employee signatures on cybersecurity policies (Password, AUP, etc) or Human Resource policies. Any PDF you want can be uploaded and assigned to a unique group of users for legally binding signature capture. Compliance made easy.
This video outlines the video module settings and configuration overview.
This video outlines the common administrative settings of CyberHoot’s positive-reinforcement Phishing Simulations module.
Microsoft Entra ID lets you auto-manage CyberHoot users by group. Add users to enroll them, remove users to archive them.
Google Workspace lets you auto-manage CyberHoot users by group. Add users to enroll them, remove users to archive them.
Please email Support@CyberHoot.com for help.
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Cyberattacks usually start with phishing emails or weak passwords. This one did not. Security researchers...
Read more
Not surprising when Trouble Ensues Last summer, the interim head of a major U.S. cybersecurity agency uploaded...
Read more
And How to Fix Them Let me make an educated guess. You moved to Google Workspace because it was supposed to...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
