How to change the Admin's or Users' permission/role to the HacWare customer dashboard?
top of page
Please follow these steps to change the user permission to the HacWare tenant/client account to the dashboard: From the client dashboard...
How to activate HacWare licenses?
Please follow these steps to activate HacWare licenses for a tenant/client account from the dashboard: From the client dashboard -...
HacWare announces strategic partnership with Pax8 to make set-and-forget cybersecurity awareness training available to IT Solution Providers around the world.
Agreement with AI-powered HacWare to Provide Smart Security Awareness Solutions; Saving MSP Up To 40% in Labor Costs. BROOKLYN, New York...
How to remove a tenant account from the partner dashboard?
Please follow these steps to remove a tenant/client account from the dashboard: From the partner dashboard - https://hacware.com/api/part...
TD SYNNEX and HacWare partner to deliver modern, elevated cybersecurity education and training to IT Solution Providers
HacWare will be available for service providers in the TD Synnex marketplace BROOKLYN, New York — February 15, 2024 — HacWare, Inc., an...
Proactive protection to reduce your customer’s risk
In today’s ever-evolving cyber threat landscape, having robust cybersecurity tools in place that will proactively protect your customers...
Automatic enrollment for new users
Automatically enroll new users into your lesson plan with the Automatic Enrollment feature. Simplify onboarding and save time!
Live actor training is now available from HacWare!
Build valuable cyber awareness & skills through HacWare's live actor training. Engaging micro courses cover a wide range of crucial topics.
Phishing Reporter for Outlook Mobile
Empower your Outlook Mobile users with the Phishing Reporter button! Easily report phishing threats and protect against cyber attacks.
Phishing Incident Response Plan: Investigation stage
Discover the crucial steps to take during the investigation stage of a phishing incident response plan. Learn how to catch attacks early.
Phishing Incident Response Plan: Recovery stage
Discover the crucial steps to take during the recovery stage of a phishing incident through remediation and prevention.
Phishing Incident Response Plan: Communication stage
Learn how to effectively communicate during the communication stage of a phishing incident response plan.
bottom of page