top of page
Creating a Google Group and Syncing Licenses to HacWare
Part 1: Create a Google Security Group Step 1: Access Google Admin Console Log in to your Google Admin Console at admin.google.com . Use...
How to set up Outlook 365 email injection
Note: Email injection only works for simulations where the sender's email is an email that is an active license from the email domain....
The Definitive Guide to Whitelisting Training Emails in Microsoft 365
We've all experienced Microsoft 365 being overprotective. Let's look at three ways to whitelist HacWare domains to ensure your end-users...
How to exclude HacWare Emails from Avanan Scanning?
To avoid HacWare phishing simulations and training emails from getting blocked by Avanan and stopping training from reaching the...
3 Benefits of Effective Risk Management in Cybersecurity
1️⃣ Protect and maintain business reputation 💼 A strong cybersecurity risk management program can help you prioritize critical risks and...
Using the Security Awareness API to build Advanced PHP Cybersecurity Apps
This tutorial provides step by step instructions on how to build your rocket ship cybersecurity app using the HacWare Security Awareness...
25 Twitter Templates on Cybersecurity
HacWare is committed to empowering busy professionals with the cybersecurity tools they need to bring awareness to cybersecurity issues...
7 Reasons Why Secure Coding is important to Security Awareness
It is important to train software developers as a part of your security awareness program on the complexities of data storage...
How to Prevent DDoS Attacks as a Software Developer?
What is a DDoS Attack? A Denial-of-Service attack or DoS attack targets a server, service, or network, in an attempt to overwhelm or...
How to Secure a Webpage from Key Leaks?
What is a Secret Key? Secret keys are commonly used amongst developers when they have to deal with APIs. A secret key, also known as a...
How to Secure Frontend code from Cross-Site Scripting (XSS) Attacks?
This tutorial describes the types of XSS attacks and the best security measures to test your frontend code against such attacks....
How to Secure a Docker Image?
. What is Docker? Docker revolutionizes the way we develop applications. Applications often can fall into a pit of having many languages,...
bottom of page