Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Texas HB 3834 Cyber Security Awareness Training Requirements
Published:
December 20, 2021

Texas HB 3834 Cyber Security Awareness Training Requirements

By:
Team Huntress
Share icon
Glitch effectGlitch effectGlitch effect

Did you know that Texas passed a new regulation for state employees to participate in a mandatory cyber security awareness training program?

In June of 2019, Texas State Legislature passed HB 3834, a bill requiring local and state government employees, and even state contractors, to complete a Department of Information Resources (DIR) approved cyber security awareness training program —like Huntress ! Hint: We’ve made security awareness training more flavorful than your favorite steak house!

Depending on your organization’s role as a state agency, local government entity, or contractor, you may be immediately impacted by this annual compliance training requirement, known as HB 3834. If your organization falls into scope, HB 3834 requires that a security awareness training program has been rolled out and completed by all required employees before June 14, 2020. That’s a pretty big burden if you haven’t established a formal security awareness training program yet.

But don’t worry, we are going to show you what is required, why this regulation came to be, and how you can comply with HB 3834 without stressing out.

Why is the HB 3834 Regulation Necessary?

It’s no secret that governments are now prime targets for hackers more than ever. In August 2019, the computer systems of 23 Texas municipalities were hit with a ransomware cyber attack that locked access to all computer files in one instance. The ransomware even revoked the ability to process utility payments in another municipality. The Mayor of one unnamed Texas city came forward with claims the hacker demanded $2.5 million in ransom. It goes without saying that the Lone Star State is no exception and hackers are officially messing with Texas.

Now is the time to make a change. With over 90% of all cyber attacks caused by human error, it’s no secret that a strong security awareness program is the key to staying out of the news headlines.

It’s time to fight back, Texas. It’s time to train your employees on how to defend themselves and beat the hackers.

How do I Comply With the HB 3834 Cyber Security Awareness Training Requirements?

HB 3834 is in full force and all state agency, local government, and contractors needs to complete their compliance training before June 14, 2020. Let’s look at the steps you need to take to get you and your team compliant with the HB 3834 cyber security training requirements. And if you are looking for advice on building your security awareness training program for HB 3834, our expert security awareness team is happy to help.

Texas HB 3834 Scope

Step 1: Are you in Scope?

First step is to determine if your organization is in scope of HB 3834. If you are reading this, you probably already have a hunch that you may be. To confirm, the personnel in scope of HB 3834 cyber security awareness training compliance applies to state agency, local government, and even contractor employees throughout the state of Texas.

State Agencies – Employees who use a computer to complete at least 25 percent of the employee’s required duties, and elected or appointed officers of the agency.[/item]

Local Government Entities – Employees who have access to a local government computer system or database, and elected officials.

Contractors of State Agencies – Those contractors who have access to a state computer system or database must complete training during the term of the contract and during any renewal period.

Step 2: Choose a State Certified Vendor

Now that you confirmed your scope, you must choose a security awareness training vendor that is certified by the State of Texas, such as Huntress. Certified vendors must complete a rigorous training content assessment, certify with the State of Texas that their training program meets all cyber education requirements, and ensure that those requirements are upheld on a continuous basis year over year. Simply put, selecting a vendor that’s already done the heavy lifting is required to get started.

Step 3: Launch your Program

Okay so you picked your vendor, but now you need to launch the cyber security training program to your employees. It’s critical to communicate how important completing this required training is. If your employees don’t understand why they are required to participate in this training, they won’t have the motivation you need to have it completed. Motivation is a key component of getting your cyber security training program off the ground and supported by employees.

Step 4: Ensure Completion

Now that you have launched your training program, that doesn’t mean you are done. As part of HB 3834, you need to ensure your employees complete the required cyber security training. Remember it’s important to discuss how this cyber security training program will help your employees become more cyber-savvy both at work and at home. Make it fun by promoting the training across your organization similar to a marketing campaign. This will help drive completion records, and you may even offer incentives for early completion.

Step 5: Keep it Going

Congrats, you’ve finished your first round of security awareness training! This is a big accomplishment, but the party doesn’t stop here. Remember that you need to keep this momentum going. The best way to do that is to reinforce your security culture to help make security top of mind. Once a year security awareness training is not going to stop the hackers. You need to continue this effort throughout the year, using different methods to communicate and reinforce security concepts in every employee’s mind.

What NOT to do with HB 3834

Although it’s easy to recognize HB 3834 as another compliance regulation to just check the box, it shouldn’t be.

The consequences of falling victim to a cyber attack are well known and your focus should be to ensure all employees understand the risks they face.

You don’t want to be tomorrow’s news headline and your employees are your first step as the most powerful defense for your organization. A strong cyber security training program is the key to protect beyond the regulations of HB 3834. Remember we are all working towards a common goal to beat the hackers, not the regulations.

Categories
Cybersecurity Education
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • What Is a Security Awareness Training Program?

    Improve security culture with a stronger security awareness program. Huntress Managed Security Awareness Training is designed to reduce incidents and protect your team.
  • NERC CIP Cyber Security Awareness Program

    CIP-004 R1 requires a NERC CIP Cyber Security Awareness Program for NERC entities. Low Impact Security Awareness Program requirement will also be discussed.
  • CIS Controls Security Awareness Training

    Learn more about how Huntress' Managed Security Awareness Program can help your employees follow CIS control requirements.
  • NERC CIP Training Requirements

    Learn about the NERC CIP training requirements for NERC CIP-004 R2 in the Huntress Blog. Understand what you must do to stay compliant and what auditors will review.
  • Annual Security Awareness Training is a Waste of Time

    Annual security awareness training is a waste of time. We discuss why an ongoing security awareness program is required to protect against cyber threats.
  • CMMC Final Rule: What DoD Subs Need to Know

    The DoD's CMMC final rule is here. Learn what it means for subcontractors, the new timeline, and how to prepare for your Level 2 audit to stay competitive.
  • Creating a Better Why for Cyber Security Awareness Training

    Understand the importance of cybersecurity awareness training and how it can significantly reduce risks in your organization.
  • Free Training Tool for Unlocked Computers

    Teach employees not to leave computers unlocked with this tool by Huntress, the fun cyber security awareness training provider.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy