Security Awareness Training Update
Introducing CyberHoot – What to Expect
To help protect our organization from phishing attacks and other email-based threats, we are updating our Security Awareness Training (SAT) program. This document explains what's changing, what to expect, and how to access training.
Why this matters
Phishing emails remain one of the most common ways attackers try to gain access to company systems, data, and accounts. These messages are becoming more convincing every year and often target people—not technology.
Security awareness training helps everyone:
  • Recognize suspicious emails and links
  • Avoid common phishing tactics
  • Know what to do when something doesn't look right
Keeping awareness high across the organization is one of the most effective ways to reduce risk.
What's changing
We are transitioning our Security Awareness Training platform to CyberHoot.
Security awareness training
Interactive lessons designed to build your knowledge and confidence
Phishing simulation exercises
Safe practice spotting suspicious messages in real-world scenarios
Policy acknowledgments
Required policy reviews when assigned by your department
What's different is how the training is delivered. Instead of long, infrequent training sessions, CyberHoot focuses on short, interactive lessons spread out over time, keeping learning manageable and engaging. The goal is to reduce training fatigue while keeping security awareness fresh and relevant.
Interactive Learning: CyberHoot Phishing Simulations
As part of the program, you may receive interactive phishing simulation exercises. These are safe, guided learning experiences designed to walk you through identifying suspicious messages and building your awareness in a real-world setting, without feeling like a "gotcha" test.
01
Interactive Learning
Simulations guide you through identifying risky elements within emails
02
Hands-on Practice
Learn to spot suspicious details in a safe, controlled environment
03
Positive Reinforcement
Build confidence and strengthen your security awareness through guided education

Watch the video: To better understand this interactive and educational program, please watch this short video: How the new phishing simulation program works
When this starts
To avoid repeating training that would not apply to the new year, the rollout will happen in two phases:
1
Before January 1
  • You will receive welcome emails from CyberHoot
  • These emails are legitimate
  • No required training will be due yet
2
After January 1
  • Required training assignments will begin
  • Phishing simulations and awareness activities will start
  • Any required policy acknowledgments will be assigned
3
New users
  • New hires will receive access shortly after onboarding
  • A short window of time will be provided to complete initial training
How CyberHoot Works: Easy and Secure Access

Your CyberHoot Access is Password-Free!
All legitimate CyberHoot emails come from hoots@cyberhoot.com. These emails are safe to open and click.
Every CyberHoot email contains a magic login link. Just click it to instantly access your training. No passwords or credentials are ever required, and there's no need to manually log in to the system.
CyberHoot uses a secure, passwordless login system designed for your convenience and security. You will never need to create a username or password.
This system streamlines access and helps prevent common password-related issues.
Backup Access (if needed): If you accidentally delete a training email or require access outside of a direct link, you can use the IT Portal:
  • Click the CyberHoot link on the portal.
  • Enter your work email address to request a new secure login link, which will be sent to your inbox immediately.
Reporting and accountability
Training completion is tracked as part of the security program.
Department-level reports
Department heads will receive compliance reports showing training progress
Leadership visibility
Reports help leadership understand awareness levels and reinforce security culture
Regular updates
Reporting will begin within the first month and continue on a regular basis
These reports are designed to support department leaders in ensuring their teams stay current with security training requirements. Tracking completion helps us maintain a strong security posture across the entire organization.
What we need from you
Complete assigned training
Watch for CyberHoot emails and complete assigned items on time. Training is designed to be brief and manageable.
Take simulations seriously
Treat phishing simulations like real emails—slow down and think before clicking. This practice builds real-world skills.
Ask when unsure
If something looks suspicious or you're unsure, contact IT for help. It's always better to ask than to risk a security incident.
Security awareness works best when everyone participates. Your engagement in this program directly contributes to protecting our organization, our data, and our colleagues from cyber threats. Thank you for doing your part to keep us all safe.
Need help?
Visit the IT Portal
Access resources and links at https://aln.support
Contact the IT Helpdesk
Reach out to the IT team if you have questions or concerns about training or access
Report suspicious emails
If you're unsure about an email, it's always better to ask. We're here to help.

Remember: Your vigilance is our best defense. Thank you for your participation in keeping our organization secure.