14.2—Train Workforce Members to Recognize Social Engineering Attacks
IG1
IG2
IG3
Users
Protect
>Control Description
Train workforce members to recognize social engineering attacks, such as phishing, business email compromise (BEC), pretexting, and tailgating.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.