Under active development Content is continuously updated and improved

14.2Train Workforce Members to Recognize Social Engineering Attacks

IG1
IG2
IG3
Users
Protect

>Control Description

Train workforce members to recognize social engineering attacks, such as phishing, business email compromise (BEC), pretexting, and tailgating.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.