17.6: Train Workforce on Identifying Social Engineering Attacks

CSF v1.1 References:

PF v1.0 References:

Group:

Next Version:

Control Statement

Train the workforce on how to identify different forms of social engineering attacks, such as phishing, phone scams, and impersonation calls.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]