17.6: Train Workforce on Identifying Social Engineering Attacks
CSF v1.1 References:
PF v1.0 References:
Next Version:
- Critical Security Controls Version 8:
- 14.2: Train Workforce Members to Recognize Social Engineering Attacks
Control Statement
Train the workforce on how to identify different forms of social engineering attacks, such as phishing, phone scams, and impersonation calls.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]