Train Workforce Members to Recognize Social Engineering Attacks
Description
Train workforce members to recognize social engineering attacks, such as phishing, pre-texting, and tailgating.
Implementation Checklist
Tool Recommendations
Security awareness training platform with simulated phishing, interactive training modules, and compliance reporting
KnowBe4 · Per-user subscription
Adaptive security awareness and behavior change platform with targeted training based on real threat data
Proofpoint · Per-user subscription
Phishing simulation and security awareness platform with real-time threat intelligence and incident response
Cofense · Per-user subscription
Threats & Vulnerabilities (CIS RAM)
Threat Scenarios
Spear-Phishing Attack with Credential Harvesting Payload
ConfidentialityAn attacker sends a targeted spear-phishing email mimicking an internal executive, and the recipient enters credentials on a fake login page because they were never trained to identify phishing indicators.
Business Email Compromise via Pretexting
IntegrityAn attacker impersonates a CEO via email and instructs finance staff to wire funds to a fraudulent account, succeeding because employees have not been trained to recognize pretexting and verify unusual requests.
Physical Tailgating into Secure Facility
ConfidentialityAn unauthorized person follows an employee through a badge-controlled door by carrying boxes and appearing to need help, gaining physical access because staff have not been trained on tailgating awareness.
Vulnerabilities (When Safeguard Absent)
Workforce Unable to Identify Social Engineering Techniques
Without specific social engineering recognition training, employees cannot distinguish phishing emails from legitimate correspondence or identify pretexting, vishing, and tailgating attempts.
No Simulated Phishing or Social Engineering Exercises
Absence of practical training exercises means employees have no experiential learning to reinforce recognition of social engineering tactics in real-world scenarios.
Evidence Requirements
| Type | Evidence Item | Collection Frequency |
|---|---|---|
| Technical | Configuration screenshots or exports showing protection controls enabled | Captured quarterly |
| Document | Procedure documentation for protection measures | Reviewed annually |
| Record | Training completion records and compliance rates | Tracked continuously, reported quarterly |
| Document | Training content and curriculum documentation | Reviewed annually |
| Document | Governing policy document (current, approved, communicated) | Reviewed annually |