Continuing to build on our social engineering awareness policy, write a policy statement and simple procedure for handling requests for sensitive information.
Social Engineering Policy: Requests For Information
Perhaps one of the most effective tools to combat social engineering is training and awareness. For our policy statement this week, write a policy statement that requires social engineering awareness training. Be sure to include how often such training should