phishing
phishing Controls
4 controls across 3 frameworks.
CISA CPG
HIPAA
NIST CSF
pr-aa-2
Identities are proofed and bound to credentials based on the context of interactions
Protect / Identity Management, Authentication, and Access Control
critical 3h
pr-at-1
Personnel are provided with security awareness training to perform their work with cybersecurity risks in mind
Protect / Awareness and Training
high 6h