SecAware materials

SecAware logo 150 animated ezgif.gif

~3 page information security policy template on social engineering.


Workers must be alert and respond appropriately to the signs of possible social engineering attacks, and are forbidden from using social engineering techniques inappropriately.


Social engineering is a 'dual use technology'.  Although information security professionals tend to think and speak of it in purely negative terms, marketing, security awareness, training, lobbying, debate and 'persuasion' are examples of social engineering being used legitimately and appropriately in the best interests of the business.


Delivered as an editable MS Word document, easily customized for your organization's specific needs.

Social engineering policy