A financial organization's security team has detected a significant increase in phishing attempts against its employees. In response to this threat, the team has decided to employ a mechanism that verifies the identity of email senders and checks if the emails are from trusted sources before reaching the employees. Which type of security control is the team MOST likely implementing?
|General Security Concepts
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight