🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-10-3

Practical guide for SMBs to implement Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-10-3

January 17, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-10-3 – The cybersecurity awareness program must cover the latest cyber threats and how to protect against them, and must include at least the following subjects:

This control is part of the Essential Cybersecurity Controls (ECC – 2 : 2024) framework and requires a structured, up-to-date awareness program that maps to specific objectives.

Understanding the Requirement

The control demands an organized cybersecurity awareness program that educates staff about current threats and protective actions, and that explicitly addresses the listed objective items: 1-10-3-1, 1-10-3-2, 1-10-3-3, plus secure use of social media. For an SMB this means producing role-appropriate content (general staff, privileged users, customer-facing teams), keeping materials current with evolving threats (phishing, ransomware, credential stuffing, supply-chain risks), and including practical behaviors such as safe social media posting, identifying suspicious messages, and following incident reporting procedures.

Technical Implementation

  • Map curriculum to objectives and roles: create a one-page curriculum that links each learning module to an objective (1-10-3-1 through 1-10-3-3 and social media). Assign owners for each module (IT manager for phishing/malware, HR for policies, marketing for social media guidance).

  • Use a mixed delivery schedule: deploy short monthly microlearning (5–15 minute modules) for general topics and quarterly mandatory longer sessions for high-risk roles. Keep a calendar with reminders and require completion by a set date; automate tracking in an LMS or a shared spreadsheet if no LMS is available.

  • Run realistic phishing simulations and measurable tests: schedule simulated phishing campaigns quarterly, follow each simulation with targeted remediation training for clickers, and track metrics (click rate, report rate, repeat offenders). Use results to prioritize further technical controls (MFA, tighter email filtering).

  • Implement social media guidance and controls: produce concise do’s and don’ts tailored to staff who post on behalf of the company (examples of allowed content, handling DMs, avoiding credential sharing). Require managers to approve company accounts, and enable multi-person access via password managers and shared accounts instead of personal credentials.

  • Maintain an update-and-intel cycle: assign a team member to review threat intelligence (vendor alerts, CERT advisories) monthly, refresh learning materials to reflect top threats (e.g., new ransomware variants, business email compromise tactics), and publish a one-page “What’s new” bulletin to all staff.

  • Measure outcomes and integrate with incident processes: define KPIs (training completion %, phishing click %, reports per month) and tie awareness outcomes to incident response (e.g., employees who report suspected phishing get immediate guidance and credit). Use these metrics in quarterly management reviews.

Example in a Small or Medium Business

A 35-person digital marketing agency implements Control 1-10-3 by naming the IT lead responsible for awareness and a Marketing lead to own social media guidance. They build a curriculum that maps 1-10-3-1 through 1-10-3-3 to short modules: phishing recognition, safe browsing and device hygiene, and secure handling of client data, plus a dedicated module on secure social media use for account-holders and content creators. Employees receive a 10-minute microlearning each month and must complete a 45-minute refresher every six months. The agency runs simulated phishing every quarter and requires anyone who falls for a test to complete an immediate remedial module. Social media account access is moved to a shared, managed credentials system; all posts by client-facing staff follow an approval checklist included in training. The IT lead reviews threat advisories monthly and updates the microlearning when a new phishing campaign or malware family is reported. Management tracks completion rates and phishing click-throughs, reports these KPIs at the monthly leadership meeting, and ties training completion to performance reviews for client-facing staff.

Summary

By defining role-mapped curriculum, delivering frequent short training plus periodic in-depth sessions, running measurable phishing simulations, and creating practical social media rules, an SMB can meet Control 1-10-3. Assigning owners, automating tracking, and maintaining a monthly update cycle ensures content stays aligned with the latest threats. Together, these policy and technical measures produce observable behaviors, measurable outcomes, and a faster, more effective response when threats appear.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes