How to stay protected
As you already saw, you can implement several techniques to reduce the risk in each of the stages of the social engineering life cycle.
However, let's summarize those methods, techniques, and controls that you can implement through the different stages of the social engineering life cycle.
Control your social media posts
One of the most common sources for attackers to start harvesting data is social media platforms, so remember that “Think before you post” is one of the best pieces of advice to avoid sharing data that an attacker may use against you.
Configure your privacy settings on social media
Limit access to only people you know to prevent strangers from accessing your pictures, posts, and so on.
Also, the more granularly you configure privacy settings, the more control you will have over your data.
Beware of fake profiles
Attackers may clone the profile of one of your friends to trick you into accepting their friend...