Countermeasures

Remember: Hackers use social engineering because it's easier! Hacking a computer remotely typically requires more skill and dedication than fooling a person into surrendering their password!

Strategies
There are multiple tactics and “entry points” social engineers employ in their work, countermeasures must consider and defend against each of them individually.
 * Verify the identity of anyone you communicate with before giving out sensitive information. On Social Networking Sites, refrain from befriending people you don't know.
 * To counter impersonators by phone, consider making callers remember a password before continuing the conversation
 * Avoid writing down passwords; if necessary, store them in a safe (locked) place.
 * Verify the identity of everyone entering your premises. Set up strategic chokepoints for entry and watch out for "tailgaters" (people who blend into a large crowd to enter).
 * Do not use USB drives or any other device whose origins you are unaware of. Do not open emails from people you do not know or about subjects irrelevant to you.
 * Hire security consultants to perform system impregnability tests on your site.