This document discusses social engineering attacks and countermeasures. It begins by defining social engineering and providing examples of social engineering techniques. It then examines some specific social engineering attacks, such as ransomware attacks and attacks on online social networks. It notes that social engineering is difficult to combat because humans rely on heuristics and biases. The document proposes both technical and social countermeasures, including security awareness training, information security policies, and technical solutions like email security configurations. It concludes by noting that countermeasures require a defense-in-depth approach and should be implemented sensitively.