3 Easy Steps for Foiling Social Engineering Attacks