We hear a lot about the risks of social engineering, and there are a host of articles recommending how to defend against unauthorized access to facilities and their network infrastructures. However, ...