Physical security
Based on your reading this week, you can see that many who attempt to breach information systems rely on social engineering in order to gain access. Why do you think this is? Can you suggest a policy or set of policies that could reduce the frequency of social engineering attacks?