Social engineering can have a devastating impact on systems and people's confidence.
How might posing as a PC support technician be useful to us?
Good stuff! These are only a few things that we could do with access to a user's PC.
Might it be that we can do more than that?