Watch this video on YouTube
Why do attackers often prefer social engineering over technical exploitation?