Strategies Used to Mitigate Social Engineering Attacks