This article discusses ways to prevent social engineering attacks in IT networking designing. It also covers famous cases of social engineering attacks such as the Ubiquiti Networks case, RSA secure ID breach, and Hidden Lynx Watering Hole on Bit9. The article provides tips to prevent social engineering attacks such as cross-checking identity of outsiders, verifying urgency requests, and being aware of tactics used by fraudsters. The article also mentions the importance of having proper procedures and policies in place to stay safe from social engineering attacks.