This article discusses the ontological components of social engineering attacks and proposes potential mitigations for such attacks. It also outlines key elements of a response plan for this type of attack, with consideration of people, process, and technology factors. The article cites relevant sources and is suitable for students studying cybersecurity or related fields.