Agree. The single most successful method of infiltration does not rely on security holes, but on asking very nicely: Social engineering.
I'm sure most of us are familiar with the story of a Wired writer who had his ENTIRE digital life destroyed (e.g., his Google account hacked, all of his Apple devices remotely wiped, his Twiter account defaced, etc etc) thanks to social engineering, but in case you aren't, then you should read it, because holy crap.
Bookmarks