My interview with IT Pro on how social engineers plan their attacks – from identifying targets to exploitation.