I have a basic understanding of how social engineering works.
I review emails carefully before clicking links or opening attachments and verify before clicking or opening if I have any doubts as to authenticity of the message.
If I get phone calls or visitors claiming to require personal information from me (like my credit card or social security number) or asking me to give access to my computer or smart phone, I treat these with skepticism and know how to verify before complying with these kinds of requests.