“…These include implementing strong authentication mechanisms, educating users about phishing techniques, and enhancing the security of IoT devices and networks [19,23]. Additionally, social engineering attacks, which are often used in phishing attacks, can be countered through awareness campaigns and training programs to educate users about the risks and tactics used by attackers [24,25].…”