While this information might seem harmless enough to divulge, it is often a simple task for an attacker to discover a company’s email address protocol (e.g., firstname.lastname@company.com) and, armed with this information along with any other personal information exposed on the victim’s profile, create a convincing ruse to dupe the victim.