Think like a hacker

by Jon Lober | NOC Technology

Looking for weak points could save your business.

When people think about "hackers”, they picture the typical hooded figure furiously typing on a keyboard to break into networks.


However, hacking doesn't always require guessing passwords or exploiting unpatched machines; it can commonly be social engineering and targeting!

think like a hacker to protect your business

Let's think like a hacker! Here’s an example.

Imagine you were to target your own company. How would you do it?


  • You could look up your business on Google or LinkedIn to see who the decision makers are.
  • You might find a decision maker you can target.
  • You can create a free email and "pretend" to be yourself.
  • Now you can try to trick another decision maker at your organization into sending sensitive information, changing accounting information, or other activities that would leave your business vulnerable.


How long did that take you?

It probably wasn't instantaneous, but you could do it pretty quickly. Now imagine that was your full-time job! Pretty terrifying, right? This is exactly why cybersecurity is such an important topic.


Now take a deep breath.


You are significantly less likely to have an incident if your business is prepared.


Employee Cybersecurity Training

We can't emphasize enough the importance of employee cybersecurity training. You should have a plan in place to regularly communicate with your staff about pertinent topics. Include regular rhythms of penetration testing to make sure your team is aware of threats and knows how to respond appropriately.


Good Spam Filtering

As we demonstrated above, email spoofing is very easy to attempt for hackers. Make sure that your team has adequate protection by using spam filtering that includes blocking spoofing.


Not sure if your spam filters have this capability? Talk to our experts.


Data Loss Prevention

Create and implement a plan to prevent sensitive information from leaving the company.

The cover of the book email fraud by jon lober

Learn more with my FREE book!



How to keep hackers from hijacking your inbox

In this book, CEO Jon Lober shows us what it looks like when a business is the target of an attack, what the consequences of an attack are, and how to protect your business from a phishing attack.

Request a copy
Healthcare HIPAA compliant email
By Jon Lober April 28, 2026
Standard Gmail and Outlook are not HIPAA compliant. Learn what healthcare practices in St. Louis need to configure for compliant email, including proper setup.
By Jon Lober April 28, 2026
What law firms need from IT support in 2026 - from ethics compliance to e-discovery. Learn how St. Louis firms are protecting client data while staying productive.
AI for small business
By Jon Lober April 27, 2026
Before investing in AI tools, assess your business across 5 key dimensions: data, process, team, budget, and security. Use this checklist to find out if you're ready
More Articles