Think like a hacker

by Jon Lober | NOC Technology

Looking for weak points could save your business.

When people think about "hackers”, they picture the typical hooded figure furiously typing on a keyboard to break into networks.


However, hacking doesn't always require guessing passwords or exploiting unpatched machines; it can commonly be social engineering and targeting!

think like a hacker to protect your business

Let's think like a hacker! Here’s an example.

Imagine you were to target your own company. How would you do it?


  • You could look up your business on Google or LinkedIn to see who the decision makers are.
  • You might find a decision maker you can target.
  • You can create a free email and "pretend" to be yourself.
  • Now you can try to trick another decision maker at your organization into sending sensitive information, changing accounting information, or other activities that would leave your business vulnerable.


How long did that take you?

It probably wasn't instantaneous, but you could do it pretty quickly. Now imagine that was your full-time job! Pretty terrifying, right? This is exactly why cybersecurity is such an important topic.


Now take a deep breath.


You are significantly less likely to have an incident if your business is prepared.


Employee Cybersecurity Training

We can't emphasize enough the importance of employee cybersecurity training. You should have a plan in place to regularly communicate with your staff about pertinent topics. Include regular rhythms of penetration testing to make sure your team is aware of threats and knows how to respond appropriately.


Good Spam Filtering

As we demonstrated above, email spoofing is very easy to attempt for hackers. Make sure that your team has adequate protection by using spam filtering that includes blocking spoofing.


Not sure if your spam filters have this capability? Talk to our experts.


Data Loss Prevention

Create and implement a plan to prevent sensitive information from leaving the company.

The cover of the book email fraud by jon lober

Learn more with my FREE book!



How to keep hackers from hijacking your inbox

In this book, CEO Jon Lober shows us what it looks like when a business is the target of an attack, what the consequences of an attack are, and how to protect your business from a phishing attack.

Request a copy
By Jon Lober October 29, 2025
Keep your electrical contracting business powered up with managed IT that understands field operations. 24/7 monitoring, 15-min response times. Call 636.390.662
By Jon Lober October 29, 2025
Reliable IT support for electrical contractors. 15-second live response, 96.8% satisfaction, local technicians. No call centers. 636.390.6621
By Jon Lober October 28, 2025
Proactive IT management for St. Peters chiropractors. HIPAA-compliant, 15-second live support, 96.8% client satisfaction. No call centers - local techs only.
More Articles