HELP!

Think you've been hacked?

What to do if your business is under cyberattack.

Log Out

Everyone— yes, everyone— needs to log out of all their business email accounts.

Change passwords

Limit the damage by requiring everyone in your company to change passwords.

Start using MFA

Protect your business from further attack by setting up multi-factor authentication.

Find the attack vector

Investigate and identify what went wrong. Close any remaining security gaps.

You're an expert at running your business.

(but maybe not cybersecurity)


Once you've taken these basic steps, call a cybersecurity expert to help you recover your data and prevent new attacks. The team at NOC is standing by and ready to take your call.

Get your free copy of Jon's book.


Email Fraud: How to keep hackers from hijacking your inbox

Written by our CEO Jon Lober, this book helps business owners understand what an email hack might look like and what steps you can take to prevent losing your company's valuable data.

REAL CLIENT TESTIMONIAL

“Several years ago, our business regarded cybersecurity the same as many other growing businesses — probably important, but not a top priority. We had taken some preliminary steps to protect ourselves but did not consider hacking a serious threat to the well-being of our company. We thought what we had done enough—until we ourselves were attacked through a business email compromise scheme. The lesson was a painful one, with a significant financial cost.


Upon discovering the theft, we immediately reached out to Jon at NOC Technology. Working together with NOC, we have greatly improved the cybersecurity capacity of our company and employees through enhanced protective measures, more robust policies and procedures, and awareness training. The investment has paid off. While NOC filters out the vast majority of dangerous emails, our ongoing training recently helped us to identify and prevent yet another spear-phishing attempt."


—Stacey S.

The best offense is a solid defense.

It's true in sports and it's true in business cybersecurity.


Small and midsize businesses choose NOC Technology for our 24 x 7 threat monitoring that protects from cyber threats, ensures compliance, and minimizes the risk of data breaches.

Want to stay ahead of cybercriminals?


Schedule a strategy session today.

If you can't tell spearphishing from ransomware, and it all makes you wannacry, schedule a session with one of our experts today.


Take 30 minutes to talk about IT.

We can use this session to discuss:

  • Review of your current infrastructure
  • Cybersecurity strategies to better protect you
  • How cybersecurity insurance helps your business
  • How to transition your services to NOC


Common email scams and hacks

See through suspicious emails.


Here are some of the most common tactics hackers use to invade your email.


Email forwarders

Hackers only have to gain access to your email once and activate an email forwarder. Then, without your knowledge, all incoming email is forwarded to them. They begin spotting significant patterns, such as invoices being sent to you on a regular basis. From there, they can play a long game, gathering information and building up a profile until an opportunity presents itself to steal some money.


Spoofed emails

Hackers can easily buy domain names that are very similar to the real website domain used by one of your trusted suppliers. Your supplier might use xyzcompany.com, so the hacker buys xyzcommpany.com because an extra character can often go unnoticed, or they will a domain with a different extension, such as .net rather than .com.


Follow-up emails

The follow-up email is a painfully simple yet effective trick. Though hackers have to get the timing right for this, if they can send a follow-up email immediately after the real email, most people just assume it’s real and react accordingly.


Compromising a supplier’s email

It doesn’t even have to be your business that gets hacked for you to lose money! If hackers can compromise your supplier’s email and intercept the outgoing invoices, they can scam you into making payments to the wrong bank account.


Edited PDFs

Did you know that PDFs can be easily edited? Hackers can intercept invoice PDFs, edit them to change the bank account details, and then send them on to your customers. The person paying the invoice typically has zero suspicion that something is amiss, and your hard-earned money is drained to the hackers' account.


Social engineering

Once a hacker is inside your email, they gather information and look for opportunities. They simply have to figure out how they can leverage any break in normal processes and patterns of behavior to convince your staff that an unusual email came from you.


Have more questions about cybersecurity?

We've got a blog for that.

From what does phishing mean to what to do if you click on a phishing link, our cybersecurity blog is designed to give you the tools you need to better protect your business.

CEO and tech expert Jon Lober explains what is CMMC
By Jon Lober February 18, 2025
Cybersecurity compliance for handling CUI is evolving in 2025. In this episode of Tech Therapy, Jon covers both what is CUI and what is CMMC, and what does it matter to US manufacturers.
The key to understanding NIST password requirements for small to midsize businesses, manufacturers
By Jon Lober January 20, 2025
A Guide for Small to Midsize Manufacturers
Understanding what it takes to be NIST compliant for US manufacturers
By Jon Lober January 14, 2025
A Guide for Small to Midsize US Manufacturers
Show More

NOC Technology is a managed IT services and cybersecurity company based in Washington, Missouri and serving clients across the US. We are the trusted IT partner for over 200 St. Louis area businesses.

Share by: