The Real Cost of Weak Cybersecurity

by Jon Lober | NOC Technology

How hackers use low-tech methods to steal from responsible organizations— and how you can stop them.

As organizations across the country increase their vigilance against cyberattacks, hackers have intensified their own efforts and methods. Computer networks are becoming increasingly secure through AI and cybersecurity software, so cybercriminals are turning their attention to the human element. 

 

Spear-phishing attacks use a combination of inside information and precision timing to execute painful attacks on their targets. Though these methods require a great deal of patience and dedication from the attacker, potentially huge payouts incentivize them to bide their time and strike at the ideal moment. 

 

In the modern age, it has become easier to slip past a human eye than through cybersecurity software—even those eyes that are wide open. Even savvy managers with a keen awareness of cybercrime can be robbed in these sophisticated strikes. Today we will take a look at a recent example of just such an attack. 

 

May 2023 Attack on Washington State School System 

A school system in Washington recently lost $346,000 in a devastating phishing scheme despite efforts on the part of Adna School System to prevent this kind of loss. Aware of the threat of being defrauded, the superintendent had established a very thorough payment process. Each disbursement required a review by seven different individuals from multiple disciplines: project managers, architects, school principals, general contractors, the superintendent, and others. A payment was only issued once each party had verified the expenses listed in that payment. 

 

Prior to the attack, the system was working well. The district had already successfully paid $780,000 of the $3 million project to the contractor, and the same review process had been used for the stolen payment. However, even this level of vigilance proved insufficient. 

 

“With this contract I felt we had created a textbook system for managing funds in a public construction project,” said the superintendent. “But we were tricked, and it cost our district a significant amount of money and I take responsibility for this mistake. I apologize to our families and the community of Adna.” 

 

As soon as they realized that they had been attacked, school officials contacted law enforcement and their bank. Despite these efforts, Chase Bank’s fraud department returned only $1,200 to the school district. 

 

How did the hackers do it? 

The hackers behind this attack most likely utilized a form of phishing known as business email compromise (BEC). In this specific instance, the cybercriminals sent a spoofed email to the school district with payment instructions—including bank account information. The email appeared to be a legitimate email from the general contractor. 

 

As a result of this deception, when the school made the ACH transfer, they deposited the payment into the hacker’s account—not the contractor’s account. 

 

To carry out such an attack, a hacker needs to know exactly when to time their request for payment to not raise suspicions. In order to gain insight into these types of opportunities, they typically try to penetrate the email account of someone involved in payment process that may not even be a key player. They want to monitor the timing of payment cycles, observe how the vendor requests payment, determine which email account to spoof or mimic, and potentially even replicate a PDF invoice and type of language used by the vendor. 

 

When a hacker finally does send the email with the falsified payment information, they do so from an email account that looks very similar to the original. For example, contractor@webuildit.net instead of contractor@webuildit.com. Unless the payer remains vigilant through ongoing awareness training or runs AI email scanning, this simple trick can have painful results.   

 

What can an organization do to prevent this kind of attack? 

Though it is difficult to stop such determined hackers, there are many ways that an organization can protect itself from these types of phishing attacks. Following their experience, the Adna School System decided to immediately implement the following set of cybersecurity measures following the attack. 

 

  • Ongoing cybersecurity training for staff 
  • Penetration testing (simulated hacking attacks) 
  • 2FA (two-factor authentication) for staff 
  • A policy that prohibits ACH payments 
  • Additional separation of payment oversight duties 
  • Network audits 

 

This an excellent list. Policies and staff training are particularly important to avoid this specific type of attack since the approach relies on human error rather than technological vulnerabilities. If a compromised email account was indeed the source of the hacker’s inside information (as opposed to an inside informant or other source of information), 2FA could have potentially prevented the hacker from gaining access to the information in email. 

 

Beyond these great steps, we would also encourage you to consider AI cybersecurity software, Advanced Threat Protection (ATP) for email accounts, and even cybersecurity insurance that can offset the financial damage from any successful attacks. 

 

This has become such a serious, and common issue, that we even wrote a free eBook about it that you can download to learn more about how these attacks work and what you can do to prevent them. Follow this link to download your free copy of Email Fraud: How to keep hackers from hijacking your inbox. 

Missouri Sheltered Workshops can empower human potential through AI
By Jon Lober April 24, 2025
Embracing the potential of both AI and humans
Tech upgrades that will boost employee safety in sheltered workshops
By Jon Lober April 15, 2025
At NOC Technology, we've worked with Missouri sheltered workshops for over seven years, and I've witnessed firsthand how the right technological implementations can transform sheltered workshop environments. Today, I'd like to share some insights on leveraging modern technology to create safer workspaces while maintaining the dignity and privacy of all participants. The Unique Safety Challenges of Sheltered Workshops Sheltered workshops provide valuable employment opportunities for individuals with disabilities, but they also present unique safety considerations. Workers may have varying levels of physical mobility, cognitive processing, and sensory perception—all of which can impact how they respond to traditional safety measures. Additionally, the production environments often involve machinery, tools, and materials that require careful monitoring and management. The Role of Smart Technology in Safety Advancements in smart technology provide real-time safety monitoring, immediate alerts for potential hazards, and improved emergency response times. Let’s explore some key technologies and their benefits in sheltered workshop environments. Personalized Alert Systems Traditional emergency alarms can be overwhelming for individuals with sensory sensitivities. Smart alert systems can deliver personalized notifications through: Vibrating wristbands that alert workers without auditory overload Visual notification systems with customizable colors and patterns Tablet-based communication for workers who benefit from visual cues Location-specific alerts that only notify those in affected areas We recently implemented a multi-modal alert system at a workshop in central Missouri that reduced anxiety-related incidents during emergency drills by 65% . Environmental Monitoring Maintaining optimal environmental conditions is crucial for both safety and productivity: Temperature and humidity sensors that automatically adjust HVAC systems Air quality monitors that detect potentially harmful particulates Noise level monitoring to prevent sensory overload Automated ventilation systems that activate when chemical levels exceed thresholds These systems not only protect workers but also provide documented compliance with OSHA regulations. Enhanced Supervision through Smart Cameras Security cameras have evolved beyond simple surveillance. Modern systems can: Detect unusual patterns that might indicate a worker in distress Monitor restricted areas without constant staff presence Identify when machinery is being used incorrectly Alert supervisors to potential safety hazards Important note: All camera systems should be implemented with strict privacy protocols and transparent policies. Workers and guardians should be fully informed about what is being monitored and why. In many cases, audio cannot be recorded, and the camera system must be configured to meet this requirement. Wearable Safety Technology Wearable devices offer personalized safety monitoring without stigmatization: Fall detection pendants that automatically alert staff Location tracking that helps locate workers in emergency situations Biometric monitoring for workers with health conditions Proximity sensors that prevent accidental entry into hazardous areas These wearables can be designed to look like standard ID badges or watches, preserving dignity while enhancing safety. Implementation Best Practices Successfully integrating smart technology into sheltered workshops requires careful planning: Involve all stakeholders: Workers, guardians, and staff should participate in selecting and implementing new technologies. Prioritize simplicity: Choose solutions that require minimal training and maintenance. Phase in gradually: Introduce new technologies in stages to allow everyone time to adapt. Balance automation with human oversight: Technology should supplement, not replace, trained staff. Respect privacy: Collect only essential data and maintain strong security protocols.
Could your sheltered workshop benefit from grant funding for new technology?
By Jon Lober April 7, 2025
As a sheltered workshop, you play a crucial role in providing meaningful employment opportunities for individuals with disabilities. However, like any organization, securing funding for technology upgrades can be a challenge. While investing in the right tools can improve efficiency, security, and overall productivity—that’s all only if you can afford the tools in the first place.
More Articles