Think like a hacker

by Jon Lober | NOC Technology

Looking for weak points could save your business.

When people think about "hackers”, they picture the typical hooded figure furiously typing on a keyboard to break into networks.


However, hacking doesn't always require guessing passwords or exploiting unpatched machines; it can commonly be social engineering and targeting!

Let's think like a hacker! Here’s an example.

Imagine you were to target your own company. How would you do it?


  • You could look up your business on Google or LinkedIn to see who the decision makers are.
  • You might find a decision maker you can target.
  • You can create a free email and "pretend" to be yourself.
  • Now you can try to trick another decision maker at your organization into sending sensitive information, changing accounting information, or other activities that would leave your business vulnerable.


How long did that take you?

It probably wasn't instantaneous, but you could do it pretty quickly. Now imagine that was your full-time job! Pretty terrifying, right? This is exactly why cybersecurity is such an important topic.


Now take a deep breath.


You are significantly less likely to have an incident if your business is prepared.


Employee Cybersecurity Training

We can't emphasize enough the importance of employee cybersecurity training. You should have a plan in place to regularly communicate with your staff about pertinent topics. Include regular rhythms of penetration testing to make sure your team is aware of threats and knows how to respond appropriately.


Good Spam Filtering

As we demonstrated above, email spoofing is very easy to attempt for hackers. Make sure that your team has adequate protection by using spam filtering that includes blocking spoofing.


Not sure if your spam filters have this capability? Talk to our experts.


Data Loss Prevention

Create and implement a plan to prevent sensitive information from leaving the company.

Learn more with my FREE book!



How to keep hackers from hijacking your inbox

In this book, CEO Jon Lober shows us what it looks like when a business is the target of an attack, what the consequences of an attack are, and how to protect your business from a phishing attack.

Request a copy
Be sure to include information technology in your 2025 budget
By Jon Lober December 17, 2024
Make sure you include IT in the budget.
By Jon Lober December 12, 2024
“Who’s taking notes at this meeting?”
By Jon Lober December 6, 2024
Protect your business with basic strategies.
More Articles
Share by: