Think like a hacker

by Jon Lober | NOC Technology

Looking for weak points could save your business.

When people think about "hackers”, they picture the typical hooded figure furiously typing on a keyboard to break into networks.


However, hacking doesn't always require guessing passwords or exploiting unpatched machines; it can commonly be social engineering and targeting!

think like a hacker to protect your business

Let's think like a hacker! Here’s an example.

Imagine you were to target your own company. How would you do it?


  • You could look up your business on Google or LinkedIn to see who the decision makers are.
  • You might find a decision maker you can target.
  • You can create a free email and "pretend" to be yourself.
  • Now you can try to trick another decision maker at your organization into sending sensitive information, changing accounting information, or other activities that would leave your business vulnerable.


How long did that take you?

It probably wasn't instantaneous, but you could do it pretty quickly. Now imagine that was your full-time job! Pretty terrifying, right? This is exactly why cybersecurity is such an important topic.


Now take a deep breath.


You are significantly less likely to have an incident if your business is prepared.


Employee Cybersecurity Training

We can't emphasize enough the importance of employee cybersecurity training. You should have a plan in place to regularly communicate with your staff about pertinent topics. Include regular rhythms of penetration testing to make sure your team is aware of threats and knows how to respond appropriately.


Good Spam Filtering

As we demonstrated above, email spoofing is very easy to attempt for hackers. Make sure that your team has adequate protection by using spam filtering that includes blocking spoofing.


Not sure if your spam filters have this capability? Talk to our experts.


Data Loss Prevention

Create and implement a plan to prevent sensitive information from leaving the company.

The cover of the book email fraud by jon lober

Learn more with my FREE book!



How to keep hackers from hijacking your inbox

In this book, CEO Jon Lober shows us what it looks like when a business is the target of an attack, what the consequences of an attack are, and how to protect your business from a phishing attack.

Request a copy
One Technology Partner St Louis
By Jon Lober February 24, 2026
Generic IT fixes tickets. Strategic IT protects revenue. Learn why St. Louis businesses need an MSP that understands how you actually make money.
should you put all your eggs in same basket
By Jon Lober February 23, 2026
How many providers does it take to manage your tech? If you run a small or mid-sized business in the St. Louis region, you probably work with a mix of technology vendors: one company for internet, another for phones, and maybe a third for managed IT support. When everything is up, that patchwork can feel “good enough.” When something breaks, it quickly turns into finger-pointing and downtime.
By Jon Lober February 20, 2026
A brutally honest guide to deploying AI in your business: without getting burned
More Articles