Think like a hacker

by Jon Lober | NOC Technology

Looking for weak points could save your business.

When people think about "hackers”, they picture the typical hooded figure furiously typing on a keyboard to break into networks.


However, hacking doesn't always require guessing passwords or exploiting unpatched machines; it can commonly be social engineering and targeting!

Let's think like a hacker! Here’s an example.

Imagine you were to target your own company. How would you do it?


  • You could look up your business on Google or LinkedIn to see who the decision makers are.
  • You might find a decision maker you can target.
  • You can create a free email and "pretend" to be yourself.
  • Now you can try to trick another decision maker at your organization into sending sensitive information, changing accounting information, or other activities that would leave your business vulnerable.


How long did that take you?

It probably wasn't instantaneous, but you could do it pretty quickly. Now imagine that was your full-time job! Pretty terrifying, right? This is exactly why cybersecurity is such an important topic.


Now take a deep breath.


You are significantly less likely to have an incident if your business is prepared.


Employee Cybersecurity Training

We can't emphasize enough the importance of employee cybersecurity training. You should have a plan in place to regularly communicate with your staff about pertinent topics. Include regular rhythms of penetration testing to make sure your team is aware of threats and knows how to respond appropriately.


Good Spam Filtering

As we demonstrated above, email spoofing is very easy to attempt for hackers. Make sure that your team has adequate protection by using spam filtering that includes blocking spoofing.


Not sure if your spam filters have this capability? Talk to our experts.


Data Loss Prevention

Create and implement a plan to prevent sensitive information from leaving the company.

Learn more with my FREE book!



How to keep hackers from hijacking your inbox

In this book, CEO Jon Lober shows us what it looks like when a business is the target of an attack, what the consequences of an attack are, and how to protect your business from a phishing attack.

Request a copy
CEO and tech expert Jon Lober explains what is CMMC
By Jon Lober February 18, 2025
Cybersecurity compliance for handling CUI is evolving in 2025. In this episode of Tech Therapy, Jon covers both what is CUI and what is CMMC, and what does it matter to US manufacturers.
NOC Technology provides award-winning IT support for our neighbors in Pacific, MO
By Jon Lober February 18, 2025
Pacific, MO deserves better IT.
Tech therapy brings real listening and tech advice to business leaders.
By Jon Lober February 11, 2025
If you've followed us on The NOCout Report, you know we've spent some time digging into tech trends, cybersecurity best practices, and ways businesses can leverage IT to thrive. But as we step into 2025, we're making a pivot—one that’s all about diving deeper into the real challenges that you as a business owner or leader face. Tech therapy brings real conversations about the technology that is keeping you up at night.
More Articles
Share by: