If I Were a Cybercriminal
If I were a cybercriminal targeting your business, here’s how I’d win. Not just by stealing your data—but by disrupting your operations.
In 1965, Paul Harvey aired “If I Were the Devil,” a monologue about how subtle neglect leads to chaos. He didn’t shout. He didn’t rage. He whispered the truth.
Today, I’m borrowing that framework to show you how I’d take down your business—not with brute force, but with the small cracks you’ve learned to live with.
So let’s flip the lens.
If I were a cybercriminal targeting your business, here’s how I’d win. Not just by stealing your data—but by disrupting your operations for 22 to 24 days. That’s the average ransomware downtime. And for many, it’s a death sentence.
First, I’d Pick You on Purpose
You wouldn’t be a random hit. I’d pick you because small and mid-sized businesses are ideal targets.
- You’re resource-constrained.
- You handle sensitive data.
- You rely heavily on digital operations.
- And you’re often under-protected.
I’d be looking for businesses like:
- A healthcare clinic running outdated software with no in-house IT.
- A law firm juggling client data, intellectual property, and deadlines on shared drives.
- A construction company using unsecured WIFI and tablets on job sites.
- A manufacturer with production lines tied to smart devices and old VPNs.
- A local government agency still relying on legacy systems and open ports.
These are the kinds of businesses where a single point of failure becomes a system-wide disaster.
According to Accenture, 43% of cyberattacks target companies with fewer than 250 employees. Because you’ve got what I want—and fewer defenses than you think.
Then, I’d Let AI Do the Work
Forget brute force. I’d let AI carry the load.
AI-driven phishing tools can mimic your CEO’s tone, your vendors’ urgency, even your own writing style.
But I wouldn’t stop there—I’d study you.
I’d scan LinkedIn for leadership bios, employee titles, org charts, and reporting lines. I’d read your press releases, team bios, blog posts—anything public. That way, when I craft a phishing email or leave a voicemail, it sounds like it came from inside your organization.
“Push the wire through.” “Just upload this invoice so I can sign it.” “Here’s that file the CFO asked for—don’t share it.”
And with AI voice cloning tools like ElevenLabs, I could sound exactly like your CFO or project manager on a call or voicemail.
I’m not guessing—it’s working.
According to Arctic Wolf’s threat report, phishing is now used in 72% of ransomware and business email compromise attacks—up from 62% just a year earlier.
Why? Because it works. Especially when AI does the writing.
Just one call. One email. One voice. And I’m in.
Next, I’d Use What You Forgot
It’s not always the firewalls that fail—it’s the stuff you forgot about.
- A smart thermostat on your network? I’m in.
- An old laptop in the breakroom? Full access, no monitoring.
- A server room without a lock? I’ve already walked through it.
But here’s what’s even better: Your cloud services.
I’d hunt for accounts no one uses anymore—marketing tools, project management apps, legacy cloud storage—and find the ones still active with admin access.
Even better? Forgotten credentials.
That consultant who helped set things up three years ago? That employee who left last quarter?
If you didn’t disable access, I’m walking through a wide-open door—and no one’s watching.
Cloud misconfigurations, orphaned permissions, and leftover access are gold for attackers. They don’t trigger alarms. They don’t look suspicious. And they often go untouched for months, even years.
IBM’s 2024 report shows 20% of breaches stem from physical and overlooked assets. You’ve protected your fortress—but your outposts are undefended.
My Real Goal? Leverage Through Disruption
This isn’t about watching your company suffer.
It’s about getting paid.
Disruption is how I make that happen.
If I steal your data, you might restore it. But if I paralyze your operations for 3 weeks while customers call, vendors rage, and deadlines slip—you’ll start doing the math.
At $10,000 an hour, you’re bleeding $240,000 a day—and over $5.6 million if I keep you down for the average 22–24 days. (That’s not a guess. It’s what the Ponemon Institute and IBM estimate in real-world breach cases.)
And that’s before legal costs, lost deals, compliance fines, or the customers who never come back.
Most businesses don’t.
According to Hiscox and the Ponemon Institute, 66% of small and mid-sized companies are out of business within six months of a major cyberattack.
Disruption is the weapon. The ransom is the goal. And you might pay just to make the pain stop—even if it doesn’t bring everything back.
How You Stop Me
You don’t need a million-dollar cybersecurity budget.
But you do need leadership-level commitment—because this is no longer just an IT issue.
Start here:
- Train your team. Phishing drills reduce successful attacks by up to 50% (KnowBe4).
- Turn on MFA. Microsoft reports it blocks 99.9% of account takeovers.
- Segment your networks. Don’t let IoT devices or old apps live alongside your financials.
- Lock it down. Encrypt devices. Secure physical access. Review surveillance.
- Vet your vendors. MOVEit taught us that third-party risk can torch thousands of businesses.
- Use Managed Security. A service like our MyCSO Managed Security Services provides monitoring, compliance support, real-time risk assessments, and a playbook when things go sideways.
Because a $10K investment in security beats a $1M ransom and weeks of downtime.
Final Thought
If I were a cybercriminal, I wouldn’t come crashing through your front door.
I’d do what Paul Harvey warned about—let chaos slip in quietly.
No alarms. No noise. Just gaps in your process, ignored risks, and overworked teams. And before you realize it’s happening—your business is on fire.
I won’t lose sleep over your business. It’s not about anger. There’s no vendetta. It’s just business for me.
You’ll either invest in protection now… Or you’ll pay me to get it back.
Whether you’re running a clinic, a law office, a factory, a jobsite, or a public agency— you can’t afford 24 days offline.
Don’t let me turn your company into my next paycheck.
That’s what I would do if I were a cybercriminal.
Need a Plan?
I hope this made you stop and think.
Two out of three businesses that suffer a major cyberattack don’t survive six months. And fewer than 20% of small and midsize companies have ever completed a proper cyber risk assessment.
That’s the gap I would exploit—if I were a cybercriminal.
At NCX Group, we help business leaders close those gaps before they become front-page problems. No scare tactics. No jargon. Just practical steps to secure what matters.
Assess the Risks to Your Business on Your Own—Click here to get started: https://training.ncxgroup.com/risk
If it’s time to have that conversation, let’s talk.
📅 Schedule a quick call 🌐
Let’s Talk
If it’s been more than a year since your last cybersecurity assessment—or if you’ve never done one—now is the time.
👉 Schedule a Strategy Call with NCX Group
Repost from LinkedIn – https://www.linkedin.com/pulse/i-were-cybercriminal-mike-fitzpatrick-aw9ef/