How hackers use low-tech tactics to target business