• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

The Worst Advice We’ve Heard About Cyber Security

October 12, 2016 Posted by Michael Hammond, CISA, CRISC, CISSP Cybersecurity, IT Security

We often get asked about cyber security and cyber security assessments. Sometimes we are in the room when others are talking about it and I’ll admit, I eavesdrop a little to see what they say. Here is the top 5 worst pieces of advice I’ve heard lately about cyber security:

  1. Our IT guy/girl/company takes care of that for me!
  2. We bought a “box” from vendor XYZ that stops all bad internet traffic.
  3. Our anti-virus is up to date, so we’re good.
  4. We use Macs, and they don’t get viruses.
  5. You can’t stop it, so why even try!

Cyber Security

While you might have the best IT person fixing your computers, in EVERY vulnerability assessment and cyber security audit we have performed, the IT support person has NEVER said cyber security was in their job description. Most often, their job was keeping the computers up and running, replacing batteries in wireless mice, and installing the latest version of your line of business application. While they have the best of intentions, uptime gets in the way of cyber security.

There is no silver bullet, no one solution, and no one “box” that can prevent you from being hacked. Only through a defense in depth strategy, with constant attention to new vulnerability attacks and the reviewing the latest exploits will you be even close to keeping up with the hackers.

Anti-virus is only one piece of the larger defense in depth strategy. Do you need anti-virus? Yes. Is it going to stop all malware? No. But, you still need it. And, pay for the updated definitions. Viruses come out too frequently for you to “wait until next year” to get the upgrade.

While Apple’s Mac operating system may not be the target of much of the malware and viruses written today, it is only because of the smaller numbers of installed computers. It’s not financially advantageous for attackers to write viruses for the Apple. But, Apple computers do get viruses.

Lastly, ignorance is not bliss when it comes to protecting your computers against hackers. And in some States, it is against the law to ignore the problem, hoping it will go away. In Massachusetts, resident’s personal data protection laws require an active approach, including annual risk based reviews of your IT environment.

Hacking is continuing to grow. Only through regular vulnerability assessments and information technology audits can you keep up.

To learn more about vulnerability assessments and information technology audits, contact us at 617-471-1120 today!

Tags: advicecyber securityhacking
Share
1
Avatar photo

About Michael Hammond, CISA, CRISC, CISSP

Joining the firm in 2012, Michael is the Principal of IT Audit Services. Michael has twenty years of extensive Information Technology expertise in various disciplines, including operations, control design and testing. Previously, Michael was Vice President and Senior IT Audit Manager at State Street Corporation and is a veteran of the United States Air Force.

You also might be interested in

Good People, Bad Clicks: Why You Should Think Before You Click

Good People, Bad Clicks: Why You Should Think Before You Click

Aug 7, 2024

Sometimes good people click bad links. We’re human. Recently someone[...]

Top 5 Vulnerability Assessment Observations

Apr 24, 2017

Here are the top 5 observations we encounter while doing our[...]

CMMC Details Emerge

CMMC Details Emerge

Jul 31, 2019

The DoD is releasing more information about the upcoming CMMC standard.

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us
Prev Next