• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Decrease Successful Hacks by Improving Your Weakest Links

July 13, 2017 Posted by Don Lander Cybersecurity, IT Security

Companies spend millions on technology security annually to keep their virtual doors and windows locked.  This investment is a huge waste of money if they haven’t adequately trained their employees about how to keep these doors and windows secured.  Because of this oversight, employees can become the weakest link to an organization’s cybersecurity posture.

This isn’t an article that dredges up yet another story of an attack or lectures you about what you need to do to prevent an attack.  Not everything in the cybersecurity world is doom and gloom.  Instead, this article celebrates a company that strengthened its weakest links in a matter of a few months and for a relatively small investment.

XYZ company handles Personally Identifiable Information (PII), SSNs, credit card numbers, DOB, etc.  This is the type of data hackers like to steal because they can use it to steal your identity or sell it on the dark web.  Increasingly, hackers are holding data for ransom.  Recently, there has been an increase of hackers holding your data for ransom.  These hackers are attacking police departments, small businesses, hospitals, and individuals to name a few.  Wannacry is one of the latest versions of this type of ransomware attack.  Like a lot of companies, XYZ is a small business and doesn’t have endless resources to put towards technology and training.  Sound familiar?

XYZ enlisted OCD Tech to significantly improve their weakest links, their employees, from falling prey to nefarious emails.  XYZ did an annual security awareness program that had limited success right after training.  However, several months later, the weak links started reappearing and selecting links in emails from bad actors.  For this reason, XYZ needed a solution that would keep the number of weak links at a minimum throughout the entire year, not just shortly after training.

OCD Tech implemented a “drip” phishing campaign that sends periodic phishing emails to a few people at a time.  These emails vary from employee to employee and get harder when employees don’t get caught by the phishing email.  The emails also incorporate themes such as the holidays when everyone is getting FedEx, UPS or Amazon packages and are constantly updated based on world events or the latest cybersecurity news.

The company received training from OCD Tech before the phishing program started.  Even though the employees at XYZ knew the phishing emails were coming and how to detect them, 25% of the employees fell prey to phishing.  However, in a few months, the number of people selecting the malicious link had dropped to low single digits.  XYZ has consistently maintained a 1% to 2% hit rate.

The employees who are still falling prey to the phishing emails are informed immediately that they clicked on a link that they shouldn’t have.  In addition to the immediate feedback, employees are given an online tutorial designed to change their behavior so they don’t continue falling prey to the phishing emails.

Contact OCD Tech if you would like to learn more about this training and phishing software, so you can significantly reduce the number of windows and doors your employees open for hackers.

Share
0
Don Lander

About Don Lander

Joining the firm in 2014, Don is a Project Manager. Prior to joining the firm, Don was an IT Implement manager for a number of major financial services corporations in the Boston and Providence area for the past 25 years.

You also might be interested in

OCDTECH.BLOG.TRAININGPROGRAMFOREMPLOYEES

CYBERSECURITY TRAINING PROGRAM FOR EMPLOYEES

Feb 14, 2024

According to data from 2023, human error contributed to over[...]

OCD TECH. HOW TO SECURE A MICROSOFT SQL SERVER?

How to secure a Microsoft SQL Server?

Jan 13, 2023

There are many ways to secure a Microsoft SQL Server,[...]

Why Founders Using FlutterFlow Need SOC2® Compliance: Securing Your App Beyond the Build
Why Founders Using FlutterFlow Need SOC2® Compliance: Securing Your App Beyond the Build

Why Founders Using FlutterFlow Need SOC2® Compliance: Securing Your App Beyond the Build

Oct 15, 2024

As a founder, turning your app idea into reality is[...]

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us
Prev Next