April 26, 2025
4
min read
Michael Hammond

The Worst Advice We've Heard About Cyber Security

Editor
Michael Hammond
Category
Cybersecurity
Date
April 26, 2025

We often get asked about cyber security and cyber security assessments. Sometimes we are in the room when others are talking about it and I’ll admit, I eavesdrop a little to see what they say. Here is the top 5 worst pieces of advice I’ve heard lately about cyber security:

  1. Our IT guy/girl/company takes care of that for me!
  2. We bought a “box” from vendor XYZ that stops all bad internet traffic.
  3. Our anti-virus is up to date, so we're good.
  4. We use Macs, and they don’t get viruses.
  5. You can’t stop it, so why even try!

Cyber Security

While you might have the best IT person fixing your computers, in EVERY vulnerability assessment and cyber security audit we have performed, the IT support person has NEVER said cyber security was in their job description. Most often, their job was keeping the computers up and running, replacing batteries in wireless mice, and installing the latest version of your line of business application. While they have the best of intentions, uptime gets in the way of cyber security.There is no silver bullet, no one solution, and no one “box” that can prevent you from being hacked. Only through a defense in depth strategy, with constant attention to new vulnerability attacks and the reviewing the latest exploits will you be even close to keeping up with the hackers.Anti-virus is only one piece of the larger defense in depth strategy. Do you need anti-virus? Yes. Is it going to stop all malware? No. But, you still need it. And, pay for the updated definitions. Viruses come out too frequently for you to “wait until next year” to get the upgrade.While Apple’s Mac operating system may not be the target of much of the malware and viruses written today, it is only because of the smaller numbers of installed computers. It’s not financially advantageous for attackers to write viruses for the Apple. But, Apple computers do get viruses.Lastly, ignorance is not bliss when it comes to protecting your computers against hackers. And in some States, it is against the law to ignore the problem, hoping it will go away. In Massachusetts, resident’s personal data protection laws require an active approach, including annual risk based reviews of your IT environment.Hacking is continuing to grow. Only through regular vulnerability assessments and information technology audits can you keep up.To learn more about vulnerability assessments and information technology audits, contact us at617-471-1120 today!

Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

OCD Tech

25 BHOP, Suite 407, Braintree MA, 02184

844-623-8324

https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
SOC 2 ® Readiness Assessment
SOC 2 ®
SOC 3 ®
SOC for Cybersecurity ®
IT Advisory Services
IT Vulnerability Assessment
Penetration Testing
Privileged Access Management
Social Engineering
WISP
General IT Controls Review
IT Government Compliance Services
CMMC
DFARS Compliance
FTC Safeguards vCISO

Industries

Financial Services
Government
Enterprise
Auto Dealerships

The Worst Advice We've Heard About Cyber Security

By  
Michael Hammond
October 12, 2016
4
min read
Share this post

We often get asked about cyber security and cyber security assessments. Sometimes we are in the room when others are talking about it and I’ll admit, I eavesdrop a little to see what they say. Here is the top 5 worst pieces of advice I’ve heard lately about cyber security:

  1. Our IT guy/girl/company takes care of that for me!
  2. We bought a “box” from vendor XYZ that stops all bad internet traffic.
  3. Our anti-virus is up to date, so we're good.
  4. We use Macs, and they don’t get viruses.
  5. You can’t stop it, so why even try!

Cyber Security

While you might have the best IT person fixing your computers, in EVERY vulnerability assessment and cyber security audit we have performed, the IT support person has NEVER said cyber security was in their job description. Most often, their job was keeping the computers up and running, replacing batteries in wireless mice, and installing the latest version of your line of business application. While they have the best of intentions, uptime gets in the way of cyber security.There is no silver bullet, no one solution, and no one “box” that can prevent you from being hacked. Only through a defense in depth strategy, with constant attention to new vulnerability attacks and the reviewing the latest exploits will you be even close to keeping up with the hackers.Anti-virus is only one piece of the larger defense in depth strategy. Do you need anti-virus? Yes. Is it going to stop all malware? No. But, you still need it. And, pay for the updated definitions. Viruses come out too frequently for you to “wait until next year” to get the upgrade.While Apple’s Mac operating system may not be the target of much of the malware and viruses written today, it is only because of the smaller numbers of installed computers. It’s not financially advantageous for attackers to write viruses for the Apple. But, Apple computers do get viruses.Lastly, ignorance is not bliss when it comes to protecting your computers against hackers. And in some States, it is against the law to ignore the problem, hoping it will go away. In Massachusetts, resident’s personal data protection laws require an active approach, including annual risk based reviews of your IT environment.Hacking is continuing to grow. Only through regular vulnerability assessments and information technology audits can you keep up.To learn more about vulnerability assessments and information technology audits, contact us at617-471-1120 today!

Share this post
Michael Hammond