• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us
Paths to Exploiting a Privileged Account
27 Jun
0

Paths to Exploiting a Privileged Account 

Posted by OCD Tech Cybersecurity, phishing, Privileged Access Management (PAM)

A large number of data breaches are caused by stolen passwords, usually via some kind of social engineering technique and/or […]

Read More
Cost of Data Breaches
24 Jun
0

Cost of Data Breaches  

Posted by OCD Tech Cybersecurity, IT Advisory Services

The year 2024 has already seen a surge in cyberattacks, with data breaches reaching unprecedented levels. Recent reports reveal that […]

Read More
CDK SECURITY RISKS
20 Jun
0

Guard Against CDK-Related Security Risks

Posted by Robbie Harriman disaster recovery, FTC, vCISO

By Nick Reed, Dave Cantor-Adams, Jeff Harms and Robbie Harriman. Heightened Vigilance Advised As you may be aware, CDK systems […]

Read More
DATA AND SECURITY TOP CONCERNS
19 Jun
0

Top Data Security & Privacy Concerns

Posted by OCD Tech IT Security

Data has become the lifeblood of businesses across the United States. However, this reliance on data comes with significant risks. […]

Read More
BEST PRACTICES FOR IT AUDITS
18 Jun
0

Best Practices for IT Audits

Posted by OCD Tech IT Audit, IT Security

IT audits have become indispensable for organizations seeking to maintain robust cybersecurity, ensure compliance, and optimize IT performance. Adhering to […]

Read More
ftc safeguards rule
13 Jun
0

FTC Safeguards Rule

Posted by OCD Tech Cybersecurity, FTC, IT Security, vCISO

What’s Changed & What to Do Next  The FTC Safeguards Rule has been updated, and the new requirements are now […]

Read More
ftc safeguards
11 Jun
0

FTC Safeguards

Posted by OCD Tech Cybersecurity, FTC, vCISO

Protecting Information & Avoiding Penalties  Safeguarding customer information is paramount for non banking financial institutions. The Federal Trade Commission’s (FTC) […]

Read More
SOC REPORTS
06 Jun
0

SOC® Reports

Posted by OCD Tech Cybersecurity, SOC Reporting Services

Boost Customer Trust and Security For businesses that handle customer data, demonstrating a robust security posture is not just good […]

Read More
VIRTUAL CISO
04 Jun
0

vCISO: Cybersecurity Expert on Demand  

Posted by OCD Tech Cybersecurity, IT Security, vCISO

Expertise, Flexibility, and Cost-Effectiveness  Cybersecurity is no longer a luxury, but a necessity for businesses of all sizes. Yet, hiring […]

Read More
VULNERABILITIES
30 May
0

Vulnerabilities

Posted by OCD Tech Cybersecurity, IT Security, vulnerability assessment

How to Shield Your Business  The digital world in 2024 is a double-edged sword for businesses. On one hand, technology […]

Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 24
  • 25

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us