• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us
AI FOR GOOD
26 Apr
0

AI for good 

Posted by OCD Tech AI, Cybersecurity, vulnerability assessment

Highlighting Positive Uses  We are often bombarded with news of Artificial Intelligence-powered cyberattacks and the ever-evolving threats they pose. While […]

Read More
CHOOSING CYBERSECURITY
23 Apr
0

Choosing Cybersecurity

Posted by OCD Tech Cybersecurity, IT Security

OCD Tech vs. The Rest  As cybersecurity experts who understand the importance of a strong defense, we know navigating the […]

Read More
SHORTCHANGING SECURITY
19 Apr
0

Shortchanging Security  

Posted by OCD Tech Cybersecurity, IT Security, Privileged Access Management (PAM), vulnerability assessment

CEO’s Worst Nightmare  Skimping on security is a recipe for disaster. It’s a gamble CEOs play at the expense of […]

Read More
VIRTUAL CISO
16 Apr
0

Virtual Ciso

Posted by OCD Tech Cybersecurity, vCISO, vulnerability assessment

Expertise on Demand  With new threats emerging seemingly every day. For businesses of all sizes, staying ahead of these threats […]

Read More
PHISHING SCAMS
11 Apr
0

Phishing Scams 

Posted by OCD Tech IT Security

Don’t Get Hooked! Spotting Phishing Scams Like a Pro  Ever gotten an email that seems a little too good to […]

Read More
Penetration Testing
09 Apr
0

Penetration Testing  

Posted by OCD Tech IT Security

Don’t Get Hacked, Safeguard Your Business  Imagine a world where you can proactively identify weaknesses in your defenses before cybercriminals […]

Read More
ELEVATING FTC SAFEGUARDS
04 Apr
0

Elevating the FTC Safeguards 

Posted by Nick Reed Cybersecurity, FTC

Embracing a Defense in Depth Approach  In the ever-evolving landscape of cybersecurity, one fundamental principle remains clear: compliance does not […]

Read More
soc for cybersecurity
02 Apr
0

SOC for Cybersecurity

Posted by OCD Tech IT Security

Building Assurance: Why Companies Need  While existing frameworks like SOC 2 and 3 address security controls, they lacked a dedicated […]

Read More
Charging stations in public spaces
28 Mar
0

Charging Stations in Public Areas 

Posted by Don Lander Cybersecurity

Public charging stations pose potential risks for fraudulent transactions and identity theft, even for users equipped with antivirus software on […]

Read More
Why backups and storage are critical
26 Mar
0

Why backups and storage are critical

Posted by OCD Tech Cybersecurity, disaster recovery, Insurance, IT Audit, Privileged Access Management (PAM), vulnerability assessment

Data is the lifeblood of our digital world. Businesses and individuals alike are generating more data than ever before. Why […]

Read More
  • 1
  • 2
  • …
  • 5
  • 6
  • 7
  • …
  • 25
  • 26

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us