{"id":747,"date":"2026-04-27T06:44:12","date_gmt":"2026-04-27T11:44:12","guid":{"rendered":"https:\/\/cmitsolutions.com\/boston-ma-1089\/?p=747"},"modified":"2026-04-27T11:05:50","modified_gmt":"2026-04-27T16:05:50","slug":"the-biggest-cybersecurity-mistakes-you-dont-want-to-make","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/boston-ma-1089\/blog\/the-biggest-cybersecurity-mistakes-you-dont-want-to-make\/","title":{"rendered":"The Biggest Cybersecurity Mistakes You Don&#8217;t Want To Make"},"content":{"rendered":"<p>It\u2019s surprising how many people remain clueless about the security of their online behavior. Have you ever wondered if your data or passwords are on the <a href=\"https:\/\/cmitsolutions.com\/boston-cambridge\/is-your-info-safe-from-the-dark-web\/\">dark web<\/a>? Have you ever looked? According to this <a href=\"https:\/\/www.varonis.com\/blog\/data-breach-literacy-survey\/\">Varonis survey<\/a>, 64 percent of Americans had never checked to see if they were affected by a data breach, and recent 2026 reports show that despite increased awareness, alert fatigue causes over 70 percent of users to ignore critical security warnings. That\u2019s crazy! Data breaches and AI-driven cyber-attacks are happening at an alarming rate, and you have to take responsibility for your data before finding yourself or your company compromised.<\/p>\n<p>The following is our updated list of the biggest cybersecurity mistakes people make and the potential dangers associated with them.<\/p>\n<h3><span style=\"color: #003366\"><strong>Clicking Links or Attachments from Unknown Senders<\/strong><\/span><\/h3>\n<p>This should seem obvious by now. Clicking on links or attachments from unknown senders whether it\u2019s in an email, text message, or a direct message on a social platform is a hard no. Phishing is still the primary way hackers gain access to your sensitive information and hack your infrastructure.<\/p>\n<p>However, the landscape has shifted dramatically. With the rise of generative AI, phishing emails no longer have the tell-tale spelling errors and poor grammar they used to. Unfortunately, <a href=\"https:\/\/www-01.ibm.com\/common\/ssi\/cgi-bin\/ssialias?htmlfid=SEL03130WWEN&amp;\">69 percent of organizations<\/a> don\u2019t believe the threats they\u2019re seeing can be blocked by traditional anti-virus software alone. As phishing attacks become more devious, incorporating deepfake audio voicemails and hyper-personalized spear-phishing messages, it is more important than ever to know <a href=\"https:\/\/cmitsolutions.com\/boston-cambridge\/dont-get-hooked-phishing-vishing-smishing\/\">how to recognize a phishing scam.<\/a><\/p>\n<p>Make sure your IT department implements zero-trust technology to protect you and your staff from these threats. They must train your staff regularly on <a href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/blog\/ai-generated-phishing\/\">identifying AI-generated social engineering tactics<\/a>. The moment you\u2019re most vulnerable is when you think you\u2019re safe. Staying vigilant will make you more likely to recognize and report phishing scams before becoming a victim.<\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2020\/12\/Biggest-Cybersecurity-Mistakes-Stat-B-April-2026.png\"><img decoding=\"async\" class=\"alignnone size-large wp-image-1150\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2020\/12\/Biggest-Cybersecurity-Mistakes-Stat-B-April-2026-1024x256.png\" alt=\"76 percent say it's getting harder to be fully prepared in the age of AI\" width=\"1024\" height=\"256\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2020\/12\/Biggest-Cybersecurity-Mistakes-Stat-B-April-2026-1024x256.png 1024w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2020\/12\/Biggest-Cybersecurity-Mistakes-Stat-B-April-2026-300x75.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2020\/12\/Biggest-Cybersecurity-Mistakes-Stat-B-April-2026-768x192.png 768w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2020\/12\/Biggest-Cybersecurity-Mistakes-Stat-B-April-2026-1536x384.png 1536w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2020\/12\/Biggest-Cybersecurity-Mistakes-Stat-B-April-2026.png 1584w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h3><span style=\"color: #003366\"><strong>Sharing or Reusing Passwords<\/strong><\/span><\/h3>\n<p>Sharing or reusing passwords for multiple accounts is another poor cybersecurity practice. Unfortunately, nearly everyone does it on some level even when they know they shouldn\u2019t. It\u2019s hard to make up a strong and unique password every time \u2013 am I right?<\/p>\n<p>The problem here is that whenever you share or reuse your password, you allow hackers to potentially gain access to more than a single-entry point. If you use that same password on multiple accounts and one of them is hacked, all those other accounts, devices, and cloud storage drives are now considered vulnerable. In order to prevent this, limit your password sharing to an absolute minimum and update your passwords regularly.<\/p>\n<p>You can also leverage a <a href=\"https:\/\/cmitsolutions.com\/boston-cambridge\/4-key-steps-for-securing-your-passwords\/\">password manager<\/a> to help manage your passwords and take the stress out of creating and remembering what password goes to each account. Even better, in 2026, you should be transitioning to Passkeys and biometric authentication wherever possible. Passkeys eliminate the need for traditional passwords entirely, relying on cryptographic keys stored securely on your device, making credential stuffing attacks virtually impossible.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #003366\"><strong>Installing Unauthorized Applications<\/strong><\/span><\/h3>\n<p>Applications on a desktop or device can be a great way to track your health, access your bank accounts, play games, or meet people, but they can also expose your personal information in ways you may not expect. Every app you install increases the likelihood of exposure, so thoughtfully decide if you\u2019re okay accepting the risk to your privacy before you install it.<\/p>\n<p>This is especially true with the explosion of unverified &#8220;AI assistant&#8221; wrappers and productivity extensions that request sweeping access to your browser data. Never install programs unless you know exactly what they do and what data they scrape. If you\u2019re unsure, ask your IT department to be safe before you hit the install button.<\/p>\n<p>As a cybersecurity standard, all employees should have user-only privileges on their machines. Admin privileges should be reserved for your IT team. A written corporate policy detailing what users can and can\u2019t do with their technology, known as a Shadow IT policy, is another highly useful guideline.<\/p>\n<h3><span style=\"color: #003366\"><strong>Disabling Automated Security Settings<\/strong><\/span><\/h3>\n<p>Remember that security update you disabled because it was taking too long? And then never actually installed or re-enabled it? This should go without saying, but every time you do that, you are putting your data at risk.<\/p>\n<p>Hackers love to access your data through poor update and patch management. <a href=\"https:\/\/cmitsolutions.com\/boston-cambridge\/15-most-effective-cybersecurity-tactics-for-smbs\/\">Make sure both your office and home office gear is updated regularly<\/a>. This includes routers, modems, Internet of Things (IoT) devices (smart thermostats, assistants, etc.), mobile devices, and your computers.<\/p>\n<p>According to recent cybersecurity threat landscape trends, automated exploitation of zero-day vulnerabilities happens within hours of disclosure. These types of vulnerabilities are particularly tempting for hackers, offering access to enterprise servers and any sensitive data stored there. Furthermore, unpatched smart home networks are increasingly used as launchpads for massive distributed denial-of-service (DDoS) botnets. Leave automatic updates turned on for your operating systems and critical software to ensure you receive vital security patches immediately.<\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2020\/12\/Biggest-Cybersecurity-Mistakes-Stat-A-April-2026.png\"><img decoding=\"async\" class=\"alignnone size-large wp-image-1149\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2020\/12\/Biggest-Cybersecurity-Mistakes-Stat-A-April-2026-1024x256.png\" alt=\"Security awareness training programs reduce risk of phishing attacks 86 percent\" width=\"1024\" height=\"256\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2020\/12\/Biggest-Cybersecurity-Mistakes-Stat-A-April-2026-1024x256.png 1024w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2020\/12\/Biggest-Cybersecurity-Mistakes-Stat-A-April-2026-300x75.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2020\/12\/Biggest-Cybersecurity-Mistakes-Stat-A-April-2026-768x192.png 768w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2020\/12\/Biggest-Cybersecurity-Mistakes-Stat-A-April-2026-1536x384.png 1536w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2020\/12\/Biggest-Cybersecurity-Mistakes-Stat-A-April-2026.png 1584w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h3><span style=\"color: #003366\"><strong>Visiting Untrusted Websites<\/strong><\/span><\/h3>\n<p>There is no doubt that you\u2019ve run into this issue at some point while browsing online. You were happily Googling when all of a sudden you quickly click a link that goes to an unsecured phishing website or run into an <a href=\"https:\/\/cmitsolutions.com\/boston-cambridge\/how-to-safely-navigate-a-ssl-certificate-error\/\">SSL certificate error<\/a>. Secure websites rely on valid SSL certificates to encrypt traffic exchanged between your browser and the website.<\/p>\n<p>Today, however, looking for the &#8220;padlock&#8221; icon is no longer enough, as over 90 percent of phishing sites now use free SSL certificates to appear secure. Sometimes a given website\u2019s certificate has expired, is self-signed, or uses a malicious homograph domain (where a letter is replaced by a visually identical character from another alphabet). Luckily <a href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/blog\/the-45-day-ssl-certificate-countdown\/\">by 2029, all public SSL\/TLS certificates will shift from 13 months to a 1.5-month maximum validity.<\/a><\/p>\n<p>If your browser gives you a warning screen telling you that \u201cYour connection is not private,\u201d listen to it. Although annoying, this message is a good thing, as it is trying to protect you. It\u2019s considered a best practice to steer clear of websites that trigger these warnings and to use DNS filtering tools to automatically block known malicious domains.<\/p>\n<h3><span style=\"color: #003366\"><strong>Connecting to Unsecured WiFi Networks<\/strong><\/span><\/h3>\n<p>This goes for anytime you are doing anything sensitive online. While public Wi-Fi may be convenient, free, and ubiquitous, it\u2019s also a great way to have your sensitive data (usernames, passwords, credit card numbers, etc.) compromised. It may be fine for checking the score of the ballgame, but it\u2019s not safe for checking your bank account.<\/p>\n<p>If you want to connect safely while on the go, disconnect from Wi-Fi and use your 5G network. You can also leverage a virtual private network (VPN). Many companies offer VPNs for users, providing additional security when using public Wi-Fi by encrypting network communications. However, ensure you are using a reputable, paid VPN service, as many free VPN apps heavily track and sell your browsing data. They are not fool-proof, so if you plan to do anything where sensitive info is exchanged, do it from your 5G connection or a trusted network.<\/p>\n<h3><span style=\"color: #003366\"><strong>Doing Nothing<\/strong><\/span><\/h3>\n<p>The biggest mistake you can make with your online security is to do nothing at all. Now that you\u2019re aware of the cybersecurity mistakes you could be making, it\u2019s time to take charge of your data. Start small by implementing one change at a time, like setting up <a href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/blog\/always-enable-multi-factor-authentication-mfa\/\">multi-factor authentication (MFA)<\/a> on your most important accounts today.<\/p>\n<p>Before you know it, you\u2019ll be able to recognize a scam when you see one and help others up their security game too. Cyber resilience is a continuous journey, not a one-time setup.<\/p>\n<p>Written by: <a href=\"https:\/\/cmitsolutions.com\/boston-cambridge\/about-us\/\">Chris Zambuto<\/a> | Chief Information Security Officer <a href=\"https:\/\/www.facebook.com\/CMITBostonCambridge\/\">@<\/a><a href=\"https:\/\/www.facebook.com\/CMITBostonCambridge\/\">CMITBostonCambridge<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s surprising how many people remain clueless about the security of their&#8230;<\/p>\n","protected":false},"author":259,"featured_media":1151,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-747","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blog"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/posts\/747","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/comments?post=747"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/posts\/747\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/media\/1151"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/media?parent=747"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/categories?post=747"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/tags?post=747"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}