Computer Support, Design, Print and Business Telecoms - ABC Service, Tavistock, Devon

8 examples of bad security advice that you can safely ignore

Dec 22, 2022

Article provided by Emsisoft

There’s a lot of security advice floating around the web. A lot. While much of it is solid and will help you improve your security posture, you’ll occasionally encounter advice that is not so good. For example, it’s not uncommon to see articles presenting outdated recommendations or theoretical security risks that have been blown out of proportion. And, in some instances, the information is just plain wrong.

Here are eight examples of bad security advice that you can safely ignore.

1. Change your password regularly

In the past, the best practice was to change your passwords every few months. The reasoning was simple: in the event that an attacker stumbled across one of your old passwords, it would no longer be in use and your account would be safe.

However, this advice is now considered outdated and has been for years. Here’s why:

  • Shortcuts: Users who frequently change their passwords tend to take shortcuts – by recycling passwords or incorporating personal information into them, for example – weakening account security.
  • Practicality: While frequent password resets might have been feasible when you only had a handful of accounts to worry about, these days you probably have hundreds of accounts of online services to manage, each with its own unique set of login credentials. Changing all of your passwords periodically would be a logistical nightmare.

Bottom line

Rather than changing your passwords periodically, you should use a good password manager – preferably one that will notify you if one of your passwords is involved in a breach – to stay on top of your login credentials, and protect your accounts with multi-factor authentication.

Note from ABC Service - 2FA or MFA is a great way to secure your accounts as this usually involves a text message, security app notifications and approvals and more.

2. Don’t scan QR codes

As the use of QR codes has surged in popularity, some security experts – including the FBI – have raised concerns that threat actors could use them to redirect people to phishing sites and/or malware downloads.

While the risks are theoretically possible, the reality is that real-world cases are few and far between and you are exponentially more likely to run into malware or a phishing attack in your email or SMS inbox. The advice isn’t wrong, per se, it’s just extremely far down the security priority list for most people.

Bottom line

The risk of scanning a QR code is near zero. With that being said, if you’re going to be entering financial information, it’s better to be safe than sorry, regardless of whether you’re trying to access the page via a URL or QR code. Just take a second to manually type the URL into your browser and you’re good to go.

3. Just use a Mac!

Overzealous Apple users sometimes like to claim that Macs are somehow immune to malware. As in, if you really wanted to up your cybersecurity game, you’d just make the switch to macOS!

The reality is that no operating system is perfect when it comes to security. While Apple’s “walled garden” ecosystem might provide a higher level of software quality control than the Wild West Windows environment, it’s still possible to get malware on a Mac, including trojans, droppers, ransomware and more.

The main reason fewer malware threats exist for Mac is simply that Windows is a bigger target. Windows commands around 76 percent market share, while just 16 percent of desktop and laptop users are on macOS. For cybercriminals, there’s less to gain by going after the smaller fish, so they tend to target the system with the larger user footprint.

Bottom line

Yes, Macs still get malware. No, it doesn’t make sense to transition to an entirely new operating system that may not be much more secure.

Note from ABC Service - In fact we have seen Mac's with viruses, the whole system had to be completely wiped and started again.

4. Change your language settings to avoid ransomware

Some cybersecurity experts have suggested that changing your keyboard layout and language settings to Russian could be an easy way to protect your system from ransomware.

How? Well, ransomware gangs typically don’t face any repercussions from law enforcement agencies inside the Commonwealth of Independent States, provided they don’t target organizations in those regions. And in order to avoid inadvertently targeting a CIS-based organization, many ransomware families check the language and keyboard settings of the target system before executing the payload. If a CIS language – such as Russian – is detected, the ransomware terminates without encrypting a single file.

However, there are some major holes in this piece of security advice. Firstly, it’s not enough to simply install a CIS language keyboard. Most ransomware strains check the system’s active language, not just the installed languages, which means – unless you’re willing to use a Russian keyboard layout – the ransomware will still execute. Secondly, and more importantly, the language checking process is just one small step in a threat actor’s target verification process. Ransomware operators use various techniques to learn as much as they can about their targets and can easily identify whether an organization is legitimately located in the CIS, regardless of its keyboard and language settings.

Bottom line

Changing your language setting or using a Cyrillic keyboard layout is highly unlikely to thwart any ransomware attacks. You are far better off using that time to implement proven ransomware mitigation techniques.

5. Don’t use public charging stations

In recent years, various cybersecurity experts – including the FCC – have issued warnings about juice jacking, a type of attack whereby a threat actor loads malware into the USB port of a public charging station. Because the USB standard conveys both electricity and data, there’s a risk that plugging in your device to a compromised USB port to charge it could lead to data theft or malware infection.

But you don’t need to be overly concerned about juice jacking. While it is theoretically possible that a particularly determined cybercriminal could hack a public charging station, the chances of coming across this type of attack and it actually working are extraordinarily slim. In fact, we aren’t aware of any real-world juice jacking incidents to date.

Bottom line

There have been a few proof-of-concept examples of juice jacking, but in-the-wild attacks are extremely uncommon, or even non-existent. For threat actors, they’re difficult to implement and not scalable. You almost certainly don’t need to worry about this one; there are more important things on your security to-do list.

6. Use a VPN to improve your security and privacy

Consumer VPNs are useful if you want to shield your activity from your ISP or access geo-restricted content.

In terms of security, however, the benefits of a VPN are fairly limited. VPNs do encrypt your network traffic, which was somewhat useful back in the days when most of the Internet was still using unencrypted HTTP. But now that the vast majority of the web is using HTTPS – see point #8 below – a VPN doesn’t really offer too much in the way of security. Or privacy. You’re basically substituting the VPN provider for your ISP so, unless you trust the former more than the latter, you’re not really improving your situation.

Bottom line

Unless you’re trying to access geo-restricted content or torrenting, you probably don’t need a VPN. The reality is that using one would do little to improve either your security or your privacy.

The problem with this piece of advice is that people don’t click on links that look suspicious to them – after all, nobody is actively trying to get infected with malware or fall for a phishing attack. Rather, people click on links that don’t look suspicious to them.

Instead, we should be talking about clues that may indicate that a link is malicious. For example, if you hover over a URL and discover that the destination address doesn’t match the link text, there’s a good chance that you’re dealing with a malicious link. Similarly, if the content containing the link is poorly written or visually off-brand, or if you’re asked for information that should never be disclosed – like a password or PIN number – you should probably avoid clicking on the URL.

Bottom line

Being cautious with your clicks is important but, before you can start avoiding malicious links, you’ll need to know what a malicious link actually looks like!

8. Don’t use public Wi-Fi

In the early days of the Internet, most websites used unencrypted HTTP. That meant other people on your network could easily snoop on your network traffic, view the web pages you were accessing, monitor your messages and intercept any other data you might have sent.
However, this all began to change with the gradual widespread deployment of HTTPS, a protocol that secures the communication between your browser and the web server. With HTTPS, traffic is encrypted, which means that even if your data is intercepted it will not be usable. These days, about 95% of web page loads use HTTPS and most browsers will warn you if you visit a traditional HTTP site.

Bottom line

Just about every online service that matters uses HTTPS and the real-world risk of using public Wi-Fi is very low. And no, you don’t need to use a VPN – not even on public Wi-Fi.

 

Article provided by Emsisoft

OLDER POSTS

Does Eco-Friendly Printing Really Matter in 2026? Here’s the Green Truth

In 2026, the conversation around sustainability has shifted from a “nice-to-have” marketing buzzword to a fundamental pillar of business operations. For small to medium-sized businesses across the UK, the pressure to demonstrate environmental...

Is Your PC Due an MOT? Why Regular Servicing Saves You a Headache (and Money!)

Most of us wouldn’t dream of driving our cars for years on end without a single service or an MOT. We know that skipping that yearly check-up is a recipe for a breakdown at the most inconvenient moment possible, usually on a rainy Tuesday morning when you’re already...

Beyond the Screen: The Most Exciting Tech Breakthroughs of April 2026

It is a fantastic time to be involved in the world of technology. As we settle into April 2026, the pace of innovation isn’t just moving; it’s accelerating. Here at ABC Service, we spend a lot of our time ensuring your office Wi-Fi is snappy and your laptops are...

Beyond ‘Turn it Off and On Again’: The New Rules of Managed IT

Good IT support should do more than swoop in after something has already gone bang. For growing businesses, reactive fixes are only part of the job. The real value comes from preventing issues, improving performance, tightening security, and making sure your systems...

Email Security: Why DMARC, SPF, and DKIM Are No Longer Optional

Have you ever sent an important invoice or a time-sensitive quote to a client, only to have them tell you three days later that they “never received it”? You check your sent folder, and everything looks fine. You didn’t get a bounce-back. So, where did it...

The Dead Internet Theory: Are We Alone in the Digital Void?

Welcome to the very first edition of Tuesday Intrigue! Here at ABC Service, we spend our days fixing computers, designing stunning graphics, and ensuring your business stays connected. But as we look at the digital landscape in 2026, we’ve noticed things are getting a...

Why High-Performance Web Hosting Will Change the Way Your UK Small Business Ranks

Have you ever clicked on a link, waited three seconds for the page to load, and then immediately hit the ‘back’ button? We’ve all been there. In the fast-paced digital world of 2026, those three seconds feel like an eternity. For a small business, those...

The Dressmaker’s Guide to Stress-Free Sewing: Why Professional Pattern Printing Wins

If you have ever spent an entire evening on your living room floor, armed with a roll of Sellotape and a pair of paper scissors, painstakingly joining thirty sheets of A4 paper together, you know the “joy” of digital sewing patterns. We call it...

Tired of Being On Hold? Why a Local IT Partner Beats National Call Centres in Devon

We’ve all been there. You’re in the middle of a busy Tuesday morning in Tavistock, your internet has decided to take an unscheduled holiday, and your printer is making a sound like a tractor in distress. You call your national IT provider, only to be met with twenty...

Memory Lane is Getting Expensive: Why RAM Prices are Climbing in 2026

If you’ve popped into our Tavistock office lately or been browsing for a new laptop online, you might have noticed something a bit unsettling. The prices aren’t just creeping up; they’re leaping. Specifically, the cost of “Memory” or RAM (Random...