Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
The Lamest Cybersecurity Tips We’re Tired of Hearing (and What to Do Instead)
Published:
October 7, 2025

The Lamest Cybersecurity Tips We’re Tired of Hearing (and What to Do Instead)

By:
Team Huntress
Share icon
Glitch effectGlitch effectGlitch effect

For years, we’ve heard the same advice on how to unlock higher levels of cybersecurity greatness. We’re here to tell you that these well-meaning cybersecurity tips have turned into background noise, the kind of guidance that gets a thumbs-up emoji, and not much more.

While these suggestions aren’t totally wrong, they're way too vague to be actionable, too old to be relevant, or just plain unrealistic. When cybersecurity advice doesn't connect with real-world behavior, you get served a false sense of security with a side of potentially serious vulnerabilities. 

Let’s break down some of the most overused cybersecurity tips and share what you should do instead: redefine the offensive game and get disruptive on attackers. 


"What's the most elegantly offensive thing you've done to wreck a hacker's game plan?" (video originally posted to LinkedIn) 


"Use a strong password" (you mean, a pet’s name + an exclamation point isn’t secure?)

If there were a contest for most popular cybersecurity tips, this would bring in the blue ribbon year after year. You’ll catch this phrase in nearly every security awareness training, but password security isn’t about throwing out a capital letter, a number, and a special character anymore.

Attackers have access to sophisticated password-cracking tools and dark web markets full of cheap, compromised credentials, so you have to step up your password game to stay safe online. 

Here’s another option: Use password managers to generate long, random passwords automatically. Go with the NIST standard of password security: a minimum of 15 characters, with emphasis on length over complexity. At 100 billion guesses per second, it would take a computer more than 500 years (!) to guess all the possible combinations of 15 lowercase letters.

For those who rely on "familiar phrases" that can be easily hacked, password managers take the human element out of the equation. As a user, keep tabs on one strong master password, and the manager handles everything else, solving problems like weak passwords, reuse, and memorization hiccups.

By the way, throughout Cybersecurity Awareness Month, we’re giving you free access to episodes of select Managed Security Awareness Training (SAT). Check out this one on secure passwords:

  • "No Weak Passwords Allowed"



"Don't click suspicious links" (...but what if nothing looks shady?)

Modern phishing attacks have leveled up in a major way. Almost gone (but not quite!) are the days of phishing emails brimming with spelling and grammar errors, sloppy designs, and strange phrases. 

Attackers now create realistic email replicas of legitimate businesses, complete with polished branding, SSL certificates, and URLs that closely mimic real domains. Simply telling people to avoid "suspicious" links assumes they can easily spot sophisticated social engineering attempts.

Try this instead: Teach and encourage email verification techniques. If someone receives an unexpected link or attachment, especially one requesting login credentials, they should verify it through an independent channel. This means calling the sender, logging into accounts directly through bookmarked sites, or using separate communication methods to confirm legitimacy.

It’s also critical that employees know how to report phishing attempts, so that the right people in your organization are aware and can take action. 

Learn to stay ahead of social engineering scams with these free Managed SAT episodes:

  • "Hey Hackers, Smish THIS"

  • "On a Spear Phishing Tour"


"Keep your software updated" (skip automation if you like getting hacked)

Software updates are critical for security and keeping attackers on the outside, but asking people to manually check for and install updates across dozens of applications and operating systems is unrealistic. 

People don’t update because they're busy, overwhelmed, putting out fires, or just forget until it's too late.

Do yourself a favor: Rely on automatic updates wherever possible, especially for operating systems, browsers, and security applications.

For enterprise environments, get centralized patch management systems that handle updates systematically. This takes human oversight out of the equation and keeps security patches rolling smoothly. 


"Install antivirus" (signature-based detections only go so far)

Traditional antivirus (AV) software was built for an old-school threat landscape. Attackers know it’s ready and waiting to block malicious signatures and light up your dashboards. So they rely on tactics like fileless malware, Living Off the Land (LOLBins) techniques, or sneaky ransomware that dodges signature-based detection altogether.

Here’s another approach: Combine Managed Endpoint Detection and Response (EDR) capabilities with Managed Microsoft Defender to sniff out shady attackers roaming around your systems and networks. Get offensive and give yourself an unfair advantage against hackers.  


"Don't reuse passwords" (because hackers love it when you do)

This advice is good, but it isn’t practical for most people to follow without a password manager. On average, people have 168 passwords for personal use and 87 for business-related accounts. Each of these should have an individual, unique, and secure password. Sounds really ambitious without help from a password manager, right?

So if your banking password slowly crept into other accounts for convenience, or you’re recycling passwords across work and home devices, it’s a good time to rethink your password security strategy or create one altogether.  

Check this out: Password managers solve this problem (see above). Rather than expecting superhuman memory skills and magic, give people tools that make good password hygiene effortless. This turns a seemingly impossible chore into a manageable task.


"Turn on MFA" (text codes aren’t the only option?)

“Turn on multi-factor authentication” is great advice, but it usually stops there without explaining the different options to keep yourself safe.

Not all MFAs are created equal. Sure, a text message code is better than nothing, but it’s easy for attackers to get around. App-based authentication (like Authenticator or Duo) or physical security keys offer stronger protection and are much harder to compromise. 

Turn it up a notch: Recommend app-based authenticators like Authy, Google Authenticator, or Microsoft Authenticator as the baseline. For high-value accounts, suggest hardware tokens like YubiKeys.

If people are grumbling about a few extra steps that security imposes, explain how easy it is for attackers to compromise SMS-based MFA completely under the radar and what this means for their privacy or lack thereof after an intrusion.

Learn why MFA keeps you more secure online with this Managed SAT episode:

  • "Keep 'Em Under Digital Lock and Key"

Simple diagram outlining MFA


"Lock your screen" (but hackers hope your accounts stay wide open)

Screen locking and physical security are good habits, but it doesn’t (and never will) measure up to the risk of cyber threats in most corporate environments. With remote work, cloud storage, and mobile devices, network-based attacks are more likely than threats stemming from physical access to a workstation.

Mathematically, your digital attack surface is a lot bigger than the physical one. So, attackers have infinitely more opportunities to wreck your systems with cyber versus physical intrusions. 

Shift your perspective: Don’t ignore things like screen locks and shoulder surfing. But don’t make them the main focus either. Bring them into awareness scenarios that cover network security hygiene and align with your workforce. For example, if you’re a fully remote business, consider discussions on secure wifi, risks of public networks, and keeping your laptop screen low-key in public places.  


"Change your password every 30, 60, or 90 days" (so hackers can set their calendar reminders, too)

Forced regular password changes don’t actually help your security posture. Realistically, here’s what people do when they have to change passwords too often:

  • Create predictable (easily hackable) patterns

  • Rely on small changes to existing passwords (think swapping a single character or letter)

  • Store them haphazardly

This is just another way hackers get potentially ridiculously easy access to your systems and networks.

Listen to the pros: NIST says reset passwords if you suspect you’ve been compromised. Otherwise, drop your mandatory password reset rules! 


"Cybersecurity is everyone's responsibility" (it’s not just for IT nerds anymore)

Everyone in a business helps with cybersecurity, not just IT. Whether you work in human resources, legal, marketing, or any other department, you contribute to your organization’s security posture every day. 

But truly making cybersecurity everyone’s responsibility means regular communication to highlight actions that protect not just you, but also the whole team. Without the right resources, training, or tools, people don’t get a fair shot at being successful human firewalls. 

Be a resource, not a roadblock: Give people what they need to keep a business safe from hackers: knowledge, resources, and authority to confidently make good security decisions and safely report sketchy activity without blame. 


"Be careful online" (vague is your color, and you wear it well)

The least helpful cybersecurity advice award goes to “Be Careful Online!” There’s NO actionable guidance, and this could mean absolutely anything. Without real-world suggestions for improvement, this is meaningless security jargon that goes in one ear and out the other.

Give this a shot: Teach people how to spot common cyber threats like phishing attempts, malicious websites, malvertising, and social engineering tactics with tools like ad blockers and Managed SAT.


Turn lame, overplayed cybersecurity best practices into action 

People are an organization's strongest defense, but also its easiest target. Effective cybersecurity communication is a balance of compassion and common sense, listening and leading. People want to be safe online, but need realistic pathways to get them there. 

No matter how strong your security stack is, human behavior and psychology still have a critical role in keeping things secure. That’s why giving people a clear, actionable game plan instead of murky marching orders does more to build a strong security foundation than any printed training certificate ever could.



Categories
Cybersecurity Education
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • 3 Hot Takes and Tips for Cybersecurity Awareness Month 2023

    In the spirit of Cybersecurity Awareness Month, use these cybersecurity tips to take your security hygiene and cyber knowledge up a notch.
  • What Is Multi-Factor Authentication? A Complete Guide to MFA Security

    Understand the multiple uses for multi-factor authentication, plus why it’s important for cybersecurity and how to implement it at your organization.
  • One Order of Tips, Tricks & Hot Takes for Cybersecurity Awareness Month 2024

    Our hottest security tips, tricks, and opinions to kick this Cybersecurity Awareness Month off right.
  • Top 4 Tips for Cybersecurity Awareness Month

    In honor of National Cybersecurity Awareness Month, here are four critical tips to help you take both your cybersecurity hygiene and knowledge up a notch.
  • How to Offend Your IT Team: A Guide for the Security Unaware

    Ready to drive your IT team crazy? See our top security blunders and learn practical tips to improve your cybersecurity habits.
  • A Parent's Guide to Securing Children's Tech Gifts

    Safeguard holiday tech gifts for kids this season—secure their devices, protect privacy, and build lifelong safety habits. Feat. resources from our exclusive Fireside Chat.
  • Unmasking the Central Villain: Inside Adversary-in-the-Middle Attacks

    Discover how Adversary-in-the-Middle attacks silently hijack your sessions, and learn how to spot and prevent AiTM with tips from the experts at Huntress.
  • Live Hacking Into Microsoft 365 with Kyle Hanslovan

    Learn how cybercriminals bypass Microsoft 365 MFA and steal credentials in a live hacking demo. Discover defense strategies to protect your systems.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy