Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Our Top 7 List of IT Myths and Wild Conspiracies

Our Top 7 List of IT Myths and Wild Conspiracies

Being in IT, we’ve seen and heard it all. Between the campfire horror stories of technicians to the outlandish IT conspiracies and ‘home remedies’ that get passed around, we’ve decided to compile a list of some of our favorite IT and technology myths.

Myth #1 - Macs Are Secure and Don’t Get Viruses

To debunk this myth, we actually need to take a step back and admit that it’s based in a couple of truths. The average Mac user has probably not seen much malware on macOS, but we’ll get to that in a moment. If you look at the strict definition of a computer virus as being a type of malware that spreads on a computer from one file to another, Macs technically don’t get viruses. Viruses are quickly becoming a thing of the past on other modern operating systems like Windows 10 as well, due to built-in security and the fact that the common computer virus in the strictest sense is essentially becoming obsolete.

Other types of threats, including malware, phishing attacks, and ransomware can infect Macs. On top of that, compared with Windows PCs, which dominate with a 91.76% market share, Macs have a lower risk of getting infected just because hackers know it’s more effective to focus on malware that either infects Windows or that doesn’t care about what type of system you are on (like online phishing attacks).

Either way, you aren’t out of the woods by making the switch.

Myth #2 - Blowing on Cartridges Before You Play

This one came up a few times when we surveyed our techs, so we had to include it. It goes all the way back to the mid-1980’s. Back then, many households had the Nintendo Entertainment System, and video games came on big five-inch plastic cartridges. Sometimes, when sliding a game into the console, it wouldn’t boot the game. The common practice for kids and teenagers everywhere was to pull out the cartridge and blow on the connectors and try again.

The thought behind this was that dust had collected on the electronic connectors, which could cause issues. Unfortunately, it was more likely that the connectors just didn’t get situated where they were supposed to when the game was inserted, and it just needed to be pulled out and put back in.

The problem with blowing on sensitive terminals of a cartridge is that the human breath contains a lot of water vapor, and over time that moisture can cause damage to the hardware.

Myth #3 - Google Plays Favorite to Sites that Pay

When you do a Google search, you’ve probably noticed that a few listings in the results show up as ads. Businesses can set up a budget with Google to run ads that show up within a certain geographic area for certain searches to help drive traffic to their sites. However, as web surfers, most of us inherently know when content is an ad, even at a glance. Only about 20% of traffic ends up clicking on an ad, although that’s more than enough to make Google’s ad service highly profitable and beneficial for businesses.

That said, all of the main 10 results that aren’t paid for are not affected at all by Google Ads. These are called organic results. When people talk about SEO, this is what they are referring to. Paying for ads doesn’t affect your ranking in the organic results, so if you don’t show up in the organic results, you’ll stop showing up entirely if you stop paying for ads.

How do you rank in the organic results of Google? It’s pretty complex and there’s no simple answer, but it’s about building good content and making your website user-friendly. Google’s goal for the search engine is to provide the best, most relevant sites when people search for something, so there aren’t many ways to “trick” the system.

Myth #4 - Charging Your Smartphone Overnight Ruins the Battery

This myth was sort of true at one point, but modern smartphone batteries have come a long way over the years. Now, technically, keeping your phone plugged in while it’s full is a little more stressful for the battery, because the battery goes into a trickle charge mode that keeps it topped off at 100 percent, but it’s a far cry from ruining the battery.

This state can cause the phone to heat up a little, in the same way that watching Netflix or playing a game can cause the phone to heat up. Excessive heat IS something to worry about, as it can slowly cause wear and tear to your device. That’s why Apple and some other phone manufacturers suggest not using restrictive cases on high-end phones. Locking in that heat can exacerbate the problem.

Instead of worrying about overcharging, it’s better to make sure you aren’t suffocating your phone. Some experts suggest taking it out of the case while charging overnight, and avoid tucking your phone into bed with you. Surrounding it with your big comfy blankets or stashing it under your pillow can slowly wear out your phone. Instead, stick with a cool flat surface or a small dish.

Oh yeah, and don’t buy cheap knock-off cables. Only get certified cables made or recommended by the phone’s manufacturer.

Myth #5 - Former Microsoft CEO Bill Gates Is Trying to Depopulate the World

Okay, this one isn’t exactly tech-related, other than the fact that we namedrop Bill Gates, but when I asked around for some of the best IT myths the techs could think up, I decided this doozy just had to make the list.

This might be crazier than what you’d expect from the tabloids in the grocery store checkout line, so bear with me. The rumor is that Bill Gates is taking his fortune earned from selling Windows, Office, and Xboxes and putting it towards his James-Bond-villain-esque goal of taking over the world.

There are a lot of crackpot articles to back this up, claiming that the world’s richest nerd is using the Bill and Melinda Gates Foundation to help governments develop a slew of gadgets and solutions to rapidly reduce the world population. We’re talking everything from sneaking chemicals in the water to fake vaccines to a ray gun that makes you sterile. 

My only question is which James Bond actor should we have gone up against the villainous Bill Gates? Personally, I think I’d vote for Pierce Brosnan, but I’d love to hear your pick in the comments!

This conspiracy theory has been debunked many times, and fortunately, Bill Gates is too busy trying to give all of his money to charity to worry about world domination. Since 1994 he’s given more than $60 billion to charity and has been focused on disease research, water sanitation technologies, and childhood mortality. 

Honestly though, a James Bond film about a nerdy villain who announces his notorious plan to take over the world during a TED Talk presentation is exactly what we’d like to see. Make it happen, Hollywood.

Myth #6 - IT Security Doesn’t Matter if I Don’t Have Anything Important on the Computer

We hear this one a lot, unfortunately. You might not store sensitive information on your computer, but your computer does tend to have access to a lot of places that do store your sensitive information.

Do you check your email on your computer? Do you log into social media sites on your computer? Do you shop online or pay bills on your computer? Do you access files and software for your business? If you can answer “yes” to any of these, then your computer is a treasure trove of valuable data that you are putting at risk.

If cybercriminals get access to your email, they can gain access to just about everything else. They can reset passwords or take your accounts and set them up under a new email altogether. They can lock you out of your bank account, your PayPal account, and any other account before you could even know what hit you. Plus, if you have access to your work software, such as your line of business apps or your CRM software, or even just your contacts, then your customers’ data is at risk too.

The bottom line? It’s important to secure your computer.

Myth #7 - Nothing Gets Through the Firewall

Hollywood likes to overemphasize just how effective firewalls can be. Is our rugged hero getting hacked? The plucky young computer nerd who came along for the ride simply needs to turn on the firewall at the last minute to save the day, or in the more dramatic scenes, pull the cables out of the back of the computer.

Firewalls are an important part of your IT security, but they aren’t going to stop everything. In fact, from a strict technical definition, a firewall only really prevents a single type of malware that spreads from computer to computer.

More robust IT security solutions that include firewalls will stop a lot more threats than a firewall will on its own. Businesses need to equip spam-prevention, content filtering, and centralized antivirus/antimalware solutions to run in tandem with the firewall.

Are there any myths or misconceptions in your industry? Share them with us in the comments!

Tip of the Week: Here’s How to Calculate Your Proj...
65 Bitcoin Ransom Paid by Florida City


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, July 05 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Privacy Hosted Solutions Network Security IT Services Data Backup Email Malware Internet Hackers Software Business Efficiency IT Support Outsourced IT Microsoft Innovation Data Recovery Mobile Devices Productivity Computer Hardware Managed IT Services Upgrade Business Continuity Small Business IT Support Google Cloud Computing Cybersecurity Ransomware Backup Phishing Collaboration Tech Term User Tips Communication Managed Service Provider Managed IT Services Smartphone Disaster Recovery Workplace Tips Windows 10 Business Management Mobile Device VoIP Smartphones Internet of Things Android Remote Monitoring Paperless Office Data Management Social Media Quick Tips communications Facebook Browser Encryption Managed IT Managed Service Windows 10 Windows Artificial Intelligence Server Network Office 365 Save Money Miscellaneous BDR Saving Money Virtualization Passwords Compliance BYOD Business Technology Risk Management Help Desk Wi-Fi Holiday Government Password Apps Windows 7 Document Management Mobile Device Management Health App Healthcare Training Microsoft Office Users Remote Work Automation Vendor Management Unified Threat Management Gmail Robot Analytics Laptops Employer-Employee Relationship Firewall Office Big Data Data Security Chrome Recovery Applications Bring Your Own Device Bandwidth Going Green Avoiding Downtime Redundancy Tip of the week Processor Scam Content Filtering Antivirus Project Management Blockchain SaaS Telephone Systems Regulations Infrastructure Apple Computers Data loss Vulnerability Storage Mobility Money File Sharing Computing Data storage Hosted Solution Information Information Technology Website Two-factor Authentication Wireless IT Management OneDrive Virtual Reality Politics Remote Computing Company Culture RMM Work/Life Balance Settings VPN Access Control Proactive IT Service Customer Relationship Management Gadgets Social Virtual Private Network Employee-Employer Relationship Unified Communications Machine Learning Covid-19 Downtime Tablet Meetings Hard Drive Budget Software as a Service Flexibility Router IoT Files Customer Service Printing Maintenance Operating System Outlook Co-Managed IT Net Neutrality Electronic Health Records Private Cloud Mouse IT solutions Monitoring Tech Support Upgrades Employees Twitter Google Drive Professional Services Managed Services Internet Exlporer Recycling Digital Payment Sports Display Utility Computing Consulting Websites Business Growth Identity Theft Data Storage HIPAA Time Management Networking End of Support Patch Management Cooperation Licensing Mobile Computing Mobile Security Remote Worker Data Breach Monitors Managed Services Provider Hacker Network Management Electronic Medical Records Alert Solid State Drive Remote Monitoring and Management Current Events Management Wireless Technology Legal Assessment Social Network Server Management Spam How To WiFi Dark Web Remote Workers YouTube Augmented Reality How To Samsung Uninterrupted Power Supply File Management Consultation The Internet of Things Chromebook Payment Cards Administration Bitcoin Education Smart Technology Mobile Office Word Search LiFi Chatbots Test Bluetooth Writing Emoji Cache IT Budget Windows Server Virtual Desktop Technology Tips Windows 8 Cabling Save Time Telephone Proactive IT Microsoft Excel Network Congestion Modem Star Wars PCI DSS Video Conferencing Spyware Course Multi-Factor Security Wearable Technology High-Speed Internet Distributed Denial of Service Annual Convention Computer Repair Asset Tracking Outsource IT Wireless Internet Business Telephone Shortcut Printer Alerts Conferencing Identities Comparison Identity Physical Security MSP Point of Sale Manufacturing Optimization Retail Cortana Cyberattacks Security Cameras User Management Firefox Cybercrime Transportation Mobile VoIP Heating/Cooling IT Consulting Cookies Google Wallet Biometric Google Calendar 3D Printing Development Zero-Day Threat Marketing Managed IT Service San Diego OneNote Telephony Laptop Employer/Employee Relationships IT Assessment WannaCry Processors Managing Stress Instant Messaging Sync Hard Drives Google Docs Virtual Assistant Vendor Specifications Office Tips Tech Terms Law Enforcement Humor Hard Disk Drives Virtual Machines Hacking Buisness eWaste Read Only Public Cloud Batteries Travel Backups Cyber security Servers Permissions Nanotechnology Update Botnet Drones Projects Gamification Legislation IT Technicians Unsupported Software Virus Cables Backup and Disaster Recovery Smart Devices Break Fix Social Networking Deep Learning Remote Working Proactive Maintenance Digitize SharePoint Staff Enterprise Content Management Finance Mobile Device Managment Software Tips Wasting Time Black Friday Roanoke — Central Technology Solutions Theft Gadget Solid State Drives Credit Cards Disaster Trending Unified Threat Management Hotspot Social Engineering USB Automobile Computer Care ROI Human Error Teamwork Technology Laws Fraud Screen Reader Cost Management E-Commerce Alt Codes Return on Investment Mail Merge Mirgation Mobile Data Wires Database Sensors Touchscreen Techology Motherboard Connectivity GPS Database Management Shadow IT VoIP Sponsor Downloads Vulnerabilities Authentication Cryptocurrency Cyber Monday Dark Data technology services provider Personal Information WPA3 Financial Options Holidays User Error Language Safety Enterprise Resource Planning Bookmarks Notes Lenovo Permission Crowdsourcing Hacks Shared resources Windows Server 2008 Statistics Smart Tech Features Typing Supercomputer Active Directory Address Migration Voice over Internet Protocol Disaster Resistance Data Warehousing Best Practice Tracking Peripheral GDPR Outsourcing Digital Obstacle Operations Notifications Geography Authorization G Suite History Superfish Technology Assurance Group ’s 18 Fleet Tracking Procurement Taxes 5G IT Computing Infrastructure Black Market Mobile Favorites Google Maps PowerPoint Value of Managed Services Regulation Webcam IT Consultant Hard Disk Drive Error Web Server Emergency Students CRM CrashOverride Cameras Printers Motion Sickness CCTV Administrator Relocation