Rule 2 — Protect Yourself at All Times
“Protect yourself at all times.” — Frankie Dunn (Clint Eastwood), to Maggie Fitzgerald (Hilary Swank)
In Million Dollar Baby, that line isn’t about boxing gloves. It’s about survival. Discipline. Consequences. Because in the ring — and in business — one bad move can change everything.
That lesson lands hard in IT.
Too many people in this industry think their job is to be a protector or a servant. Like law enforcement (without guns or legal authority) … or a concierge with a headset saying, “My pleasure.”
That’s not a Cyberist.
A Cyberist isn’t here to save you from every click, every shortcut, every risky decision. Because you cannot protect someone from themselves on a computer.
What you can do is:
- Reduce costly risk
- Improve business results
- Prove your value with evidence, not hero stories
As Dr. Oz says:
“Everyone must take responsibility for their own actions on a computer.”
Exactly.
And that’s why Cyberists don’t chase fires. We provide control, documentation, and follow-up.
A closed case isn’t the end of the job. It’s recorded on the calendar. With attached SOPs. And followed by a next-day phone call.
That’s not “nice service.” That’s evidence.
Evidence of:
- What was done
- What was verified
- What should happen next
Firefighters get applause. Cyberists get results.
Firefighter Trap
Some in IT love the rush of showing up to “save the day.” Big energy. Big talk. Big promises.
But too often they show up:
- Unprepared
- Sloppy in appearance or language
- Unsure what they should or shouldn’t touch
- Taking responsibility for things they never should have owned
That’s not bravery. That’s liability.
And in today’s compliance, cyber-insurance, and litigation climate — liability is a business killer.
So let’s talk about what professionals actually follow.
Cyberist Rules of Engagement
Situational Awareness: Expect confusion, changing requests, and risky environments. Ask for proper safety gear, avoid personal injury, and do not accept responsibility you are not authorized to take. Never engage with proprietary or sensitive information outside the scope of the task.
Zero Trust: Assume environments are unstable or compromised. Verify backups before making changes and never touch what you cannot restore. Use standard stop points — if it’s not moving quickly, escalate to the vendor.
Accountable Follow-Up: Have the client verify resolution before closing. Document cases daily and follow up the next day to confirm stability and catch issues before they become incidents.
Professional Presence: Be on time, look prepared, speak clearly, mirror professionalism, and keep the relationship business appropriate. Expect questions about the firm and personal qualifications.
Strict Confidentiality: Do not share internal details, other clients, or sensitive information. Be ready to explain your qualifications and process — without creating new risk by oversharing.
Set Expectations: Confirm tasks, requirements, risks, and contingencies before starting. Provide SOPs for support and System Plans and Status Reports for projects.
Closing Lesson from the Ring
In Million Dollar Baby, Frankie keeps warning Maggie:
“Protect yourself at all times.”
Not because he doubts her heart — but because he understands reality.
Skill without discipline is dangerous. Good intentions without process get people hurt.
Same in IT. Same in business. Same in cybersecurity.
A Cyberist isn’t here to play hero. A Cyberist is here to deliver repeatable outcomes, documented control, and measurable improvement.
You don’t need applause. You need results that hold up under pressure.
That’s how you protect your team. That’s how you protect the firm. And that’s how you protect yourself — at all times. 🥊
👉 Take the 1-minute quiz to see if you’re taking an expensive gamble on your IT and your business. Then schedule your Cyber Risk Analysis.