Not necessarily. The best practice is not to reuse addresses. One reason is that by spending, the public key is revealed and can be attacked. Prior to spending, only the HASH160 of the public key, i.e., RIPEMD160(SHA256(pubKey)), is known, which is not vulnerable to direct quantum attack.
Ancient P2PK transactions did not have this protection and the public keys are known. Meaning they are the prime targets for exploitation, and in some sense the best way to demonstrate viable large-scale quantum computer capable of generating private key for a given public key.