Close Menu
TechUpdateAlert

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why

    December 22, 2025

    You can now buy the OnePlus 15 in the US and score free earbuds if you hurry

    December 22, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455

    December 22, 2025
    Facebook X (Twitter) Instagram
    Trending
    • My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why
    • You can now buy the OnePlus 15 in the US and score free earbuds if you hurry
    • Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455
    • Android might finally stop making you tap twice for Wi-Fi
    • Today’s NYT Mini Crossword Answers for Dec. 22
    • Waymo’s robotaxis didn’t know what to do when a city’s traffic lights failed
    • Today’s NYT Wordle Hints, Answer and Help for Dec. 22 #1647
    • You Asked: OLED Sunlight, VHS on 4K TVs, and HDMI Control Issues
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechUpdateAlertTechUpdateAlert
    • Home
    • Gaming
    • Laptops
    • Mobile
    • Software
    • Reviews
    • AI & Tech
    • Gadgets
    • How-To
    TechUpdateAlert
    Home»How-To»I am a cybersecurity expert – here’s why it’s time for businesses to bolster defenses, beyond just tech
    How-To

    I am a cybersecurity expert – here’s why it’s time for businesses to bolster defenses, beyond just tech

    techupdateadminBy techupdateadminSeptember 2, 2025No Comments7 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    World Password Day 2025
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The first half of 2025 has undeniably showcased the devastating power of data breaches and ransomware attacks. High-profile brands such as Marks & Spencer, Harrods, and Qantas Airlines have all been through cyber shockwaves, with countless amounts of employee and customer information lost to hackers. This has not only eroded brand trust but also raised serious questions about the solidity of overall business security infrastructure.

    The breaches were primarily caused by social engineering attacks targeting IT help desks, which allowed attackers to gain access to systems and deploy ransomware. According to the latest insights, hackers impersonated employees to trick IT staff into granting access by requesting to reset passwords, ultimately leading to the compromise of sensitive data.

    Andy Syrewicze

    Social Links Navigation

    Security Evangelist at Hornetsecurity.

    All evidence shows hackers’ deep understanding of human psychology, enabling them to exploit social norms and complacency to bypass some of the most robust data security systems. Affected businesses have responded swiftly to attacks and offered timely support to those impacted; however, it’s clear all businesses need to improve their cybersecurity if they are to stay safe in this ever-evolving world of cyber threats.


    You may like

    While some businesses may think that investing in advanced technology will be enough to address this, it will be useless if they don’t equally invest in human elements to strengthen cyber resilience and ensure long-term data security.

    Understanding how tackling human-led vulnerabilities can build a smarter, stronger, and more adaptive cyber defense system will help businesses to transform their approach to cyber resilience.

    Elevating password security: The human element of your first line of cyber defenses

    As recent data breaches have shown, password-granted access is often the breakthrough hackers need to compromise systems. Introducing key changes to how businesses manage passwords can help in the fight against nefarious actors.

    Firstly, small changes to password policies can add an extra layer of protection, making it more difficult for hackers to gain access. As you inspect your existing policies, DON’T forget the basics! For example, personal information in passwords should be avoided as it’s easy for hackers to get user logins if names, birthdays, or other personal information is directly included in passwords.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    It seems simple, yes, but some of the largest organizations in the world have been breached because of the omission of basics like this. Once hackers gain access to the targeted systems, the risks of data breach is all but certain, raising the likelihood that confidential information will be exposed on malicious websites.

    Businesses should therefore implement clear password policies, including setting rules for password length and complexity, and make sure you’re following NIST best practices for password generation. Take scheduled password resets, NIST no longer recommends forced password changes unless there is evidence of breach. This is due to the fact that users would make highly serialized passwords in an attempt to remember them, which ultimately lowers operational security..

    The strict application of MFA

    In addition to the password hygiene rules, the strict application of multi-factor authentication (MFA) across organizations, including their external partners, is necessary to maintain cybersecurity.

    Here, PINcodes and biometric authentication that require verification via a physical device (like FIDO2) help prevent unauthorized users from accessing accounts, even when passwords have been stolen. Deploying MFA across business and personal accounts enhances protection against common security threats such as malware, phishing, and ransomware attacks.

    Warning: while MFA helps, it isn’t a catch-all safeguard. Social engineering, or the use of reverse-proxy style toolkits, allows threat actors to account for MFA during the login process. This enables the attacker to capture the target’s authentication token regardless of MFA being enabled on the account.

    Adoption of Passkeys

    To counter this, technologies like Passkeys should also be adopted by businesses to create additional safeguards against cyber attacks. Operated by using public key cryptography, Passkeys generate a public/private key pair whenever a new passkey is established with an online service.

    The authentication response is unique for each login, which means there are no passwords to be stolen on the service end of the login process. Passkeys are also typically URL-bound, rendering reverse-proxy phishing kits useless for threat actors.

    Strict practices of password hygiene and the adaptation of evolving password technologies will strengthen businesses’ data protection and bolster cybersecurity against unverified attempts to access accounts.

    While password security is important, to foster truly robust cyber resilience, more steps need to be taken across organizations in their day-to-day operations to maintain safety.

    Cultivating a culture of cyber resilience: policies, training, and overlooked vulnerabilities

    To embed cyber resilience into organizational culture, it is crucial to upgrade data security policies and ensure employees can implement them daily. These will foster a full-scale ecosystem of accountability and vigilance.

    Businesses should implement ongoing tiered cybersecurity awareness training for their employees. Successful completion of a round of tests and simulations will automatically unlock progressively more challenging ones.

    Those who don’t pass initial tests receive opportunities for further practice and re-testing at that difficulty level until they succeed. This approach fosters progressive cybersecurity training and rewards successful employees with less frequent testing.

    Additionally, regular feedback loops, surveys or user-friendly polls can ensure the current security training stays up-to-date with cybersecurity trends, covering key topics such as phishing and ransomware.

    A particular focus should also target the cyber vulnerabilities faced by organizations implementing remote and hybrid work. While implementing strategies for protecting devices and networks beyond the traditional office perimeter, such as applying MFA and role-based data access, businesses should make sure there are regular software updates and enhanced firewall configurations.

    CISOs and IT teams should enforce a Zero Trust approach, ensuring that each user has no more than the access they need and that every connection and communication, no matter how trustworthy it may seem, is vetted for authenticity.

    Building a proactive and adaptive cyber defense ecosystem

    To stay safe from attacks, businesses must consistently refine and manage their cybersecurity strategy. Strengthening data security across all accounts is essential to minimizing data breaches and safeguarding sensitive information.

    Additionally, businesses should prioritize other critical areas based on their specific risk profiles. This means a careful, case-by-case assessment of where vulnerabilities lie and where the greatest impact can be made. Focusing on the following key actions is vital:

    – Enforce strong password hygiene across the organization, and mandate the use of Multi-Factor Authentication (MFA) or Passkeys to secure the first line of defense without exception

    – Encourage progressive learning by implementing an ongoing, tiered cybersecurity testing program that adapts to roles, responsibilities, and knowledge

    – Embrace regular feedback through employee surveys and polls to keep the current cybersecurity training relevant and effective

    – Enhance remote and hybrid work settings by applying technical safeguards alongside a Zero Trust approach to limit data exposure and risk

    The path forward requires a holistic view, a commitment to continuous adaptation, and the firm understanding that the strongest defense isn’t just about tech, but the informed and vigilant human element that underpins it.

    We’ve listed the best business password managers.

    This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

    bolster Businesses cybersecurity defenses Expert Heres tech Time
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleI tested SolarWinds NPM and found it excels at traditional network monitoring
    Next Article The resilient retailer’s guide to proactive cyber defense
    techupdateadmin
    • Website

    Related Posts

    Gadgets

    My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why

    December 22, 2025
    Mobile

    How to Watch James Madison vs. Oregon: Start Time, TV Channel for CFP First Round Game Today

    December 20, 2025
    Mobile

    Oppo Pad Air5’s launch date is official, here’s what it looks like

    December 20, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    NYT Strands hints and answers for Monday, August 11 (game #526)

    August 11, 202545 Views

    These 2 Cities Are Pushing Back on Data Centers. Here’s What They’re Worried About

    September 13, 202542 Views

    Today’s NYT Connections: Sports Edition Hints, Answers for Sept. 4 #346

    September 4, 202540 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Best Fitbit fitness trackers and watches in 2025

    July 9, 20250 Views

    There are still 200+ Prime Day 2025 deals you can get

    July 9, 20250 Views

    The best earbuds we’ve tested for 2025

    July 9, 20250 Views
    Our Picks

    My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why

    December 22, 2025

    You can now buy the OnePlus 15 in the US and score free earbuds if you hurry

    December 22, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455

    December 22, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2026 techupdatealert. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.