Cracks in the System
Cybersecurity threats don’t always kick the door down—sometimes, they slip in through the cracks. This month, we’re spotlighting three subtle but serious security risks that could be undermining your defences right now.
The Dangers of Misconfigured MFA
MFA is essential, but if poorly set up—like push-only prompts—it can be bypassed. Misconfigurations leave you exposed to attacks like MFA fatigue.
Why It’s a Risk:
Misconfigured settings may allow fallback to SMS, which is more vulnerable.
Legacy systems might bypass MFA altogether.
What You Can Do:
Use number matching or device-bound authentication.
Block legacy authentication protocols.
Regularly test and audit MFA enforcement across users and devices.
Why It’s a Risk:
A rushed update might interrupt business-critical applications.
Firmware or driver updates can trigger system crashes or hardware issues.
Settings can reset, disabling important security controls.
What You Can Do:
Stagger updates across devices and monitor impact.
Test major patches in a sandbox before full rollout.
Use update policies to retain control over deployment timing.
Why It’s a Risk:
Sharing passwords or sensitive data without approval.
Using unsanctioned tools or cloud apps.
Clicking phishing links or ignoring security policies.
What You Can Do:
Monitor user behaviour for anomalies.
Provide clear policies and regular training.
Limit access to sensitive systems on a need-to-know basis.
Data Audit: The Essential 15-Point Checklist
We’ve partnered with Cortida to bring you a 15-point Data Audit Checklist — a practical guide to help AECO and Manufacturing businesses understand who owns their data, where it’s stored, and how secure and compliant their setup really is. Download it to spot gaps and strengthen your data strategy.
A National Push for Cyber Resilience
Last month, UK government ministers issued a joint letter to the CEOs and Chairs of major organisations, urging action against rising cyber threats. The letter emphasised that cyber security must be a board-level priority and outlined three immediate actions for businesses:
-
Use the Cyber Governance Code of Practice to guide decision-making and incident response planning.
-
Register for the NCSC’s Early Warning service to detect threats before they escalate.
-
Mandate Cyber Essentials across your supply chain as a minimum standard.
This reinforces Cyber Essentials not only as a technical benchmark, but as a key requirement for doing business responsibly in today’s digital economy. Read more about it here!
Recent Vulnerabilities to Be Aware Of:
- Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 - Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362
- Over 75,000 WatchGuard security devices vulnerable to critical RCE - Over 75,000 WatchGuard security devices vulnerable to critical RCE
- Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability - Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability
- ASUS warns of critical auth bypass flaw in DSL series routers - ASUS warns of critical auth bypass flaw in DSL series routers
- Critical Fortinet FortiWeb WAF Bug Exploited in the Wild - Critical Fortinet FortiWeb WAF Bug Exploited in Wild
- ClickFix Attacks Against macOS Users Evolving - ClickFix Attacks Against macOS Users Evolving - SecurityWeek
- Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection - Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection
5 Ways Chaos Is Using AI to Transform Design Visualisation
Artificial intelligence is reshaping the way Architects, Designers, and Visualisation professionals bring ideas to life. Chaos, a global leader in rendering and visualisation technology, is at the forefront of this transformation. By integrating AI into its ecosystem of tools - Veras, Enscape, V-Ray, Corona, and Vantage - Chaos is streamlining workflows, accelerating creativity, and redefining what’s possible in design visualisation. This blog explores 5 ways Chaos solutions are supporting AI technology.
What is BIM in Construction?
This blog looks at how Building Information Modelling (BIM) is transforming the way construction projects are planned, delivered, and managed.
Chaos V-Ray vs Chaos Corona: Which Renderer Fits Your Workflow?
Visualisation has changed dramatically over the past twenty five years. With so many powerful tools now available, choosing the right rendering engine has become a crucial decision for architects, designers, and visualisation specialists. Among the leading options, Chaos offers two standout solutions - Chaos V-Ray and Chaos Corona - each delivering exceptional photorealism in its own way. This blog outlines how they compare.