Cyber Threats in 2025: What We Learned & What Comes Next

As 2025 comes to a close, we’re looking back at some of the most impactful cyber threats of the year and more importantly, what they reveal about the challenges ahead. From ransomware tactics to AI-driven phishing and risky app integrations, this round-up highlights where businesses have been most vulnerable and how you can strengthen your defences in 2026.

Cyber Threats in 2025: What We Learned & What Comes Next

Top 5 Cyber Risks of 2025 

Store backups off-network, use phishing-resistant MFA, and revisit your incident response plan.

Misconfigured MFA

Multi-Factor Authentication (MFA) remained a must—but poor setups and “MFA fatigue” left many organisations vulnerable.

Switch to number-matching or hardware-based MFA, and monitor authentication logs for suspicious behaviour.

Shadow IT & Unapproved Apps

SaaS tools, browser extensions, and file-sharing platforms were quietly adopted by users, expanding the attack surface without IT knowing.

Audit third-party app permissions and apply conditional access to restrict unsanctioned tools.

Supply Chain Vulnerabilities

Vendors lacking basic security protocols or Cyber Essentials certification introduced risk into core systems.

Require suppliers to meet baseline standards and build supply chain security into your strategy.

Inactive Accounts & Leftover Access

Old admin accounts and forgotten guest logins opened doors for attackers in multiple breaches this year.

Run regular access reviews and automate account deactivation for leavers and expired roles.

Looking Ahead: 2026 Trends to Watch

Rise of Zero Trust adoption across all sectors

Push for wider Cyber Essentials implementation

Heightened risks from AI-generated content

Continued impact of Windows 10 End of Life

Tech Tip of the Month: Start Your 2026 Security Prep Early

Use the final weeks of 2025 to get a head start:

Review and clean up user access

Audit third-party apps and browser extensions

Recheck backup strategies

Run a phishing awareness refresher for staff


Cracks in the System

25 November 2025

Cybersecurity threats don’t always kick the door down—sometimes, they slip in through the cracks. This month, we’re spotlighting three subtle but serious security risks that could be undermining your defences right now.

What is Product Lifecycle Management (PLM)?

06 November 2025

Learn what Product Lifecycle Management (PLM) is and how it helps teams manage product data, processes, and collaboration across the lifecycle. Discover the key benefits and PLM tools driving innovation.

Sovelia Vault: The Smarter Way to Manage Design Data

04 November 2025

If you are an Autodesk Vault user in the mechanical engineering and manufacturing industry, you are likely familiar with the challenges of managing design data. While Vault provides a solid foundation for storing and organising design data, it falls short in some critical areas. You might have noticed this if you ever wanted to automate workflows or configure company-specific rules and processes in Vault. Let’s dive into these challenges and possible solutions.