Security Gaps You Didn't Know You Had

As cybersecurity threats continue to evolve, some of the biggest risks to your organisation might not be obvious. In this month’s IT Bulletin, we shine a light on three critical security concerns that are often underestimated or overlooked entirely. These issues can silently compromise systems, leak data, or be exploited without detection.

Security Gaps You Didn't Know You Had

The Hidden Risks of AI Chatbot Integrations

AI tools like ChatGPT, Copilot, and various AI-enabled chatbots have become increasingly popular in business workflows. While they offer impressive efficiency gains, these tools can also introduce hidden security risks.

The Risk: Many AI chatbots operate by sending your inputs to third-party servers for processing. If employees use them to draft client communications, generate reports, or debug code, they could be unintentionally sharing confidential or proprietary data.

What to Watch Out For:

Lack of data masking or filtering when interacting with AI tools.

Use of browser-based extensions or unofficial integrations.

Over-reliance on AI to draft or process sensitive material.

Best Practices:

Implement clear AI usage policies.

Restrict access to AI tools via company-managed devices.

Educate staff on what is and isn't appropriate to input into generative AI platforms.

The Dangers of Default Configurations

When setting up new devices, apps, or systems, default settings are often left unchanged for the sake of speed and convenience. Unfortunately, those factory defaults are exactly what attackers target first.

Why It Matters: Many systems come with default admin usernames and passwords, open ports, or insecure settings that are well known across the internet. Attackers scan for these weak points constantly.

Common Risks Include:

Routers or firewalls with unchanged login credentials.

Cloud applications with open access or no restrictions.

Operating systems not hardened post-installation.

What You Can Do:

Change default usernames and passwords immediately.

Perform a configuration review when deploying any new tech.

Use benchmarks like CIS or NCSC for hardening guidelines.

MFA Fatigue Attacks – When Security Becomes the Weakness

Multi-factor authentication (MFA) is widely considered a best practice – but attackers are getting smarter. One of the newer threats, known as MFA fatigue or MFA bombing, targets users by repeatedly triggering MFA prompts to wear them down until they accidentally approve one.

How It Works: Attackers who obtain login credentials spam the user with MFA requests at odd hours or in rapid succession. Confused or annoyed, users may eventually hit "Approve" just to stop the notifications.

Signs of an MFA Fatigue Attack:

Multiple login attempts from the same location/device.

Users reporting random MFA prompts they didn’t initiate.

Approval of requests without user confirmation.

How to Protect Your Business:

Use number-matching MFA or device-based verification instead of push-only notifications.

Monitor for unusual authentication patterns.

Train staff to report unsolicited MFA prompts immediately.

Recent Security Vulnerabilities to Be Aware Of

Alongside the overlooked risks covered in this month’s bulletin, several critical vulnerabilities have been disclosed recently. If your systems rely on any of the following, we recommend reviewing your update and patching schedules immediately:

  • Apple iOS & macOS Zero-Day (Active Exploitation): Apple has released urgent patches for an actively exploited zero-day vulnerability affecting iOS and macOS. Make sure all Apple devices are updated to the latest version.
  • Surge in Microsoft RDP Authentication Server Scans: Coordinated scanning activity has been detected targeting RDP auth servers—indicating a potential rise in brute-force or exploit-based attacks. Ensure RDP is secured, monitored, or restricted where possible.
  • ‘ReVault’ Flaws Affecting Dell Laptops: Millions of Dell devices are impacted by a set of vulnerabilities tied to the system’s firmware update mechanism. These could allow privilege escalation or code execution.
  • Cisco Secure Firewall Management Centre RCE (CVSS 10): Cisco has disclosed a max-severity remote code execution vulnerability in its Secure Firewall Management Centre—immediate patching is advised.
  • WinRAR Zero-Day Exploited in the Wild: A newly discovered WinRAR zero-day is being actively exploited. All users should update to the latest version immediately.

Need Advice or Help Reviewing Your Setup?

Our IT security specialists can help assess your risks, review current configurations, and advise on safe AI tool usage.

Contact us at info@symetri.co.uk to arrange a chat with our team.


How CQi Automates CAD Deployments and Reduces Risk

05 September 2025

In modern Architecture, engineering, construction and design environments, the pressure is on IT teams to deliver fast, consistent, and secure software setups. Whether you're supporting ten users or ten thousand, manual installation methods simply can’t keep up with the demands of large-scale CAD environments. That’s where CQi (Configuration Intelligence)steps in. At Symetri, we developed CQi to help organisations automate CAD deployment, reduce risk, and maintain standardisation—all without increasing the burden on IT departments. In this blog, we’ll explore how CQi works and why it’s becoming a go-to solution for smarter CAD management.

What's New in Factory 2026

14 August 2025

The latest updates to Factory Design 2026 bring powerful improvements to connector class creation, workflow efficiency, and overall performance. From a brand-new Connector Class dialogue to enhanced 4K compatibility and stability upgrades, these changes are designed to make your design process faster, smoother, and more intuitive.