Stay Ahead of Evolving Security Threats

Cybercriminals are always evolving, and so should your defences. This month, we shine a spotlight on three often-overlooked yet critical security concerns that could put your business at risk. From app-based phishing scams to hijacked phone numbers and forgotten employee accounts, it’s never been more important to stay informed.

Stay Ahead of Evolving Security Threats

Consent Phishing in Microsoft 365: When Apps Are the Attack Vector

Not all phishing attacks try to steal your password. In consent phishing, attackers trick users into granting a malicious third-party app access to their Microsoft 365 data. Once consent is granted, attackers can read emails, access files, and even send messages—all without needing login credentials.

Why It Matters:

Users think they’re connecting to a legitimate app.

Admins may not realise the app has excessive permissions.

It bypasses traditional credential security tools.

How to Stay Safe:

Educate users to check app permission prompts carefully.

Review and audit all connected apps in your Microsoft 365 admin portal.

Use Conditional Access policies to restrict app authorisations.

SIM Swap Scams: Hijacking Your Mobile Identity

SIM swapping is a form of identity theft where attackers trick your mobile provider into switching your number to their device. Once they control your number, they can intercept SMS-based 2FA codes and reset account credentials.

 

Real-World Impact:

Social media and email accounts can be compromised in minutes.

Banking and payment apps may be taken over.

Victims often don’t realise until it’s too late.

How to Protect Yourself:

Use app-based authentication like Microsoft Authenticator or Google Authenticator.

Monitor mobile account changes and watch for loss of signal.

Use internal security codes or keywords for financial approvals.

The Dangers of Unused Accounts and Dormant Credentials

Old accounts don’t just clutter your user directory—they pose a serious security risk. Whether it’s an ex-employee’s login still active or unused admin credentials, attackers actively look for these weak points.

Why You Should Act:

Dormant accounts often lack modern MFA protection.

They’re rarely monitored, making them easy targets.

Attackers can move laterally through your network once inside.

Best Practices:

Conduct regular user audits to identify and remove stale accounts.

Implement automated offboarding procedures.

Use identity governance tools to enforce access reviews.


TRANSITIONING TO MICROSOFT ACCESS RUNTIME FOR AUTOCAD ELECTRICAL 2026

16 June 2025

At Symetri, we understand the importance of tailored education and deliver exceptional training solutions, available both in our classrooms or through our unique Virtual Classroom. Here, we explore the many advantages of committing to a learning path with Symetri and how it can transform both personal and professional growth.

Move, Automate and Archive your construction data with Symetri Cloud Solutions

11 June 2025

The Architecture, Engineering, Construction, and Owner Operator (AECO) sectors are under growing pressure to improve collaboration, reduce project risk, and manage data more intelligently across the entire asset lifecycle. This blog looks at how Symetri and Autodesk can help you move your design and construction data to the cloud.