Three Security Priorities You Can’t Ignore this year!
As organisations continue to adopt AI, expand their cloud estates, and support more flexible ways of working, the security landscape is becoming more complex. The challenge in 2026 isn’t just preventing attacks, it’s maintaining visibility, protecting data in new workflows, and ensuring the business can recover quickly when disruption occurs.
This month’s bulletin focuses on three areas that are increasingly critical to operational resilience: securing the use of public AI tools, moving from backup to true recovery capability, and understanding how modern identity attacks can bypass traditional protections.
How to Prevent Employees from Leaking Data Through Public AI Tools
Public AI tools such as ChatGPT and Gemini are rapidly becoming part of everyday workflows. However, anything entered into open AI platforms can be stored, processed, and in some cases used to improve future models, creating a real risk of sensitive business data being exposed.
Adopting AI securely isn’t about restricting innovation. It’s about putting the right controls in place so your people can use these tools with confidence.
Why It’s a Risk:
Lack of clear policy or visibility makes it difficult to control how AI is being used across the business.
Data leakage through prompts can lead to compliance breaches, reputational damage, and loss of intellectual property.
What You Can Do:
Establish a clear AI security policy defining approved tools and what data must never be entered into public models.
Implement DLP with AI prompt protection to detect and stop sensitive data before it leaves your environment.
Provide practical, scenario-based training so employees can use AI safely and effectively.
From Backup to Recovery: How Fast Can You Resume Operations?
Many organisations measure backup success by whether the job completes. But in a real incident, the critical question is how quickly you can restore systems, data, and services and return to normal operations.
Without a tested recovery strategy, backups alone won’t prevent costly disruption.
Why It’s a Risk:
Backups that haven’t been tested may fail when they are needed most.
Slow recovery times can lead to extended downtime and lost revenue.
Ransomware attacks increasingly target backup systems first.
What You Can Do:
Define and review your recovery time (RTO) and recovery point (RPO) objectives.
Regularly test full restores, not just individual file recovery.
Implement immutable or isolated backups to protect against ransomware.
Stolen Session Tokens: The MFA Bypass You Don’t See
Multi-factor authentication is one of the most effective ways to protect user identities. However, attackers are increasingly finding ways to bypass it, not by breaking MFA, but by stealing active session tokens after a user has successfully signed in.
These tokens allow attackers to access Microsoft 365 and other cloud services without needing a password or MFA prompt, making the activity much harder to detect.
Why It’s a Risk:
Session token theft enables attackers to bypass MFA and access cloud services as legitimate users.
Token-based attacks are difficult to detect because they don’t trigger traditional login alerts.
Compromised sessions can lead to data exfiltration, mailbox access, and internal phishing.
What You Can Do:
Enforce device compliance and Conditional Access policies to restrict session use to trusted devices.
Deploy endpoint detection and response (EDR) to identify token theft and malicious activity.
Implement continuous monitoring to detect unusual session behaviour and revoke access quickly.
Stay Operational Through Any Disruption
Ensure your organisation stays resilient in the face of disruption. Symetri’s Business Continuity & Disaster Recovery solutions help you plan ahead, protect critical systems, and recover quickly — minimising downtime and keeping your operations running.
Our services can support you with:
24/7 security monitoring and threat detection
Vulnerability management and remediation guidance
Identity, access, and cloud security posture management
Backup, recovery, and resilience services
Ongoing security assessments and optimisation
Which Bluebeam Studio Is Right for You? Cloud vs On-premise
Collaboration is the backbone of modern construction projects. Whether you’re reviewing drawings, marking up RFIs, or coordinating across multiple stakeholders, having the right platform makes all the difference. This blog reviews Bluebeam Studio (cloud-based) and Bluebeam Studio On-premise. While both enable teams to work together on PDFs in real time, the choice between them depends on your project requirements, IT policies, and security needs.
21 Tips and Tricks for Bluebeam Revu Every User Should Know
Bluebeam Revu is packed with powerful features that can dramatically improve efficiency in document review, markup, and collaboration. Whether you’re new to Revu or looking to sharpen your skills, these tips and tricks will help you unlock its full potential.
From Paper to PDF: Streamlining Construction Documents with Bluebeam Revu
In the construction industry, paperwork has always been a necessary evil. But as digital transformation sweeps across the sector, tools like Bluebeam Revu are changing the way teams handle documentation - making the shift from paper to PDF is not just convenient, but transformative.