Four Steps to Strengthen Cyber Security for the Age of Artificial Intelligence
Integrating Identity Security, AI Governance, and Risk‑Based Remediation for Stronger Protection
According to a 2023 survey among global business and cyber leaders, 65% believed cyber security was the sector expected to be the most affected by generative artificial intelligence (AI).
In 2026, there is no doubt that artificial intelligence is transforming cyber security on both sides of the fence. Attackers are using it to move faster and phish smarter. Defenders are using it to detect earlier and respond sharper.
1. AI Is Supercharging Attackers, So Strengthen Your Human Firewall
Gone are the days when poor grammar and bad formatting gave phishing emails away. Generative AI now enables cyber criminals to craft messages that look and feel authentic.
The key is to prioritise people in your cyber security strategy. Use cyber security awareness training to equip your teams to recognise subtle warning signs, question any suspicious consent prompts, and always verify unexpected or unusual requests using a different communication channel.
By fostering a security-aware culture that blends human vigilance with technology, organisations can better defend against sophisticated AI-driven threats and reduce the risk of successful attacks.
Tip: Enforce phishing-resistant MFA and update awareness training that includes deepfake demos and modern phishing examples, not just “bad link” spotting.
Generative AI in Cyber Security Explained
Generative AI is changing the game. Is it helping defenders more than attackers? Dive into the risks, opportunities, and real-world impact of AI on cyber security.
Dave Mareels, Senior Director of Product Management at Sophos, joins the podcast to explore how generative AI is reshaping the cyber threat landscape.
2. AI and Human Defenders Working Together
Cyber attacks are multistage and often start with a valid login. AI isn’t just a threat, it’s part of the solution. The strongest defences combine AI with human expertise. Together, they can spot weak signals in context, investigate quickly, and contain incidents before they escalate.
Identity Threat Detection and Response is critical. Attackers increasingly target identity systems, so monitoring and responding to identity-based threats should be a priority.
Tip: Assess out-of-hours coverage and escalation paths. If you can’t investigate and respond in minutes, not hours, consider 24/7 managed detection and response for faster risk reduction.
3. If Your Data Isn’t Ready for AI, You’re Not Ready for AI
To effectively harness the benefits of AI while minimising risk, organisations must take a structured approach to AI governance. This starts with curbing the use of Shadow AI, which is unapproved applications or tools that staff may adopt without IT oversight, as these can introduce significant security and compliance concerns.
Organisations should formalise the use of Sanctioned AI by clearly defining approved tools and implementing robust controls to ensure safe, compliant deployment.
The end goal should be to progress towards Adopted AI , where artificial intelligence is fully integrated into business processes, thoroughly auditable, and aligned with organisational objectives.
Most importantly, sensitive data must be classified accurately and steps taken to prevent oversharing. By doing so, organisations can reduce the risk of AI-powered assistants inadvertently exposing confidential information to unauthorised individuals, strengthening both security and trust within the workplace.
Tip: Conduct a free data assessment to ensure your organisation knows what data exists, where it lives, who has access, and how it’s classified. This single step reduces the risk of sensitive information leaking into AI models, prevents inadvertent oversharing, and establishes a strong foundation for safe, compliant AI adoption. Think of it as switching on the lights before inviting AI into the room.
AI’s Role in Data Protection Explained
In this episode, Stuart Wilson from Forcepoint explores the risks, rewards and rising challenges of AI in data protection, from shadow AI to safeguarding sensitive data, while helping businesses navigate secure innovation in an AI‑driven world.
4. Responsive Remediation is Key
Identifying vulnerabilities is only the start; the real challenge is fixing them swiftly. While prompt patching is essential, not all issues can be resolved immediately. This means that mitigating controls, such as tightening permissions or disabling unused services, are vital.
Virtual patching can protect where permanent fixes are unavailable. The next step is AI-driven remediation, which automates prioritisation and coordinates fixes based on business risk, enabling faster, more consistent vulnerability closure and freeing teams to focus on strategic security.
This shifts organisations from reactive to intelligent, risk-based remediation, reducing attacker opportunities and strengthening resilience.
Tip: Rank vulnerabilities by business impact, exploit likelihood, and data sensitivity, then move fast on the top tier. Where patches aren’t immediately available, apply mitigating controls and virtual patching to reduce exposure.
Final Thoughts: Getting Ahead of AI Threats
AI is changing the game, and the steps outlined above make it clear that success comes from strengthening your people, enhancing detection and response with AI, putting firm governance around data and tools, and moving toward smarter, risk‑based remediation.
When these elements work together, organisations build real resilience and stay ahead of fast‑moving threats. The most effective way to continue that journey is to understand your current level of risk
HackRisk reports give you a clear, practical view of your exposure so you can prioritise what matters most and take action with confidence.
Get Your Free HackRisk Report
AI-powered cyber risk monitoring with secure dashboard and shareable reports, delivered by security experts.
We’ll perform a full external scan and generate your first HackRisk Report, completely free of charge.
You will receive your HackRisk report within 24 hours. No card details necessary.
Weak Passwords & Password Policies: Strengthening Access Security
A Growing Concern
In 2025, you might expect the threats posed by AI and increasingly sophisticated phishing attack methods would be the biggest cyber security risks. However, it’s often the basics that are overlooked and leaving organisations exposed.
In this blog, we explore how weak passwords and inadequate password policies continue to be a significant security risk for organisations and consumers.
Major Breaches Expose Weak Password Policies
The Open Worldwide Application Security Project (OWASP) Foundation claims that “In each of the recent high-profile hacks that have revealed user credentials, it is lamented that most common passwords are still: 123456, password and qwerty.” (source: The OWASP Foundation)
Recent events in the UK have further highlighted the pressing issue of weak password policies and the need to implement and adhere to robust internal processes and governance that mitigate the risk of credentials being compromised.
A recent, massive data breach exposed 184 million logins for companies like Apple and Google. The compromised dataset, discovered in an unprotected online database, included usernames and passwords for various online services and email providers. Cyber security researcher Jeremiah Fowler believes that infostealer malware, often deployed in phishing emails and malicious websites, was used to obtain and compile the compromised dataset. (source: WIRED)
Retail Hacks in the News: Weak Password Reset Process and Social Engineering
In our recent blog post, we explored the recent incidents involving household names Marks & Spencer (M&S), Co-op and Harrods. It is believed that attackers used a combination of social engineering, impersonating employees and manipulating the IT helpdesk into resetting user account passwords. This allowed threat actors to bypass standard authentication procedures and gain unauthorised access to sensitive information, including customer account details, payment information, delivery details and login credentials.
Many of the compromised credentials had also been reused across multiple platforms, deepening the impact of the breaches. Investigations revealed that both incidents originated from lapses in password complexity requirements and inadequate monitoring for previously compromised credentials. These events underscore how the combination of human manipulation and weak password hygiene leaves organisations, regardless of size or reputation, vulnerable to attack. (source: rradar)
At the recent Manchester Digital E-Commerce Conference, we conducted a live hack on a demo online store to show how quickly a compromise similar to the incidents involving M&S and Co-op can occur.
Weak Passwords Remain a Leading Security Challenge for Web Applications
While most professionals are well-versed in the mechanics of phishing, recent industry reporting underscores how weak passwords continue to amplify the impact of increasingly sophisticated and AI-powered phishing campaigns. According to a report by Verizon (2024 Data Breach Investigations Report), in 2020 over 60% of breaches in web applications were successful due to compromised or easily guessed passwords. In 2024 the report indicates that this percentage was closer to 40%, so while there has been a reduction the level of vulnerability remains high. (source: Verizon)
This downward trend suggests that some web application providers are responding to the threat by strengthening authentication requirements. However, the enduring presence of weak credentials among known vulnerabilities highlights the ongoing challenge facing developers and security teams. Notably, applications that permit simplistic, easily guessed, or previously compromised passwords consistently attract the attention of attackers, especially when paired with emerging phishing techniques.
Sophisticated phishing attacks, now frequently using AI-driven tools that customise messages for individual targets, are particularly effective when organisations lack robust password requirements or sufficient Authentication methods. As highlighted by Microsoft’s Digital Defence Report, AI-generated phishing emails have become such a prevalent threat that Microsoft has reassigned 34,000 engineers to security initiatives, including developing phishing-resistant MFA and strengthening defences against AI-driven threats.
The combination of advanced phishing and weak authentication remains a primary driver of large-scale cyber incidents across sectors, making the case for stronger password policies and ongoing credential monitoring.
Risks Associated with Weak Password Policies
Weak password policies not only increase organisational vulnerability to phishing and the sale of sensitive data on the dark web but also pose significant risks when they allow users to reuse old or previously compromised passwords. Allowing the continued use of credentials exposed in past breaches—such as those affecting major companies highlighted above—dramatically raises the likelihood of unauthorised access. Without robust policies in place that prevent password reuse, simple password structures or flag known breached passwords, organisations leave a door wide open for attackers to exploit. According to ID Agent organisations with compromised credentials, including passwords that are reused across different platforms, increase their likelihood of experiencing a cyber incident by 2.56x.
Alarming Statistics and the Danger of Reused Passwords Found on the Dark Web
Recent cyber security analyses continue to reveal the magnitude of compromised credentials on the dark web. According to recent findings from leading VPN provider Surfshark, over 3.2 million British user accounts have been compromised in data breaches during the first half of 2025, this equated to approximately 7 British accounts being compromised every minute in Q2 of this year. (source: Tech Digest)
Globally, the pool of compromised accounts on the dark web seems almost infinitely greater. In 2022 Digital Shadows reported that more than 24.6 billion records—primarily emails and passwords—were available on underground forums and cybercriminal marketplaces. (source: Dark Reading)
According to Market.us Scoop, stolen data, including compromised account credentials, are used by 65% of active cyber criminals globally, highlighting the danger that weak or compromised passwords pose by being instrumental in other cyber attacks.
Alarmingly, NordPass found that the most common passwords in these dumps—like “123456” and “password”—made up over 85% of all breached credentials, underscoring the critical risk of password reuse for users and organisations alike. (source: NordPass)
The consequences are severe: reused passwords allow attackers to exploit one breach to access multiple accounts, fuelling cyber attacks such as credential stuffing and a cascade of other threat vectors. As cyber criminals leverage advanced phishing tactics and the anonymity of the dark web, the persistence of weak and repeated passwords remains a significant problem in today’s digital landscape.
Best Practices for Reducing Risk from Weak Password Policies
Implementing comprehensive password security measures is essential for reducing organisational exposure to cyber threats. The following best practices can help mitigate the risks associated with weak password policies:
- Enforce Strong Password Requirements: Mandate the use of complex passwords that combine uppercase and lowercase letters, numbers, and special characters. Prohibit commonly used or compromised passwords and require a minimum password length.
- Implement Multi-Factor Authentication (MFA): Require MFA or two-factor authentication (2FA) for all users, especially for accessing sensitive systems, to provide a crucial layer of security beyond the password.
- Set Regular Password Change Intervals: Establish policies that require users to reset passwords at regular intervals and prevent the reuse of previous passwords, reducing the window of opportunity for attackers.
- Utilise Password Managers: Encourage or provide access to reputable password managers to help users create, store, and use strong, unique passwords across all accounts, minimising the temptation to reuse or simplify credentials.
- Continuous Dark Web Monitoring: Employ tools or services such as HackRisk to monitor for compromised credentials on the dark web, allowing for swift response if employee or organisational data is found in breach dumps.
- Comprehensive Staff Training: Deliver regular cyber security awareness training for all employees, with a focus on recognising phishing attempts, the importance of password hygiene, and how to respond to suspicious activity.
- Ongoing Policy Review and Enforcement: Routinely review and update password and authentication policies to adapt to emerging threats and ensure enforcement with automated checks wherever possible.
The Final Word: Enhancing Security Through Effective Password Management
The risks associated with weak password policies are substantial, and organisations must take proactive measures to mitigate these threats.
Implementing robust password policies, educating employees about phishing attacks, and continuously monitoring the dark web for compromised data are essential steps in safeguarding sensitive information.
Find Your Data on the Dark Web
Data breaches happen every day, at companies large and small, with stolen credentials commanding a premium on the Dark Web.
With over 24 billion sets of usernames and passwords currently for sale on the dark web, it has never been more important to keep control of your credentials.
Our advanced scanning software crawls the dark web for your compromised business credentials.
Where it finds stolen data, we identify the source of the breach, alert you instantly, and provide advice on how to keep your accounts secure.
You may be surprised how much of your information is already out there.
Free Posture Assessment
Understand your security risks and how to fix them.
Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.
Claim your free 30-minute guided posture assessment with a CyberLab expert.
How Secure Is Microsoft Copilot? Understanding The Risks of AI Tools
Understanding the Risks and Solutions of AI-Assisted Tools
The emergence of AI-powered tools like Copilot is reshaping the way businesses tackle productivity and innovation.
Of course, with any game-changing technology, there’s a flip side, and the introduction of mainstream generative-AI brings along some cyber security challenges. So, how can businesses prepare to take full advantage of Copilot while staying safe? It’s all about striking the perfect balance between embracing innovation and addressing risks head-on.
Adopting Copilot Securely Explained
James Mallalieu from Chess explores how organisations can roll out Microsoft Copilot securely and successfully.
The Cyber Security Challenges of AI Tools
AI assistants like Copilot are powerful tools, but their capabilities introduce vulnerabilities that organisations must address. Listed below are some of the cyber security risks associated with their use:
Data Privacy Concerns
To operate at full functionality, AI requires access to sensitive information, such as emails, documents, and code repositories, raising privacy risks if data is mishandled or exploited. In a recent survey, a staggering 77% of business that have deployed AI models have already experienced AI-related breaches.
External Threats and Data Leaks
Without secure implementation, attackers could exploit AI systems, leading to information misuse, manipulation, or data leaks.
Several incidents have highlighted these risks, particularly since the public release of AI models like ChatGPT, showcasing the need for better data management and security practices.
One such example, is how Slack’s AI service was vulnerable. Slack’s AI provides generative features within the application, such as summarising lengthy conversations, answering questions, and summarising channels that are infrequently accessed. Researchers have demonstrated that Slack’s AI contained vulnerabilities which may permit data from private channels to be exposed via prompt injection.
Bias and Misinformation
AI tools may produce flawed outputs due to biased or inaccurate training data.
Soon after the launch of its Bard AI, Google faced credibility challenges when the chatbot delivered inaccurate information during a demonstration concerning the James Webb Space Telescope. This error resulted in a significant decline in Alphabet’s stock price, erasing $100 billion from the company’s market value.
Shadow AI Usage
Employees might use unregulated AI tools when official access is restricted, increasing the risk of data exposure to less secure third-party platforms. Reports indicate that 61% of organisations are already dealing with Shadow AI usage.
Why Businesses Must Securely Integrate Copilot
While banning AI tools might seem like an easy way to avoid risks, it’s a short-sighted strategy that could backfire. Employees are increasingly tech-savvy and may seek out unregulated AI solutions if they feel restricted. These tools often lack enterprise-grade security features, potentially exposing sensitive data to external platforms and creating compliance risks.
A high-profile example of these risks became apparent when Samsung employees turned to ChatGPT to streamline their work. To boost productivity, they pasted confidential source code for an unreleased program into the AI tool and also uploaded sensitive meeting notes to generate a presentation. This action resulted in the exposure of private corporate information to external servers. Which is a clear and serious breach of data security policies.
By implementing Copilot securely, businesses gain control over its usage, ensuring employees have access to a trusted and robust tool while minimising vulnerabilities. A controlled integration allows organisations to reap the benefits of AI-assisted workflows without sacrificing security and also, importantly, without releasing confidential information outside of the organisation.
How to Reduce AI Risks
Preparing for Copilot’s integration requires proactive measures to mitigate the risks outlined above. Here are some strategies businesses should adopt:
Promote Controlled Alternatives to Shadow AI
Rather than banning AI tools outright, which can lead to stealth use, provide employees with secure organisation-approved AI. For example, implementing Copilot in a controlled manner allows businesses to monitor its usage while providing employees with a productive tool they trust. This approach reduces the likelihood of shadow AI usage, which poses significant risks when external, unapproved systems are used.
Secure Implementation Protocols
The first step is to implement Copilot within a secure framework. Ensure that the AI tool operates within controlled environments, such as on-premises servers or trusted cloud platforms with robust security measures. Encryption protocols must be enforced for all data transmissions, and access controls should be strictly managed.
Educating employees about the risks and safe usage of AI tools is crucial. Provide training sessions on how Copilot processes data, its capabilities, and the boundaries of its use. Employees should understand that while Copilot is a powerful assistant, it requires careful handling to ensure security.
Data Controls and Classification
A critical aspect of deploying AI tools like Copilot securely is the proper classification and labelling of organisational data. Sensitive information, such as salary details, intellectual property, or customer data, must be explicitly marked as highly confidential. This ensures that the AI system is configured to respect these classifications and prevents unauthorised access to restricted data.
For example, organisations should ensure that salary information is labelled and stored in a way that restricts AI access. Without such safeguards, an employee could inadvertently or maliciously query the AI for another person’s salary and receive a response, leading to breaches of confidentiality and trust.
To mitigate these risks, businesses should:
• Establish robust data labelling protocols to categorise data based on sensitivity.
• Configure AI tools to operate within predefined access boundaries, ensuring they cannot retrieve or process highly confidential data unless explicitly authorised.
• Regularly audit and update data classifications to reflect changes in organisational priorities or regulations.
By implementing strict data controls, organisations can create a secure AI environment where employees can make full use of the tool’s capabilities without compromising sensitive information.
Conclusion: Securely Integrating AI Tools like Copilot
AI assistants like Copilot represent a significant leap forward in how businesses operate, but their capabilities come with cyber security challenges that must be addressed. From data privacy concerns to shadow AI usage, a secure and thoughtful approach to Copilot’s implementation is essential.
Rather than banning AI tools, businesses should focus on controlled integration, providing employees with a secure and regulated alternative to external solutions. Through comprehensive training, monitoring systems, and ethical AI policies, organisations can maximise the benefits of Copilot while ensuring robust cyber security protections.
The future of business lies in adopting innovative tools securely. By preparing for Copilot with a security-first mindset, organisations can lead the way in efficiency, creativity, and trust.
Free Posture Assessment
Understand your security risks and how to fix them.
Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.
Claim your free 30-minute guided posture assessment with a CyberLab expert.
How to Protect Against Phishing Attacks with Smarter Email Security
Anti-Phishing Measures To Stay Secure
Phishing remains one of the most common entry points for cyber attacks.
CyberLab outlines what phishing is, why it matters, how to enable people to recognise and avoid it, and how organisations can gain confidence that defences are working.
What is Phishing and Why Does it Matter?
Phishing is a form of social engineering where an attacker sends a deceptive message that appears to come from a trusted source. The goal is to trick the recipient into taking an action, for example entering credentials, opening a malicious attachment, approving a fraudulent payment, or installing malware that leads to ransomware or data theft.
Phishing is serious for three reasons:
- It targets people, not just systems. Even well secured environments can be compromised if a user is manipulated into granting access.
- It often starts bigger incidents. Many breaches begin with a single click that leads to credential theft, lateral movement and impact on critical services.
- It keeps evolving. Messages are increasingly polished, personalised and timed to match real business processes, which reduces the likelihood that staff will recognise them on sight.
How to Enable People to Spot & Avoid Phishing
Technology is necessary, but it is not sufficient on its own. Building capability in people requires an ongoing programme that is practical, engaging and measurable.
Design training for how adults learn
- Short, focused modules. Ten to fifteen minute sessions, delivered regularly, improve retention without disrupting the day.
- Varied formats. Video, interactive scenarios, quick reads and micro‑quizzes cater for different learning styles.
- Role‑specific examples. Finance teams, customer service and executives face different lures and require tailored scenarios.
- Just‑in‑time nudges. Brief reminders at the point of risk, for example before seasonal peaks or system changes, reinforce good judgement.
Make simulations realistic and continuous
- Diverse templates. Use a wide variety of lures and brands so knowledge cannot spread as “avoid that specific email”.
- Adaptive scheduling. Send simulations at different times and frequencies so vigilance becomes a habit, not a one‑off event.
- Teachable moments. If a user interacts with a simulation, show a friendly landing page that explains the red flags they missed and how to spot them next time.
Encourage reporting, not silence
- One‑click reporting. Provide a report phishing button in email clients and make sure it is monitored.
- Positive tone. Thank staff for reporting, even if the message turns out to be benign. Avoid blame, focus on learning.
- Clear playbooks. Ensure staff know what to do if they have clicked. Quick reporting enables faster containment.
How Organisations Gain Confidence in User Readiness
Occasional simulations and a long video once a year do not provide assurance. A stronger approach combines training, testing and metrics.
- Run continuous, varied simulations. Measure click rates, data submission, and reporting rates. Aim to improve all three.
- Segment results. Understand performance by team, location and role. Target support where it is most needed.
- Close the loop. Provide immediate feedback to participants, offer quick refreshers to those who need them, and celebrate improvement publicly.
- Test processes, not just people. Validate that reported emails reach the right team, that triage is timely, and that containment actions are triggered.
Beware common pitfalls: over‑reliance on a single template, predictable schedules that are easy to game, or punitive responses that discourage reporting.
Recommendations and Guidance
A layered programme combines people, process and technology.
People and process
- Establish a security awareness plan with quarterly themes, micro‑modules and ongoing simulations.
- Define a clear policy for reporting suspected phishing and responding to mistakes without blame.
- Run tabletop exercises that include finance approvals, supplier changes and executive impersonation scenarios.
- Provide onboarding and refresher pathways so new joiners and high‑risk roles receive timely guidance.
Technical controls
- Email security gateway with attachment sandboxing, URL rewriting and impersonation detection.
- Authentication hardening with multi‑factor authentication, conditional access and device posture checks.
- Domain protections using SPF, DKIM and DMARC with alignment and reject policies.
- Browser and DNS filtering to block known malicious destinations and risky categories.
- Endpoint protection with behaviour‑based detection and rollback for ransomware scenarios.
- Least privilege and separation of duties for sensitive actions, for example payment approvals and credential resets.
- Automation and orchestration so that reported messages are auto analysed and similar emails are removed from other mailboxes.
What good looks like
- Training completion above a defined threshold, improved assessment scores over time, and increased voluntary reporting.
- Declining click‑through and data submission rates on simulations, with faster reporting of real threats.
- Documented response playbooks, measured mean time to triage and containment, and regular post‑incident reviews.
Phishing Simulation from CyberLab Control
Did you know that the first stage of over 90% of cyber attacks was a phishing email?¹ Crude yet effective, and they’re on the rise.
Despite this, fewer than one-in-five businesses report testing their employees with phishing simulations².
CyberLab Control empowers your people to identify and report phishing attacks within an environment you control, helping them to become your first line of defence rather than your weakest link.

Putting it into Practice
- Baseline. Assess current awareness, reporting routes and technical controls. Identify high‑risk processes such as payment changes and document signing.
- Launch. Roll out short training modules and enable a report phishing button. Start with a varied simulation set.
- Measure. Track engagement, click and report rates, and process timings. Share results with leaders and teams.
- Improve. Target coaching for repeat clickers, refresh scenarios to match emerging lures, and tune technical controls based on findings.
- Sustain. Keep cadence steady, integrate lessons from real incidents, and align with wider risk and compliance activities.
Talk to CyberLab
CyberLab helps organisations build practical, people‑centred defences against phishing.
The team designs training and simulation programmes, implements robust reporting and response processes, and tunes technical controls such as email security and identity protection.
To explore how to strengthen resilience against phishing and social engineering, the team is available for an initial consultation.
How To Recover From a Cyber Attack: Steps to Bounce Back Stronger
Building a Resilient Recovery Strategy for 2025 and Beyond
Gavin Wood, CyberLab CEO, summarises how to recover from a cyber attack and advises how to create your disaster recovery plan.
He covers:
- Introduction to Cyber Disaster Recovery
- Creating your Disaster Recovery Plan
- Regular Testing
Creating an Effective Disaster Recovery Plan
A robust DR plan should include:
- Infrastructure Visibility: Know your estate – if you can’t see it, you can’t recover it.
- Impact Assessment: Evaluate the business impact of losing access to each system.
- Prioritisation: Identify mission-critical systems and define Recovery Time Objectives (RTOs).
- Technology Selection: Choose appropriate DR technologies, from real-time replication to secure offsite backups.
- Policy & Governance: Document procedures, assign roles, and ensure accessibility of the plan- even during a crisis.
Regular Testing: The Key to Confidence
Testing is the only way to validate a DR plan. Organisations must go beyond checking backup logs – full restoration drills are essential. Early failures during testing are expected and valuable, helping refine procedures and improve resilience.
As highlighted by the Gloucester Council incident, where systems remained offline for nearly ten months, the cost of inadequate recovery planning can be severe – impacting reputation, revenue, and public trust.
Rapid Recovery Is Now a Strategic Differentiator
Speed is critical. In 2025, businesses that recover quickly from cyber incidents will retain customers and avoid regulatory penalties. Modern DR strategies must integrate cyber resilience, including:
- Immutable backups
- Automated failover systems
- Real-time monitoring
- Isolated recovery environments for forensic analysis
Tales from the CyberLab: Ransomware Response Explained
Free Posture Assessment
Understand your security risks and how to fix them.
Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.
Claim your free 30-minute guided posture assessment with a CyberLab expert.
What is Malware and How to Protect Against It with Smart Security
Everything You Need To Know About Malware
Malware is one of the most persistent threats to modern businesses. CyberLab outlines what malware is, how the threat has evolved, and five practical steps any organisation can take to reduce risk and strengthen defences.
What is Malware?
Malware (short for “malicious software”) is an umbrella term for software designed to infiltrate systems, disrupt operations, or steal data. Categories often overlap, but common types include:
- Viruses
Malicious code that attaches to legitimate files and can corrupt, modify, or delete data. - Worms
Self‑propagating software that spreads across connected devices and networks without user action. - Trojans
Malware that masquerades as legitimate software, often creating a “backdoor” that allows further compromise. - Adware
Software that displays intrusive adverts; beyond nuisance, it can weaken security and lead to additional malware. - Spyware
Software that covertly captures sensitive information such as credentials, payment data, and browsing activity. - Rootkits
Tools that provide stealthy, privileged access so an attacker can operate like an administrator without detection.
The Modern Malware Threat
Historically, threats tended to sit neatly within one category. Today, adversaries combine techniques to maximise impact. A single campaign might hide like a trojan, spread like a worm, disrupt systems like a virus, and quietly harvest credentials.
Motivations have also shifted. Where older malware often aimed to cause nuisance, modern operators are financially driven. Ransomware remains one of the most common and disruptive threats: attackers encrypt business data and demand payment for decryption. Increasingly, groups use double‑extortion tactics, exfiltrating sensitive data before encryption, then threatening to leak it to increase pressure on victims.
The implications are clear. Organisations need layered controls that can prevent, detect, and respond to sophisticated, multi‑stage attacks, and they need the governance and processes to recover quickly.
Five Steps to Protect Against Malware
1) Use modern endpoint protection
Traditional antivirus relies on signatures of known threats. Given the pace of change, that is no longer sufficient by itself. Organisations should adopt behaviour‑based protection such as Endpoint Detection and Response (EDR) or Next‑Gen AV, which use analytics and machine learning to detect suspicious activity, block unknown malware, and provide investigation and response capabilities. Consider managed detection to extend coverage outside business hours.
What good looks like:
- Behaviour‑based detection, not only signatures
- Ransomware rollback or containment features
- Centralised policy, alerting and response across all endpoints
2) Manage devices and privileges
Limit administrative rights and separate admin accounts from day‑to‑day user accounts. Apply least privilege and strong authentication to reduce the blast radius if an account is compromised. For mobiles and laptops, use device management to enforce security baselines, control app installation, and protect corporate data.
What good looks like:
- Role‑based access, separate admin credentials, multi‑factor authentication
- Mobile and endpoint management (for example, Microsoft Intune) to enforce policies
- Only approved app stores such as Google Play and the Apple App Store
3) Keep software up to date
Attackers routinely exploit known vulnerabilities. Maintain an accurate asset inventory, apply security updates promptly, and remove software that is end‑of‑life or unsupported. Regular vulnerability assessments help identify gaps and track remediation progress.
What good looks like:
- Standard patching cadence with clear service‑level objectives
- Prioritisation for internet‑facing and business‑critical systems
- Continuous scanning and reporting to verify closure of issues
4) Control USB and other removable media
Removable media can introduce malware into otherwise controlled environments. Reduce risk by blocking ports where not required, restricting device types, and scanning any permitted media. Provide secure alternatives for file transfer so staff do not need ad‑hoc USB sticks.
What good looks like:
- Default block on removable storage, allow by exception with approval
- Device control and data loss prevention to monitor usage
- Approved, secure file‑sharing solutions and clear guidance for staff
5) Use firewalls and network controls
Firewalls act as a first line of defence between internal networks and the internet. Apply default deny where practical, restrict inbound and outbound traffic, and enable features such as intrusion prevention and web filtering. Use host firewalls on endpoints and segment internal networks to limit lateral movement.
What good looks like:
- Properly configured perimeter and host‑based firewalls
- Application‑aware controls, DNS and web filtering
- Segmentation of critical services and monitoring of east‑west traffic
Bringing it Together
No single control stops every threat. A layered approach that combines prevention, detection, response, and recovery is essential. Training and clear processes matter as much as technology. When organisations align controls to their risk profile and keep them well managed, they significantly reduce the likelihood and impact of malware incidents.
Talk to CyberLab
CyberLab helps organisations assess their exposure, strengthen controls, and get more value from existing tools. To discuss how to improve protection against malware and wider cyber threats, the team is available to help shape a pragmatic plan that fits the environment, budget, and risk appetite.
Free Posture Assessment
Understand your security risks and how to fix them.
Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.
Claim your free 30-minute guided posture assessment with a CyberLab expert.
What is Social Engineering and How Can You Prevent It? Essential Tips
Everything You Need To Know
When people think of insider threats, they often picture a disgruntled employee misusing legitimate access. In reality, one of the most dangerous risks comes from well‑intentioned employees being manipulated by attackers. This is the essence of social engineering.
What is Social Engineering?
Social engineering is a tactic where attackers exploit human behaviour rather than technical flaws. Instead of breaking through firewalls, they trick individuals into giving away information, credentials or access. These attacks rely on trust, curiosity or a desire to help.
Unlike malicious insiders, social engineering attacks are usually launched by external actors who manipulate employees into actions that compromise security – such as clicking a malicious link or sharing sensitive data.
Common Types of Social Engineering Attacks
Phishing
The most widespread form of social engineering. Attackers send emails, messages or create fake websites that mimic trusted organisations (banks, government agencies, major brands). Victims are lured into entering credentials or downloading malware.
Baiting
Offering something enticing – like free music downloads or branded USB drives – in exchange for action. Once the bait is taken, malware is installed or data is harvested.
Quid Pro Quo
An attacker offers a service in return for information. For example, posing as IT support and offering “free troubleshooting” in exchange for login details.
Pretexting
Building a false sense of trust by impersonating someone in authority (e.g., HR, IT, auditors). The attacker fabricates a scenario to justify requests for sensitive data or access.
Piggybacking (Tailgating)
Physical intrusion by following an authorised person into a restricted area or borrowing a device under false pretences. For example, asking someone to hold a door open because they “forgot their badge”.
Why Social Engineering Works
- Human nature: People want to be helpful and avoid conflict.
- Authority and urgency: Attackers often create pressure to act quickly.
- Familiarity bias: Impersonating colleagues or trusted brands lowers suspicion.
How to Protect Against Social Engineering
1. Be cautious with emails and attachments
If you don’t recognise the sender, don’t engage. Even if you do, verify suspicious requests through a separate channel (e.g., call the person directly). Remember: email addresses can be spoofed.
2. Use layered security
Deploy professional spam filters and enable multi‑factor authentication (MFA). MFA adds a critical layer of defence if credentials are compromised.
3. Think before you click
If an offer seems too good to be true, it probably is. A quick online search can confirm whether it’s legitimate or a scam.
4. Secure your devices
Maintain a standard build, keep antivirus and firewalls active, and apply patches promptly. Outdated systems are easy targets.
5. Educate and test regularly
Run security awareness training and simulated phishing exercises. People are the first line of defence – make sure they know how to spot and report suspicious activity.
Key Takeaway
Technology alone cannot stop social engineering. The most effective defence combines awareness, process and technology.
By training staff, enforcing strong access controls and maintaining layered security, organisations can significantly reduce the risk of a successful attack.
Free Posture Assessment
Understand your security risks and how to fix them.
Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.
Claim your free 30-minute guided posture assessment with a CyberLab expert.
CyberLab Deliver an Attack Simulation In Front Of Cyber Crime Police
The CyberLab Team Delivered an Attack Simulation in Front of Over 30 Eastern Region Special Operations Unit (ERSOU) Officers
CyberLab’s penetration testing team of CREST, CHECK, and Cyber Scheme accredited engineers and Wayne Price, Commercial Director, delivered a live hack demonstration in front of ERSOU officers.
Over 30 attendees, a mix of Cyber Protect officers providing signposting and advice to individuals and organisations within the region and Cyber Pursue officers investigating cyber crime, joined the event to see how malicious agents can break into an organisation’s network in less than 5 minutes.
The CyberLab Penetration Testing Engineer, Alexandru Blanaru, showcased how an attacker can exploit multiple attack vectors to penetrate a network, escalate access, and breach valuable data. Together Wayne Price and Alex Blanaru covered the best cyber security practices organisations can adopt to protect their data.
“It is always great to collaborate with industry to ensure that, through shared learning, we remain at the forefront of protecting the region from cyber threats.
“The input from CyberLab helped our officers and investigators develop their skills around the complexities of different attack methodologies, and how they could be used by criminals.
“This, in turn, allowed further discussion about preventative measures, both technical and behavioural, to better inform our advice to the public.”
– John Greenwood, Cyber Protect Co-ordinator at ERSOU
Created in 2010, ERSOU operates across the seven police forces that make up the Eastern Region – Bedfordshire, Cambridgeshire, Essex, Hertfordshire, Kent, Norfolk and Suffolk.
It is made up of a Regional Organised Crime Unit (ROCU) and a Counter Terrorism Policing unit, which respectively manage the threat of serious and organised crime and terrorism across the region.
Working closely with local forces, external stakeholders and partners such as the NCA, the ROCU tackles and disrupts organised criminality such as drugs and firearms importation, cyber attacks, large-scale fraud, and much more.
“It was an honour to be invited to present in front of the Eastern Region Special Operations Unit, deliver the attack simulation and discuss the latest trends our team of engineers discover during their work in the field.
The cyber team at ERSOU are doing an amazing job operating in an incredibly complex and ever-evolving field and Dark Web”
– Wayne Price, Commercial Director at CyberLab
What is Penetration Testing?
Penetration Testing is a way to identify vulnerabilities before attackers do, evaluate how effectively companies can respond to security threats, assess compliance with security policies, and improve the level of security awareness among staff.
Using industry-standard methodologies, 15 of the UK’s top Penetration Test experts, our team of CREST, CHECK, and Cyber Scheme approved engineers undertake ethical attack simulations to uncover areas of concern in infrastructure, policies, and procedures.
The CyberLab team delivers attack simulations and educational sessions as part of customer and public engagements, as well as at events and industry conferences.
About CyberLab
CyberLab is a specialist cyber security company that provides a wide range of security solutions and services.
Your one-stop cyber security advisor, the CyberLab team is equipped with the right technology, knowledge, and expertise to help businesses of all sizes, including large public sector organisations.
By leveraging world-class technology, decades of experience, and their extensive vendor partnerships, CyberLab have helped to secure thousands of organisations across the UK.
Our unique Detect, Protect, Support approach makes us the perfect partner to review and reinforce your cyber security defences.
To contact the CyberLab Team, email [email protected].
About Eastern Region Special Operations Unit (ERSOU)
ERSOU’s ROCU leads the response to organised crime across the region.
Working closely with local forces, external stakeholders and partners such as the NCA, the ROCU tackles and disrupts organised criminality such as drugs and firearms importation, cyber attacks, large-scale fraud, and much more.
The team’s work has also been showcased several times on Channel 4’s 24 Hours in Police Custody.
To contact the ERSOU press office, email ERSOU Corporate Communications: [email protected].
Free Posture Assessment
Understand your security risks and how to fix them.
Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.
Claim your free 30-minute guided posture assessment with a CyberLab expert.
Strategies to Strengthen Your Cyber Resilience for Hybrid Working
Key Considerations in a World of Hybrid Work
A recent survey by Forbes found that 63% of respondents worked remotely or in a hybrid model, showcasing that even years after the COVID 19 pandemic, hybrid working remains the norm. The importance of securing employees and the systems they access, whether they are working in the office or remotely, cannot be understated.
In this blog, we discuss distributed nature of hybrid working, the risks and cyber threats that hybrid working organisations are exposed to, alongside some recommendations and best practices that organisations can implement for securing hybrid and remote working environments.
Remote and Hybrid Working in the UK: Before and After the Pandemic
According to a report by the Wales Institute of Social and Economic Research and Data (WISERD) just 4.7% of UK employees worked from home in 2019, prior to the COVID-19 pandemic. However, by April 2020, 46.6% of employees did at least part of their job from home, and in 2022, a quarter of all UK employees worked in hybrid environments and 13% were working fully remotely.
The speed and scale at which the pandemic shifted a significant portion of UK’s workforce to hybrid/remote working, underscores the massive increase in cyber threats and incidents that followed, and the challenges that businesses and organisations would need to address in order to adapt. [source: ONS]
Cyber Threats and Risk Implications for Hybrid Working
Cyber attacks Up 238% Since the Pandemic
According to a study by Alliance Virtual Offices, the frequency of cyber attacks has surged by 238% since the shift to widespread remote working, largely driven by vulnerabilities in home networks and personal devices. Remote work has also increased the cost of data breaches for companies by an average of £104,077 (converted from $USD). Despite this, only 56% of remote employees receive regular cyber security training, increasing the risks for organisations operating in a more digital environment. [source: Yahoo Finance]
BYOD and Home Networks Expand Attack Surface
Research from Lookout found that 32% of remote workers use apps not approved by their company’s IT department, and 90% access corporate networks from multiple locations, including coffee shops and public Wi-Fi, which increases cyber risk. This can also increase exposure to threats like phishing and malware attacks, especially as 46% of employees save work files on personal devices. [source: IT Security Guru]
Common Attack Vectors – An increase in RDP Abuse
In light of so many organisations migrating to remote/hybrid working models, threat actors have turned their sights to exploiting remote/virtual desktop technologies as a means of bypassing external defensive parameters and gaining a foothold on the internal network.
Remote desktop protocol (RDP) is a common method for establishing remote access on Windows systems. According to a recent report by Sophos found that cyber criminals abused remote desktop protocol in 90% of attacks. This was the highest incidence of RDP abuse since Sophos began releasing its Active Adversary reports in 2021, covering data from 2020.
Remote Work Security Gaps
Cyber security experts also warn that hybrid work models expose companies to new risks. Remote workers that use unsecured personal devices and networks are a target for cyber criminals as they increasingly target collaboration apps like Slack and Teams to launch social engineering attacks. With the introduction of faster 5G networks, attacks on mobile devices are also expected to rise, as noted by UpGuard.
Cyber Threats and Risk Implications for Hybrid Working
The evolution of digital security is now at a pivotal point. The old models, based on clear boundaries between “inside” and “outside,” no longer hold. IT and InfoSec teams now have to contend with much greater digital attack surfaces, endpoint and firmware management challenges and company-wide adherence to remote/hybrid working policies.
A Forrester study in 2023, found that remote and hybrid working models has magnified IT operational challenges for 75% of participating organisations. Below are some best practices and essentials for secure remote/hybrid working models:
Implement Strong Access Controls
Organisations must ensure that only authorised users can access corporate systems. This includes multi-factor authentication (MFA) and device authentication, which requires pre-registering devices before allowing network access. Zero-trust security models that continuously verify user identities and devices are also highly recommended for hybrid environments (Security Boulevard).
Adopt Zero Trust Architecture
Zero Trust is an architectural approach where inherent trust in the network is removed, the network is assumed hostile, and each request is verified based on an access policy. By implementing a “never trust, always verify” approach to network security, requiring continuous authentication and least-privilege access to ensure that every request—whether from inside or outside the network—is fully verified before access is granted, organisations can significantly reduce lateral movement from possible threat actors and improves security across cloud, on-premises, and hybrid environments. NIST has published further guidance on Zero Trust Architecture here.
Develop and Enforce a BYOD Policy, Using Encryption and Backups
Clear policies for using personal devices for work must be established, covering security measures such as mandatory installation of security software and limiting personal use on company devices, while limiting the amount of access through personal devices. This minimises the risk of unauthorised access and data leakage.
Encrypting all stored data on devices used for remote work adds an extra layer of protection in case of theft or unauthorised access. It’s also essential to back up important data regularly, ensuring it can be restored in the event of a cyber attack or system failure. Additionally, enabling remote wipe capabilities for lost or compromised devices ensures sensitive data can be erased quickly.
Use Secure Networks and Tools
Remote workers should avoid public Wi-Fi where possible due to its high vulnerability. Instead, they should rely on personal hotspots or secure VPNs, which encrypt data and protect it from potential attackers on unsecured networks. Similarly, using secure video conferencing platforms and company-approved email systems helps reduce the risk of unauthorised access to communications.
Regular Penetration Testing and Red Teaming
Penetration testing and Red Team exercises are crucial for identifying vulnerabilities across their external and corporate networks, applications or devices before attackers can exploit them. By conducting Targeted Attack Simulations (TAS) or Red Team exercises that simulate exploiting vulnerabilities or gaps in remote/hybrid working environments companies can evaluate their overall security posture of their remote working infrastructure and focus resources on vulnerable areas to improve their defences against such attack vectors.
Regular Software Updates and Endpoint Protection
Ensuring that all devices, including personal ones used for work (BYOD), have up-to-date antivirus and firewall protection is crucial.
Regularly updating and patching software, coupled with continuous vulnerability assessments, is vital for maintaining a secure infrastructure. Cyber security as a Service (CSaaS) solutions, such as HackRisk, can help companies manage vulnerabilities effectively without overburdening internal teams.
Phishing and Social Engineering Awareness Training
Employees are often the first line of defence against cyber threats. Regular training sessions on phishing, social engineering, and secure data handling can significantly reduce the risk of human error leading to a security breach
Managed Detection and Response (MDR)
Endpoint detection alone is no longer sufficient given today’s digital threat landscape. Organisations must now employ an “always-on” threat detection and monitoring capability. However, employing and retaining qualified cyber security analysts, engineers can very expensive and hard to come by, let alone the continuously high costs of using XDR and SIEM technologies. Running a 24/7 SOC (Security Operations Centre) in-house with experienced analysts and security experts with state-of-the-art defensive technologies are typically reserved for multi-national conglomerates and banks.
MDR services (Managed Detection and Response) provide continuous monitoring and analysis of an organisation’s entire estate, including endpoints, network traffic and activity logs. By outsourcing to experts, firms can ensure that threats are detected and mitigated in real-time, reducing the risk of a successful attack.
Free Posture Assessment
Understand your security risks and how to fix them.
Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.
Claim your free 30-minute guided posture assessment with a CyberLab expert.








