The first half of 2025 has underscored the escalating impact of cyberattacks, with high-profile breaches at Marks & Spencer, Harrods, and Qantas exposing sensitive employee and customer data. These incidents highlight that while advanced security technology is critical, human vulnerabilities remain the primary entry point for attackers.
Recent investigations revealed that most of the breaches were triggered by social engineering tactics. Hackers impersonated employees and tricked IT help desks into resetting credentials, bypassing robust defenses and enabling ransomware deployment. This trend reinforces the need for organizations to view cybersecurity as more than a technical challenge.
Key recommendations include:
- Stronger password practices: Businesses should enforce clear policies around complexity, length, and avoidance of personal details. NIST guidelines advise against routine forced resets, which often weaken security through predictable patterns.
- Multi-Factor Authentication (MFA): PIN codes, biometrics, and device-bound authentication add resilience, though attackers are increasingly deploying proxy toolkits to bypass MFA.
- Adoption of Passkeys: Using public/private cryptographic keys offers a more secure alternative, rendering phishing kits and credential theft largely ineffective.
- Employee awareness and training: Tiered cybersecurity education, phishing simulations, and regular feedback loops ensure employees remain vigilant and adaptive.
- Zero Trust policies for hybrid work: Restricting user access to only essential data and continuously verifying connections reduces exposure in remote environments.
Experts stress that cultivating a culture of cyber resilience is essential. Technology must combine with progressive training, continuous oversight, and proactive defenses to address both technical and human-driven vulnerabilities.
As attackers grow more sophisticated, the path forward for enterprises is clear: cybersecurity must be treated as a holistic ecosystem where strong technology is reinforced by informed, vigilant people and adaptive strategies.
Source:

