The cyber weak point is no longer where many executives think it is

The cyber weak point is no longer where many executives think it is

The cyber weak point increasingly sits beyond the core stack. Fresh warnings on messaging app targeting, botnets built from neglected devices, and the resilience of threat actors after takedowns all point to the same problem: organisations still struggle more with behaviour, asset visibility, authentication, and third-party control than with encryption itself.


Much corporate cyber language still assumes the decisive battle happens inside the system: the firewall, the server, the application stack.

If nothing else, events of the past week have suggested that the more telling weak points are often the ones sitting around the edge — the employee who hands over a code, the router nobody patches, the third party nobody maps properly, or the threat actor who returns the day after a takedown.

That does not make the underlying technology irrelevant. It does make behaviour, device management, and operational discipline impossible to relegate to the margins.

A joint advisory from the FBI and CISA has warned of a Russian intelligence-linked campaign targeting users of consumer messaging applications such as Signal. Thousands of accounts have been compromised through phishing and impersonation designed to trick users into handing over security codes. The encryption itself is not the issue so much as the user themself, and it shows how easily a secure channel can be undermined by routine habits, urgency, or misplaced trust.

The same point applies more broadly across corporate security. Technical controls can be strong while actual behaviour remains permissive. Senior staff often move quickly across devices, accounts, and channels. That speed is useful operationally, but it also creates ideal conditions for impersonation, rushed judgement, and weak authentication habits. Cyber security, in practice, is frequently a contest over workflow rather than cryptography.

A second development pushes the same lesson into hardware. Law-enforcement agencies in the US, Germany, and Canada have disrupted four botnets — Aisuru, KimWolf, JackSkid, and Mossad — that infected more than 3 million devices worldwide. Most of those devices were basic internet-connected products such as webcams, digital video recorders, and Wi-Fi routers, often compromised because of weak settings and missing updates. Some of that infrastructure was then rented out as a residential proxy network.

This is not a niche consumer problem. Many organisations still do not have a reliable map of the devices connected to their environment, especially across branches, contractors, logistics partners, and home-working arrangements. That makes neglected hardware a corporate issue even when it appears mundane.

The broader regulatory direction points the same way. In Britain, new financial-sector incident-reporting rules will take effect in March 2027 after a one-year implementation period, following a sharp rise in incidents involving third-party providers such as Cloudflare and AWS. More than 40% of cyber incidents reported to the FCA in 2025 involved a third party.

The third useful correction comes from what happens after enforcement. An Iran-linked hacking persona restored its website almost immediately after US authorities seized associated domains, underlining how quickly determined operators can reconstitute their public-facing infrastructure.

The real question is whether an organisation can sustain basic discipline under pressure: verified identities, strong authentication, clear rules on device ownership, rigorous asset inventories, and realistic assumptions about third-party resilience. Those are the proven defences that are most likely to fail quietly until an incident forces attention back onto them.

The old caricature of cyber security cast it as a specialist concern, best left to technical teams until something went wrong. That view now feels dated. The shape of the current threat is more diffuse, and more ordinary. It sits in the contact list, the forgotten webcam, the supplier outage, and the user who assumes a trusted channel makes every message trustworthy. The weak point is, unfortunately, seldom a system that can be ripped, replaced, or upgraded; rather, it’s the systemic culture of security where routine meets neglect.



  • Government moves to curb late payments

    Government moves to curb late payments

    Ministers tighten payment rules for large business buyers today. Proposed reforms would cap terms at 60 days, mandate interest on overdue invoices, expand enforcement powers, and bring payment performance closer to board scrutiny, though the measures still require legislation and some of the most significant changes would not take effect…


  • Azerion creates new OOH leadership role

    Azerion creates new OOH leadership role

    Azerion promotes Rebecca Callaghan to lead out-of-home growth in UK. The promotion gives the advertising platform a dedicated senior lead for programmatic digital out-of-home as it pushes the channel deeper into omnichannel media planning.


  • The cyber weak point is no longer where many executives think it is

    The cyber weak point is no longer where many executives think it is

    The cyber weak point increasingly sits beyond the core stack. Fresh warnings on messaging app targeting, botnets built from neglected devices, and the resilience of threat actors after takedowns all point to the same problem: organisations still struggle more with behaviour, asset visibility, authentication, and third-party control than with encryption…