2025 Cybersecurity Roundup and Action Plans for 2026

Thank you for being part of our journey this year. Whether we’ve been helping you to protect your business, collaborating as partners, or supporting you in any capacity in between, it’s been a particularly busy year for technology, and especially for cybersecurity.

Before I go any further, though. If you haven’t engaged with our services yet, we definitely need to have a conversation in the New Year!

Over the past week, the B.TECH team has taken a look back at 2025 and pulled together a few key points we think you’ll want to note and discuss with your teams, either before the Christmas break or when you’re back in January.

Your 2025 Cybersecurity Round‑Up and Action Plan for 2026

Here’s what mattered most this year, and things that are worth doing if you haven’t already done them.

1. Complacency causes breaches

Don’t be an easy target. Simple steps can have massive benefits. Multi-Factor Authentication should be enabled across all your online accounts. Every. Single. One. If you’re using Microsoft within your business, and we know most of you are, aim for a minimum Secure Score of 75%. If you don’t know what this means, we need to talk!

2. Users are your first line of defense

The stats vary depending on the source, but high percentages of successful breaches stem from human error. Don’t lock all the doors and windows of your business and then forget to tell the kids not to open the door to strangers. Deploy regular training so your team can spot a real vs fake emails and other communications.

3. Compliance got serious

Regulators across several sectors moved from guidance notifications to mandatory requirements, and we expect this trend to continue as more and more companies, bit and small alike, are impacted by breaches. Consider getting a cybersecurity certification such as Cyber Essentials, which clearly demonstrates your compliance to stakeholders and clients.

Bonus tip. Displaying a cybersecurity certificate in your marketing materials can help you to win more clients (and retain the ones you have).

4. Redundancy saves businesses

You can’t prevent all breaches, but you can plan for them. Asahi could have been better prepared when they were the victim of a recent cyber-attack, which resulted in their workforce having to take orders by hand, on literal paper. Being ready for a breach, with awareness of how you would continue operations without key systems can help you to navigate both minor and major outages and minimise the impact.

5. Get technical

For those of you that are more technical, Zero Trust adoption, AI-aware security, and hybrid cloud infrastructure have all been hot topics this year and should be part of your discussions if they’re not already. Again, if you’re not sure what they are, let us know and we can provide guidance to ensure you can take your security to the next level.

In Summary

Implementing even basic cybersecurity to protect your business can have massive benefits. All then you then have to do is maintain it, certify that it’s working, and then plan for it not working. Sounds easy enough…

As a supporting note, please make sure to be extra vigilant as we go into the festive season. People are keen to get to Christmas parties and on their flights to sunny or snowy destinations. Make sure they don’t bring your business down as they leave. Make sure to both lock the door on your physical office but also your IT infrastructure on your way out (oh, and remember to turn the lights off).

—————————————————————————————————————————————————————————

Year End Business Update

Our flagship cybersecurity service, Secure365, is going from strength to strength and we’re proudly supporting more and more businesses.

This year, Secure365 clients have consistently outperformed industry averages in Secure Score and recorded zero compromises thanks to continuous protective measures and user education. Together, we’ve built a stronger security posture that protects your business and your reputation.

Expect more automation, smarter dashboards, and proactive compliance tools to keep you ahead of threats. Watch this space for updates and new features designed to make security simple and effective.

Jordan Gall

Jordan Gall is a Technology Specialist with over a decade of successful experience enhancing companies use of technology. Jordan has a keen interest in all facets of technology, especially concerning cyber security, mitigating risk for organisations, and creating efficient processes to streamline the use of technology systems and services.

He personally enjoys a good tennis match but can also be found behind a drum kit trying to compose the latest hit rock song.

Next
Next

The Top 5 Cybersecurity Policies to turn on in Microsoft 365 now