This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Cyber threats to watch out for in 2025 – Filestream
With more digital tools – like AI – come more cyber threats, warns Paul Day of document management specialist Filestream.
The world of technology, AI, and the internet will continue to evolve at pace in 2025.
In so many ways that’s a fantastic aspect to our society offering us opportunities to connect and interact, do business, become even more efficient and share knowledge as never before.
We can make friends and contacts across borders and it’s hard to imagine a life without access to such technology.
Yet as with all things there is a dark side and those risks are substantial.
There are always criminals behind the scenes ready to use these ‘tools’ to steal and to harm and to feed those with bad intentions.
Being prepared can go some way towards mitigating that ever-growing risk.
In business in particular, most IT Leaders are aware that managing cyber security, often with limited budgets, is a constant challenge.
The problem lies not only in the rapid emergence of new threats, but in the continuous evolution of existing ones.
Here are some things to be aware of in 2025:
Human error will remain the main cyber security risk
Those who wish to steal money, knowledge and data know all to well that human error is a key weakness and they will continue to aim their attacks accordingly.
Many companies (especially SMEs) tend to treat security compliance and cyber training as a tick-box exercise, until they get caught out. Their attitude will then change.
It’s vital to train staff and to understand what makes an employee more likely to click on a link or fall for a scam, so you can plan training accordingly.
There will be a big rise in AI attacks; phishing and social engineering will be a top cause of data breaches
AI is a double-edged sword – it helps and it hinders. AI plays a complex role in cyber security, on the one hand it plays a central role in detecting, analysing and responding to threats (think EDR – End Point Detection & Response).
Yet a tool for good can also be a tool for the opposite. Cybercriminals are increasingly using generative AI to develop and enhance attacks.
For example, personalised phishing emails can be scaled on mass and platforms on the dark web can impersonate a sender’s tone, language and style.
Deepfake audio and video content will continue to rise
This is one of the scariest aspects of AI and we’ve already seen examples of it and there may be examples we’ve not yet realised are deepfake.
This happens where hackers research an individual on social media, clone their voice and can use available video footage to trick someone who is trusted by the victim.
Social engineering tactics like this are now expanding in other channels such as calls, messaging apps, QR codes, social media and text messages.
The threat of quantum computing
Quantum computers are emerging and the benefits versus risks are still unknown. What we do know is they are great at solving problems far too complex for traditional computers.
More worryingly, a future with quantum computers will require new encryption methods, or we risk leaving sensitive information vulnerable to hackers, even if encrypted.
This means bank accounts, online communications and other vital infrastructure will be at risk. Encryption will have to evolve.
Supply chain security
In recent years there has been an increase in cyber-attacks resulting from vulnerabilities in a supply chain.
You are only as safe as your weakest link, yet evaluating supply chains is still not common practice for most businesses.
An example of this is so-called ‘water holing’. This is where a website used by many people within a larger organisation (such as a local council or health care body which is the main target) visit a website routinely ie. the waterhole.
The site is compromised by criminals who install malware which is then inadvertently distributed by these users to the target organisation. It’s happening more and more.
IOT Security – Internet of Things
The rapid expansion of devices (that connect to the internet and networks) such as smartwatches, fitness trackers, smart home appliances and assistants such as Amazon Echo & Google Home present security challenges.
Because these devices often have weak security features and connect to each other, a vulnerability in one can result in access to another. For instance, an electric vehicle could be put at risk from a Bluetooth vulnerability.
You can help by using tactics such as segmenting your networks (i.e. setting up IOT devices on a different network to your business data) and setting up MFA on devices when available.
Finally:
When evaluating your cyber security, it is wise to adopt a holistic approach which considers education, human risk management, technological solutions and cyber insurance coverage.
Filestream as a company has evolved significantly since it was established as one department of an office equipment company in 2003 and now supports many larger international firms including worldwide cruise companies, Scania and logistics giant, Culina Group. Paul Day is managing director.
Filestream MD appointed as judge in two major business awards
Read more27.01.2025
Filestream celebrates win at Document Management Awards
Read more02.12.2024
Filestream MD to run London Marathon for children’s hospice
Read more04.11.2024
Encryption is essential in safeguarding your data – Filestream
Read more09.10.2024
Filestream appoints new operations director
Read more16.07.2024
Filestream promotes long-time employee Paul Day to managing director
Read more10.06.2024
With AI cyber crime on the rise businesses must be more hacker-savvy in 2024 – Filestream
Read more04.01.2024
Filestream celebrates third consecutive win at Document Manager Awards
Read more30.11.2023