Cyber security in action: key questions and expert insights

19/02/26 Wavenet
cyber security Q&A

What keeps security leaders awake at night?

This Q&A answers the most common and most critical cyber security questions raised in our Cyber Security in Action webinar. It delivers clear, expert advice on preventing the attacks that cause the greatest disruption, helping organisations turn complexity into confident, informed action.

1. How can we attract highly skilled youngsters into ethical hacking rather than cyber crime?

Many of today’s leading ethical hackers developed their skills informally. The priority is early engagement before technical talent is drawn into criminal activity.

Key points:

  • Government bodies such as the National Cyber Security Centre (NCSC) and National Crime Agency (NCA) run programmes to retrain individuals into ethical cyber roles.
  • Some of the strongest cyber professionals have a background in hacking and malware research.
  • Early outreach, education, and ethical pathways are critical to redirect technical talent.

Takeaway: The key is to ensure that as an industry, we are creating apprenticeships, training programmes, and clear career pathways in cyber security to engage technically gifted young people before criminal behaviour becomes an option.

2. Should organisations adopt passwordless authentication?

Yes, where it is practical and supported by organisational infrastructure.

Key points:

  • Biometrics (fingerprint, facial recognition) and hardware keys significantly reduce password risk.
  • Passwordless approaches are more secure but can be complex to deploy across large organisations.
  • Password managers are a strong alternative where passwordless is not feasible.

Recommended practices:

  • Use biometrics and hardware tokens where supported.
  • Combine with multi-factor authentication (MFA).
  • Avoid password reuse across systems.

Takeaway: Passwordless authentication, supported by MFA and hardware-based security, significantly reduces credential risk and should be adopted where technically and operationally feasible.

3. What patch management software should we use?

There is no single solution that suits every organisation.

Key points:

  • Patch management should be aligned with your wider IT and infrastructure strategy.
  • Internet-facing systems should be prioritised and patched within 7–14 days for critical vulnerabilities.
  • Consult your IT or service provider to select a tool that integrates with your environment.

Takeaway: Effective patch management is driven by speed and consistency, not by tool selection, organisations must prioritise critical vulnerabilities and internet-facing systems.

4. Staff dislike awareness training. How can we make it more engaging?

Security awareness training works best when it is practical, short, and relevant to everyday work.

Key points:

  • Keep sessions brief and focused on the most relevant threats (phishing, passwords, suspicious activity).
  • Run in-person or live sessions where possible for higher engagement.
  • Use phishing simulations to create interactive learning.
  • Gamify learning (scores, prizes, competitions).
  • Reinforce cyber security as a shared responsibility and cultural value.

Takeaway: Security awareness must be relevant, interactive, and embedded into organisational culture to drive lasting behavioural change.

5. How does offline backup work with cloud storage?

Modern cloud backup solutions can provide protection similar to traditional offline backups.

Key points:

  • Use immutable backups that cannot be altered or deleted by attackers.
  • Ensure backups are logically separated from your production network.
  • Regularly test recovery from backups.
  • Make sure that you maintain at least one backup copy that cannot be modified by ransomware or malicious actors.

Takeaway: Resilient backup strategies require immutable, segregated backups that are regularly tested to ensure reliable recovery from ransomware and cyber incidents.

6. Has the balance shifted in favour of defenders or attackers? What should leadership change?

Artificial intelligence (AI) is now used by both attackers and defenders reshaping the cyber security landscape.

Key points:

  • Attackers use generative AI to produce more convincing phishing emails and fraudulent websites.
  • Defenders use AI to enhance threat detection and improve response times at scale.
  • While defenders currently retain an advantage, cyber security remains a constant arms race.
  • Organisations must introduce clear governance around AI use to prevent sensitive data being shared with public tools.
  • Stronger data classification and access controls are required to reduce exposure.

Continued investment in detection, monitoring, and incident response readiness is essential.

Takeaway: Cyber security has become a leadership and governance issue, requiring clear oversight of AI use, data protection, and incident readiness at board level.

For more information on how you can utilise AI going forward click here.

7. What is a trusted long password storage solution?

Password managers provide the most secure and practical approach to storing and managing credentials.

Key points:

  • Enterprise-grade password managers such as Bitwarden, Keeper, and 1Password encrypt and securely store credentials.
  • Access to password managers should be protected using multi-factor authentication or hardware security keys.
  • Credentials should never be stored in spreadsheets or unsecured documents.
  • Each system should use a long, complex, and unique password.

Takeaway: Enterprise password managers protected by MFA offer the safest and most effective way to manage credentials at scale while also reducing the risk of compromise through password reuse.

8. Do you recommend using a VPN? Should home workers route traffic via the office firewall?

VPNs play an important role in securing remote access, but their value depends on how they are used within an organisation’s security architecture.

Key points:

  • Privacy-focused VPNs used to obscure location are not essential for most business users and are typically a personal choice rather than a corporate security requirement.
  • Corporate VPNs that route traffic through organisational security controls are strongly recommended.

Routing traffic through corporate security systems enables greater visibility, policy enforcement, and threat monitoring.

Secure Access Service Edge (SASE) solutions such as Cato Networks and CISCO provide modern alternatives to traditional VPN architectures.

Takeaway: Remote users should access the internet through corporate security controls to maintain visibility, enforce security policy, and reduce exposure to unmanaged home networks.

9. Are Western hacking groups new or simply just more visible?

Western-based cyber crime groups are becoming more visible rather than representing an entirely new threat.

Key points:

  • Historically, most major attacks originated from Russia and China.
  • Financially motivated attacks have driven increased cyber criminal activity in Western countries.
  • Cyber crime continues to expand wherever financial opportunity exists.

Takeaway: Cyber crime is increasingly financially driven and geographically diverse, reinforcing the need for organisations to focus on defence rather than attribution.

10. What attack vector are we not talking about enough?

For most UK organisations, the most significant cyber threats remain ransomware and phishing attacks, which continue to exploit basic security weaknesses, so these are the threats that need the most focus.

Key points:

  • Ransomware and phishing are among the most disruptive and costly cyber attacks facing organisations today.
  • These attacks are most commonly enabled by weak or reused passwords, phishing emails, and unpatched vulnerabilities.
  • The majority of successful attacks rely on exploiting these three entry points rather than sophisticated technical flaws.

Takeaway: By strengthening password controls, improving phishing defences, and maintaining patching discipline, organisations can prevent the vast majority of cyber attacks and significantly reduce overall cyber risk.

For more information on cyber risks affecting businesses in 2026 check out this resource.

Need some help?

We can support you at every stage of your cyber security journey, combining expert consultancy, managed security services, and proven technologies to help reduce risk, improve resilience, and respond effectively to evolving threats. By working with together, we can help you move from reactive defence to proactive protection.

Cyber Security, Blogs

Latest blogs

See all posts
windows-11
Understanding Windows 10 Extended Security Updates (ESU) - what your business needs to know in 2026

As of 14 October 2025, Microsoft officially ended free security updates for Windows 10. Organisations that continue operating Windows 10 devices today - in 2026 - are now doing so in a post‑support environment, relying either on paid Extended Security Updates (ESU) or accepting increasing cyber risk. Windows updates are the backbone of endpoint security, identifying new vulnerabilities and closing them before attackers exploit them. Since the end of support deadline passed, unpatched vulnerabilities accumulate quickly, creating growing exposure across any estate still running Windows 10. Continuing with Windows 10 in 2026 can lead to: Higher cyber‑attack risk, particularly ransomware Compliance issues (Cyber Essentials, ISO 27001, GDPR, FCA/financial sector requirements) Reduced software compatibility with modern applications and security tools Increased helpdesk overhead due to outdated hardware and OS issues For organisations, this is no longer preparation for a future deadline - it’s about reducing risk now and completing the transition to a modern, supported operating system. Your organisation’s options in 2026 Businesses now have three strategic pathways depending on their hardware, budget cycle, and deployment readiness. 1. Upgrade existing compatible devices to Windows 11 If your current hardware meets Microsoft’s requirements, upgrading remains the fastest and most cost‑effective way to move away from Windows 10 ESU dependency. Benefits include: Ongoing security updates Modern protection (TPM 2.0, enhanced kernel security, improved identity protection) Support for AI‑powered features and future Microsoft roadmaps Lower risk and long‑term stability If your business has Windows 10 machines still capable of upgrading, this should be the first route explored. 2. Refresh your estate with Windows 11‑ready devices Many Windows 10 machines still in use in 2026 are now five to eight years old, and often: Fall below modern security standards Cause productivity bottlenecks Increase support tickets Consume disproportionate IT resources A structured hardware refresh offers: Predictable lifecycle management Improved reliability and performance Standardisation across departments Compatibility with modern security and MDM tooling Wavenet supports staged refresh programmes aligned with fiscal planning, ensuring minimal business disruption. 3. Continue using Windows 10 with Extended Security Updates (ESU) Microsoft’s Windows 10 ESU programme is still available, but it is: Paid per device, per year Increasing in cost each year (designed to encourage migration) Security‑only - no features or performance improvements A temporary safety net, not a long‑term strategy ESU is most appropriate when: Line‑of‑business applications are not yet Windows 11 certified You need additional time for a phased rollout Budget cycles are delaying upgrades or refresh Remote / operational environments require longer transition periods Most organisations still using ESU in 2026 should plan to exit it within the next 12–24 months. Assessing your Windows 11 readiness in 2026 At this stage, businesses need more than a simple device‑level compatibility check. A comprehensive analysis includes: Hardware readiness across the estate Application and vendor compatibility Driver and firmware validation Intune / MDM alignment Security baselines and policy impacts User profile and data considerations Deployment sequencing and pilot planning Wavenet offers full readiness assessments to provide a clear view of which devices can be upgraded, which require replacement, and where ESU may remain temporarily necessary. Why 2026 is a critical year for migration With the end of support now behind us, delaying migration further increases: Security exposure Operational risk Compliance penalties ESU costs End‑user frustration from aging hardware A well‑structured migration programme delivers: A secure, modernised endpoint environment Lower long‑term support cost Improved employee experience Better alignment with Microsoft’s cloud and security roadmap Many organisations are now accelerating migration to remove the remaining Windows 10 footprint entirely. How Wavenet supports your Windows 11 journey Wavenet provides end‑to‑end Windows 11 migration services, including: Estate discovery & readiness assessment Hardware lifecycle planning and procurement Application compatibility testing Managed upgrade or Autopilot deployment Configuration, security baselines, and Intune alignment ESU planning (where absolutely necessary) Phased rollouts with minimal disruption Whether you’re upgrading compatible devices, refreshing your estate, or transitioning off ESU entirely, Wavenet ensures a smooth, secure, and controlled migration.

Read more