Now, businesses process more data than ever. Information in social media feeds, open databases, AI-generated reports, and real-time analytical dashboards provides an opportunity to better understand the origins of disinformation. And yet, with these tools in hand, many companies continue to make devastatingly poor intelligence mistakes that significantly complicate decision-making. It’s not an information deficit — it’s poor intelligence hygiene. Here are five mistakes that businesses still make in 2025.

1. Trusting Unverified Data from Social Networks

Companies make decisions based on social media insights — trends, sentiment analysis, viral claims, screenshots, and “expert” opinions. All too frequently, this data is simply accepted as a given without further validation. Social platforms incentivize speed and participation, not accuracy. Bots, coordinated influence operations, old screenshots, and AI-generated faces all plaster over the seam between real and fake. However, there are some ways to mitigate this risk, such as treating social media as a signal, not a fact, demanding secondary confirmation from primary sources for use in reports or making decisions based on them, and differentiating between “trend monitoring” and “decision-grade intelligence”.

2. Ignoring Metadata

Most businesses search content without paying any attention to the metadata — when it was created, by whom, where, edition history, or technical attributes. Under these circumstances, false or distorted data is perceived as near-real intelligence. In 2025, recycled content is one of the most common causes of incorrect conclusions. To avoid this, check timestamps, revisit version history, and verify authorship. Treat content with no explicit metadata as high-risk, ask: “When was this created?” “By whom?” “What is the purpose?” and implement tools that save and expose metadata automatically.

3. Ignoring the Origin of the Source

Many reports cite data without evaluating how it was produced. Think tanks, research firms, “independent analysts,” and open-source platforms have differing incentives and biases. Weak or agenda-driven sources are frequently hidden behind a polished presentation. And to prevent it, add a credibility, funding, and historical-accuracy mapping key, differentiate between primary, secondary, and tertiary sources in the legend, header, or interpretation of each source/map/chart/report; require an endnote on all internal intelligence assessments that lists where the information came from; prohibit circular sourcing (sources quoting other sources).

4. Confusing Volume with Insight

Dashboards full of charts and KPIs can make it look like we know what is going on. But more data does not lead to better intelligence — it frequently results in noise, paralysis, or false confidence. To avoid this, define clear intelligence questions before collecting data; focus on relevance, not completeness; summarize findings with implications, not just metrics and other statistical salesmanship; encourage analysts to say “we don’t know” when evidence is lacking.

5. Over-Reliance on AI Without Human Validation

AI instruments are integrated into research monitoring and reporting flows. Indeed, while they are powerful, these engines can hallucinate, magnify bias, or interpret context incorrectly — especially if trained on poor-quality input. How can this be avoided? Leverage AI as an augmented intelligence, not as an authority; require human sign-off on all strategic judgments and record AI-produced results independently from validated intelligence audits, and regularly review material requests, sources, and assumptions.

Final Thought

In 2025, competitive advantage doesn’t come from having more data; it comes from knowing what can be trusted and what can not. Robust intelligence is founded on verification, context, and the discipline of skepticism. Companies that excel at these basics will be poised to jump to swifter, more intelligent, and more defensible decisions, even in the prospect of a world full of information.

Author

Oleksandra leads communications at Molfar Intelligence, bringing nearly a decade in strategic communications and five years of hands-on OSINT experience. She shapes how Molfar's investigations reach international audiences in English and Ukrainian.

Recent posts

View All
View All
White Plus Icon
View All
View All
White Plus Icon

Related posts

View All
View All
White Plus Icon

11 July 2024

OSINT AI: How to Optimize Your Investigation in 2024

OSINT AI is one of the novelties in the domain that will likely stay long. The researchers should remain in the loop and try out AI OSINT instruments to enhance their investigation efforts.

View All
View All
White Plus Icon
Turn Intelligence Into Action
Order a service
Order a service
Black Plus Icon

Our cases

Behind every case is a client who needed clarity in uncertainty. Browse our work to see how we uncover what others miss — and what that means in practice for businesses and decision-makers.

View All Cases
View All Cases
White Plus Icon
Expanded Plus Icon

Investor Due Diligence: Mitigating Reputational Risks in Defence Tech

Revealed how a high-stakes Defence Tech investment was halted after OSINT-driven due diligence uncovered a co-founder’s links to Russian-origin money laundering and a seized 2.6 billion UAH gambling enterprise, protecting a global firm from severe reputational and regulatory fallout.

Investment

Learn more
Learn more
White Plus Icon
Expanded Plus Icon

Pre-Employment Screening for a Spacecraft Manufacturing Role

Conducted a full pre-employment background investigation for a high-security aerospace role, covering court registry checks, financial record verification, ideological risk assessment, and social media OSINT analysis across relevant jurisdictions.

Space

Learn more
Learn more
White Plus Icon
Expanded Plus Icon

Sanctions Gaps — Supercam Drone Production Continues

Revealed how Russian drone manufacturers circumvent international sanctions by exploiting a critical design flaw (sanctions applied to company names rather than underlying legal entity identifiers) enabling Supercam to increase production tenfold despite being designated.

Finance

Learn more
Learn more
White Plus Icon
Expanded Plus Icon

Cybersecurity Audit and Internal Data Exposure Mitigation

Conducted a comprehensive cybersecurity audit of a long-standing European IT infrastructure, identified critical internal data leaks involving financial plans and performance reviews, and implemented high-level security protocols to mitigate regulatory and operational risks.

Cybersecurity

Learn more
Learn more
White Plus Icon
Gain the Clarity You Need to Move with Confidence

Let’s connect toexplore how tailored intelligence can strengthen your decisions, revealopportunities, and minimize uncertainty.