{"id":2146,"date":"2024-01-18T13:05:44","date_gmt":"2024-01-18T13:05:44","guid":{"rendered":"https:\/\/cyberinsights.argusgpi.com\/?page_id=2146"},"modified":"2026-04-13T13:05:45","modified_gmt":"2026-04-13T11:05:45","slug":"cyber-livewire","status":"publish","type":"page","link":"https:\/\/smecyberinsights.co.uk\/index.php\/cyber-livewire\/","title":{"rendered":"SME CYBER LIVEWIRE"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2146\" class=\"elementor elementor-2146\">\n\t\t\t\t<div class=\"elementor-element elementor-element-402d660 e-flex e-con-boxed e-con e-parent\" data-id=\"402d660\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9ae0621 elementor-widget elementor-widget-feedzy-rss-feeds\" data-id=\"9ae0621\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"feedzy-rss-feeds.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"widget-title\">CYBER LIVEWIRE<\/p><div class=\"feedzy-c8af538bcd2d384d4a1563a9b6bdc9b9 feedzy-rss\"><ul><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.eurojust.europa.eu\/news\/eur-55-million-seized-public-funds-misappropriation-investigation\" target=\"\" rel=\" noopener\" title=\"EUR 55 million seized in public funds misappropriation investigation\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"EUR 55 million seized in public funds misappropriation investigation\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.eurojust.europa.eu\/news\/eur-55-million-seized-public-funds-misappropriation-investigation\" target=\"\" rel=\" noopener\">EUR 55 million seized in public funds misappropriation investigation<\/a><\/span><div class=\"rss_content\" style=\"\"><p>A company based in the province of Milan is suspected of misappropriating public funds linked to a [&hellip;]<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.eurojust.europa.eu\/news\/fraud-call-centres-targeting-eu-citizens-shut-down-eurojusts-support-over-eur-50-million\" target=\"\" rel=\" noopener\" title=\"Fraud call centres targeting EU citizens shut down with Eurojust\u2019s support \u2013 over EUR 50 million in damages uncovered\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"Fraud call centres targeting EU citizens shut down with Eurojust\u2019s support \u2013 over EUR 50 million in damages uncovered\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.eurojust.europa.eu\/news\/fraud-call-centres-targeting-eu-citizens-shut-down-eurojusts-support-over-eur-50-million\" target=\"\" rel=\" noopener\">Fraud call centres targeting EU citizens shut down with Eurojust\u2019s support \u2013 over EUR 50 million in damages uncovered<\/a><\/span><div class=\"rss_content\" style=\"\"><p>A joint investigation by the Austrian and Albanian authorities, supported by Eurojust and Europol, [&hellip;]<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.eurojust.europa.eu\/news\/nine-arrests-connected-atm-bombings-across-europe\" target=\"\" rel=\" noopener\" title=\"Nine arrests connected to ATM bombings across Europe\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"Nine arrests connected to ATM bombings across Europe\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.eurojust.europa.eu\/news\/nine-arrests-connected-atm-bombings-across-europe\" target=\"\" rel=\" noopener\">Nine arrests connected to ATM bombings across Europe<\/a><\/span><div class=\"rss_content\" style=\"\"><p>A Dutch criminal group, suspected of carrying out ATM bombings in Germany and Switzerland has been [&hellip;]<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.eurojust.europa.eu\/news\/eurojust-facilitates-romanian-led-cross-border-action-against-alleged-corruption-public\" target=\"\" rel=\" noopener\" title=\"Eurojust facilitates Romanian-led cross-border action against alleged corruption in public procurement\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"Eurojust facilitates Romanian-led cross-border action against alleged corruption in public procurement\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.eurojust.europa.eu\/news\/eurojust-facilitates-romanian-led-cross-border-action-against-alleged-corruption-public\" target=\"\" rel=\" noopener\">Eurojust facilitates Romanian-led cross-border action against alleged corruption in public procurement<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Over 60 coordinated searches have taken place in Romania and France in the context of ongoing [&hellip;]<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.ncsc.gov.uk\/blogs\/could-your-choice-of-metrics-be-harming-your-soc\" target=\"\" rel=\" noopener\" title=\"Could your choice of metrics be harming your SOC?\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"Could your choice of metrics be harming your SOC?\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.ncsc.gov.uk\/blogs\/could-your-choice-of-metrics-be-harming-your-soc\" target=\"\" rel=\" noopener\">Could your choice of metrics be harming your SOC?<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Poor metrics can render a well-intentioned security operation centre entirely ineffective.<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.eurojust.europa.eu\/news\/eurojust-handles-close-14-000-cases-2025-annual-report-now-live\" target=\"\" rel=\" noopener\" title=\"Eurojust handles close to 14 000 cases in 2025: Annual Report now live!\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"Eurojust handles close to 14 000 cases in 2025: Annual Report now live!\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.eurojust.europa.eu\/news\/eurojust-handles-close-14-000-cases-2025-annual-report-now-live\" target=\"\" rel=\" noopener\">Eurojust handles close to 14 000 cases in 2025: Annual Report now live!<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Discover Online ReportAs an integral part of the EU\u2019s security and criminal justice architecture, [&hellip;]<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.ncsc.gov.uk\/blogs\/passkeys-are-more-secure-than-traditional-ways-to-log-in\" target=\"\" rel=\" noopener\" title=\"Passkeys are more secure than traditional ways to log in\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"Passkeys are more secure than traditional ways to log in\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.ncsc.gov.uk\/blogs\/passkeys-are-more-secure-than-traditional-ways-to-log-in\" target=\"\" rel=\" noopener\">Passkeys are more secure than traditional ways to log in<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Passkeys offer a more usable, secure replacement for passwords and are already supported by most [&hellip;]<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.ncsc.gov.uk\/news\/ncsc-leave-passwords-in-the-past-passkeys-are-the-future\" target=\"\" rel=\" noopener\" title=\"NCSC: Leave passwords in the past - passkeys are the future\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"NCSC: Leave passwords in the past - passkeys are the future\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.ncsc.gov.uk\/news\/ncsc-leave-passwords-in-the-past-passkeys-are-the-future\" target=\"\" rel=\" noopener\">NCSC: Leave passwords in the past - passkeys are the future<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Passkeys are the more secure and user-friendly login method and should be the default [&hellip;]<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.ncsc.gov.uk\/news\/international-cyber-agencies-fresh-advice-defend-against-china-linked-covert-networks\" target=\"\" rel=\" noopener\" title=\"International cyber agencies share fresh advice to defend against China-linked covert networks\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"International cyber agencies share fresh advice to defend against China-linked covert networks\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.ncsc.gov.uk\/news\/international-cyber-agencies-fresh-advice-defend-against-china-linked-covert-networks\" target=\"\" rel=\" noopener\">International cyber agencies share fresh advice to defend against China-linked covert networks<\/a><\/span><div class=\"rss_content\" style=\"\"><p>New advisory highlights how to defend against attacker tactics believed to be used by China-linked [&hellip;]<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.ncsc.gov.uk\/news\/defending-against-china-nexus-covert-networks-of-compromised-devices\" target=\"\" rel=\" noopener\" title=\"Defending against China-nexus covert networks of compromised devices\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"Defending against China-nexus covert networks of compromised devices\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.ncsc.gov.uk\/news\/defending-against-china-nexus-covert-networks-of-compromised-devices\" target=\"\" rel=\" noopener\">Defending against China-nexus covert networks of compromised devices<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Explaining the widespread shift in tactics, techniques and procedures (TTPs) towards networks of [&hellip;]<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.ncsc.gov.uk\/news\/executive-summary-defending-against-china-nexus-covert-networks-of-compromised-devices\" target=\"\" rel=\" noopener\" title=\"Executive Summary: Defending against China-nexus covert networks of compromised devices\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"Executive Summary: Defending against China-nexus covert networks of compromised devices\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.ncsc.gov.uk\/news\/executive-summary-defending-against-china-nexus-covert-networks-of-compromised-devices\" target=\"\" rel=\" noopener\">Executive Summary: Defending against China-nexus covert networks of compromised devices<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Organisations should map and baseline their edge device traffic, especially VPN and remote access [&hellip;]<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.eurojust.europa.eu\/news\/genocide-prosecution-network-39th-meeting-explores-unlawful-attacks-against-journalists\" target=\"\" rel=\" noopener\" title=\"Genocide Prosecution Network 39th meeting explores unlawful attacks against journalists in the context of armed conflict\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"Genocide Prosecution Network 39th meeting explores unlawful attacks against journalists in the context of armed conflict\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.eurojust.europa.eu\/news\/genocide-prosecution-network-39th-meeting-explores-unlawful-attacks-against-journalists\" target=\"\" rel=\" noopener\">Genocide Prosecution Network 39th meeting explores unlawful attacks against journalists in the context of armed conflict<\/a><\/span><div class=\"rss_content\" style=\"\"><p>The 39th meeting of theEuropean Network for investigation and prosecution of genocide, crimes [&hellip;]<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.ncsc.gov.uk\/blogs\/supporting-ai-adoption-for-uk-cyber-defence\" target=\"\" rel=\" noopener\" title=\"Supporting AI adoption for UK cyber defence\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"Supporting AI adoption for UK cyber defence\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.ncsc.gov.uk\/blogs\/supporting-ai-adoption-for-uk-cyber-defence\" target=\"\" rel=\" noopener\">Supporting AI adoption for UK cyber defence<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Adopting AI will require time, the development of new capabilities and careful oversight.\u00a0<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.ncsc.gov.uk\/news\/world-first-ncsc-engineered-device-secures-vulnerable-display-links\" target=\"\" rel=\" noopener\" title=\"World-first NCSC-engineered device secures vulnerable display links\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"World-first NCSC-engineered device secures vulnerable display links\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.ncsc.gov.uk\/news\/world-first-ncsc-engineered-device-secures-vulnerable-display-links\" target=\"\" rel=\" noopener\">World-first NCSC-engineered device secures vulnerable display links<\/a><\/span><div class=\"rss_content\" style=\"\"><p>SilentGlass, a plug-and-play device, actively blocks any unexpected or malicious HDMI and Display [&hellip;]<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.ncsc.gov.uk\/blogs\/new-cross-domain-guidance-for-government-industry-and-the-wider-security-community\" target=\"\" rel=\" noopener\" title=\"New cross domain guidance for government, industry and the wider security community\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"New cross domain guidance for government, industry and the wider security community\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.ncsc.gov.uk\/blogs\/new-cross-domain-guidance-for-government-industry-and-the-wider-security-community\" target=\"\" rel=\" noopener\">New cross domain guidance for government, industry and the wider security community<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Ensuring cross domain technologies are better understood - and more easily deployed - across [&hellip;]<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.eurojust.europa.eu\/news\/inter-regional-workshop-admissibility-encrypted-evidence-brings-together-prosecutors-and-law\" target=\"\" rel=\" noopener\" title=\"Inter-regional workshop on admissibility of encrypted evidence brings together prosecutors and law enforcement at Eurojust\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"Inter-regional workshop on admissibility of encrypted evidence brings together prosecutors and law enforcement at Eurojust\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.eurojust.europa.eu\/news\/inter-regional-workshop-admissibility-encrypted-evidence-brings-together-prosecutors-and-law\" target=\"\" rel=\" noopener\">Inter-regional workshop on admissibility of encrypted evidence brings together prosecutors and law enforcement at Eurojust<\/a><\/span><div class=\"rss_content\" style=\"\"><p>The inter-regional workshop Handling admissibility of evidence obtained from encrypted networks: [&hellip;]<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.ncsc.gov.uk\/news\/cyber-chief-uk-faces-perfect-storm-for-cyber-security\" target=\"\" rel=\" noopener\" title=\"Cyber chief: UK faces \" style=\"height:40px;width:40px;\" perfect for cyber><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"Cyber chief: UK faces &quot;perfect storm&quot; for cyber security\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.ncsc.gov.uk\/news\/cyber-chief-uk-faces-perfect-storm-for-cyber-security\" target=\"\" rel=\" noopener\">Cyber chief: UK faces \"perfect storm\" for cyber security<\/a><\/span><div class=\"rss_content\" style=\"\"><p>As the technology landscape develops, the definition of cyber security is expanding with it.<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.ncsc.gov.uk\/blogs\/preparing-for-severe-cyber-threat-why-leaders-must-act-now\" target=\"\" rel=\" noopener\" title=\"Preparing for severe cyber threat: why leaders must act now\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"Preparing for severe cyber threat: why leaders must act now\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.ncsc.gov.uk\/blogs\/preparing-for-severe-cyber-threat-why-leaders-must-act-now\" target=\"\" rel=\" noopener\">Preparing for severe cyber threat: why leaders must act now<\/a><\/span><div class=\"rss_content\" style=\"\"><p>A call to action to collectively build UK resilience.<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.eurojust.europa.eu\/news\/strengthening-fight-against-organised-drug-trafficking-ejocns-3rd-plenary-meeting\" target=\"\" rel=\" noopener\" title=\"Strengthening the fight against organised drug trafficking: EJOCN\u2019s 3rd Plenary Meeting\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"Strengthening the fight against organised drug trafficking: EJOCN\u2019s 3rd Plenary Meeting\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.eurojust.europa.eu\/news\/strengthening-fight-against-organised-drug-trafficking-ejocns-3rd-plenary-meeting\" target=\"\" rel=\" noopener\">Strengthening the fight against organised drug trafficking: EJOCN\u2019s 3rd Plenary Meeting<\/a><\/span><div class=\"rss_content\" style=\"\"><p>The European Judicial Network on Organised Crime (EJOCN) held its third Plenary Meeting on 16-17 [&hellip;]<\/p><\/div><\/li><li  style=\"padding: 4px 0 7px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:40px;width:40px;\"><a href=\"https:\/\/www.ncsc.gov.uk\/blogs\/strengthening-cyber-resilience-across-the-nhs-with-collaboration-and-innovation\" target=\"\" rel=\" noopener\" title=\"Strengthening cyber resilience across the NHS with collaboration and innovation\" style=\"height:40px;width:40px;\"><img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/cropped-index_image440-removebg-preview-1.png\" title=\"Strengthening cyber resilience across the NHS with collaboration and innovation\" style=\"height:40px;width:40px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/www.ncsc.gov.uk\/blogs\/strengthening-cyber-resilience-across-the-nhs-with-collaboration-and-innovation\" target=\"\" rel=\" noopener\">Strengthening cyber resilience across the NHS with collaboration and innovation<\/a><\/span><div class=\"rss_content\" style=\"\"><p>How the NCSC is reducing risk, improving detection, and helping to keep vital services running.<\/p><\/div><\/li><\/ul> <\/div><style type=\"text\/css\" media=\"all\">.feedzy-rss .rss_item .rss_image{float:left;position:relative;border:none;text-decoration:none;max-width:100%}.feedzy-rss .rss_item .rss_image span{display:inline-block;position:absolute;width:100%;height:100%;background-position:50%;background-size:cover}.feedzy-rss .rss_item .rss_image{margin:.3em 1em 0 0;content-visibility:auto}.feedzy-rss ul{list-style:none}.feedzy-rss ul li{display:inline-block}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"cybocfi_hide_featured_image":"","footnotes":""},"ppma_author":[415],"class_list":["post-2146","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/pages\/2146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=2146"}],"version-history":[{"count":19,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/pages\/2146\/revisions"}],"predecessor-version":[{"id":27535,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/pages\/2146\/revisions\/27535"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=2146"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=2146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}