{"id":11730,"date":"2024-07-29T07:00:51","date_gmt":"2024-07-29T05:00:51","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=11730"},"modified":"2024-11-21T13:46:38","modified_gmt":"2024-11-21T12:46:38","slug":"cyberinsights-for-290724","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/07\/29\/cyberinsights-for-290724\/","title":{"rendered":"CYBER INSIGHTS: Monday 29 July 2024 \u2013 Today\u2019s SME Cybersecurity News &#038; Intelligence"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11730\" class=\"elementor elementor-11730\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1219ee25 e-flex e-con-boxed e-con e-parent\" data-id=\"1219ee25\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2947cf8 elementor-widget elementor-widget-html\" data-id=\"2947cf8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d0c1824 e-con-full e-flex e-con e-parent\" data-id=\"7d0c1824\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5b65aa14 e-con-full e-flex e-con e-child\" data-id=\"5b65aa14\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-317a5cfc elementor-widget elementor-widget-image\" data-id=\"317a5cfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"227\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/JEMA-GER-1426-24-300x227.jpg\" class=\"attachment-medium size-medium wp-image-11733\" alt=\"JEMA GER 1426-24\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/JEMA-GER-1426-24-300x227.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/JEMA-GER-1426-24.jpg 650w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: gstudioimagen1\/Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-438fc26e elementor-widget elementor-widget-html\" data-id=\"438fc26e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c141a98 e-con-full e-flex e-con e-child\" data-id=\"c141a98\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79605210 elementor-widget elementor-widget-wp-widget-text\" data-id=\"79605210\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar: Monday 29 July 2024 at 07:00 CET<br \/>\n<strong>Helping keep European SMEs CYBERSafe!<\/strong><\/p>\n<p><strong>CYBER INSIGHTS: The Latest <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;sca_esv=350977eb0947f7bf&amp;sxsrf=ACQVn0-rYmAEbInLOanb9VZn4-wiMXumXw%3A1709712339874&amp;source=hp&amp;ei=0yPoZbGhM_GakdUPj-G_oAM&amp;iflsig=ANes7DEAAAAAZegx4zIh63qA8kSg92IhC_JF7xz151s1&amp;oq=sme+cyber&amp;gs_lp=Egdnd3Mtd2l6IglzbWUgY3liZXIqAggBMgQQIxgnMgQQIxgnMgQQIxgnMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgYQABgWGB5IzCdQAFjlDXAAeACQAQCYAZ8CoAGgDaoBBTAuNS40uAEDyAEA-AEBmAIJoALSDsICChAjGIAEGIoFGCfCAgsQABiABBiKBRiRAsICCxAuGIAEGMcBGNEDwgIKEAAYgAQYigUYQ8ICBRAuGIAEwgIKEAAYgAQYFBiHApgDAJIHBzAuNS4zLjGgB7BS&amp;sclient=gws-wiz#ip=1\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News <\/a><\/strong><strong>&amp; Intelligence &#8230;<\/strong><br \/>\nWritten &amp; Curated By\u00a0<a href=\"https:\/\/www.google.com\/search?q=cybersecurity+journalist&amp;oq=Cybersec&amp;gs_lcrp=EgZjaHJvbWUqCQgAEEUYOxiABDIJCAAQRRg7GIAEMgYIARBFGDsyBwgCEAAYgAQyBggDEEUYQDIGCAQQRRg5MgcIBRAAGIAEMgcIBhAAGIAEMgcIBxAAGIAE0gEJMzc1MmowajE1qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser \u2013 Cybersecurity Journalist<\/a><br \/>\nvia <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;client=opera&amp;hs=QsT&amp;sca_esv=cd08aac0b4846c63&amp;sxsrf=ADLYWIIaZwnvuQfvJpPCaga2UcqJmvux4A%3A1719554579183&amp;ei=E1J-Zu30Cqbpi-gPva6Q6A8&amp;ved=0ahUKEwityvT-z_2GAxWm9AIHHT0XBP0Q4dUDCBA&amp;uact=5&amp;oq=sme+cybersecurity+news&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiFnNtZSBjeWJlcnNlY3VyaXR5IG5ld3MyBBAjGCcyBBAjGCcyBhAAGBYYHjILEAAYgAQYhgMYigUyCxAAGIAEGIYDGIoFMgsQABiABBiGAxiKBTIIEAAYgAQYogRI0hpQuwdYtBJwAXgBkAEAmAHBAaABkAiqAQMwLja4AQPIAQD4AQGYAgagApcHwgIHECMYsAMYJ8ICChAAGLADGNYEGEfCAgUQABiABJgDAIgGAZAGCZIHBTEuNC4xoAerMw&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">First for SME Cybersecurity News<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=today%27s+sme+cyber+insights&amp;sca_esv=600dabd129a0d515&amp;sca_upv=1&amp;sxsrf=ADLYWIKPlX0yCocvzBH9dJoUGpY8_x5yBw%3A1722335203042&amp;ei=47-oZoeFAtKJ7NYP46mtyAk&amp;ved=0ahUKEwjHgtjPxs6HAxXSBNsEHeNUC5kQ4dUDCBA&amp;uact=5&amp;oq=today%27s+sme+cyber+insights&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiGnRvZGF5J3Mgc21lIGN5YmVyIGluc2lnaHRzMgQQIxgnMggQABiABBiiBDIIEAAYgAQYogQyCBAAGIAEGKIEMggQABiABBiiBEj-IlDMCFjFGnABeAGQAQGYAeEDoAH2DqoBCTAuNC4zLjAuMbgBA8gBAPgBAZgCB6ACjQrCAgcQIxiwAxgnwgIKEAAYsAMY1gQYR8ICBxAjGLACGCfCAgsQABiABBiGAxiKBZgDAIgGAZAGCpIHBTEuMi40oAeVMQ&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 290724 at 07:45 CET<\/a><\/p>\n<p><strong>Welcome to Today&#8217;s Edition of CYBERInsights <\/strong>&#8211; <strong>My Daily Roundup of the Latest European <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;sca_esv=350977eb0947f7bf&amp;sxsrf=ACQVn0-rYmAEbInLOanb9VZn4-wiMXumXw%3A1709712339874&amp;source=hp&amp;ei=0yPoZbGhM_GakdUPj-G_oAM&amp;iflsig=ANes7DEAAAAAZegx4zIh63qA8kSg92IhC_JF7xz151s1&amp;oq=sme+cyber&amp;gs_lp=Egdnd3Mtd2l6IglzbWUgY3liZXIqAggBMgQQIxgnMgQQIxgnMgQQIxgnMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgYQABgWGB5IzCdQAFjlDXAAeACQAQCYAZ8CoAGgDaoBBTAuNS40uAEDyAEA-AEBmAIJoALSDsICChAjGIAEGIoFGCfCAgsQABiABBiKBRiRAsICCxAuGIAEGMcBGNEDwgIKEAAYgAQYigUYQ8ICBRAuGIAEwgIKEAAYgAQYFBiHApgDAJIHBzAuNS4zLjGgB7BS&amp;sclient=gws-wiz#ip=1\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News<\/a> including: 1). Don\u2019t Let GoDaddy Shatter Your Entrepreneurial Dreams\u00a0 2). Unseen Threats to Supply Chain \u00a03). AI Explained<\/strong><\/p>\n<p><em>#CyberInsights <\/em><em>#SMECybersecurity\u00a0 #Cybersecurity #ThreatIntel #GoDaddy\u00a0 #CyberAwareness\u00a0 #SupplyChain #AI<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1abb12a2 e-con-full e-flex e-con e-child\" data-id=\"1abb12a2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-563ba64b elementor-widget elementor-widget-wp-widget-text\" data-id=\"563ba64b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>1). THREAT INTEL: Don\u2019t Let GoDaddy Shatter Your Entrepreneurial Dreams \u2013 My $4000 Lesson. <\/strong>Grab a cup of coffee because I\u2019m about to take you on a wild ride through my recent experience with <strong>GoDaddy<\/strong>, which left me $4000 poorer and made me question everything I thought I knew about customer service. It all started with a simple dream: to launch my own SaaS tool with a brandable <strong>\u201c.ing\u201d<\/strong> domain name. I thought I had struck gold when I found <strong>\u201cTrad.ing\u201d<\/strong> available for pre-registration on\u00a0<a href=\"https:\/\/www.godaddy.com\/en-uk\" target=\"_blank\" rel=\"noopener\"><strong>GoDaddy<\/strong><\/a>.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52b29ad9 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"52b29ad9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/07\/16\/go-daddy\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3245613f elementor-widget elementor-widget-wp-widget-text\" data-id=\"3245613f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>2).\u00a0<\/strong><strong>CYBER AWARENESS: Unseen Threats \u2013 Potential for Supply Chain Compromise.<\/strong>\u00a0If attackers gain unauthorised access to critical financial data and systems within a financial institution\u2019s network, they could potentially exploit these footholds to escalate attacks further up the\u00a0<strong>Supply Chain<\/strong>. In the case of the Federal Reserve, although not directly breached in this instance, the interconnected nature of financial institutions raises concerns about broader systemic vulnerabilities.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-541fa299 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"541fa299\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/06\/28\/unseen-threats\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35ab3acc elementor-widget elementor-widget-wp-widget-text\" data-id=\"35ab3acc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>3). WHAT IS\u00a0<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-ai-artificial-intelligence\/\" target=\"_blank\" rel=\"noopener\">AI<\/a>? A COMPREHENSIVE GUIDE TO AI AND ITS IMPACT\u00a0? \u2013 CyberKPI:\u00a0<\/strong>An in-depth exploration of\u00a0<strong><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-ai-artificial-intelligence\/\" target=\"_blank\" rel=\"noopener\">Artificial Intelligence<\/a>,\u00a0<\/strong>covering its types, the role of machine learning and deep learning, practical applications, its intersection with cybersecurity, governance and ethical considerations, and its future impact on society. AI plays a crucial role in transforming cybersecurity defences by enhancing data protection and threat detection capabilities.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d0c32d6 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6d0c32d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-ai-artificial-intelligence\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41f43f00 elementor-widget elementor-widget-wp-widget-text\" data-id=\"41f43f00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>ABOUT IAIN FRASER \u2013<\/strong> I am a Gibraltar based, Accredited Journalist, (*NUJ, IFJ &amp; ONA) Authority Writer,\u00a0 Commentator &amp; Publisher of <a href=\"https:\/\/cyberinsights.iainfraser.net\" target=\"_blank\" rel=\"noopener\"><strong>CYBERinsights<\/strong><\/a> and cover all aspects of <strong>Cybersecurity<\/strong> [Awareness, Threat Management, Best Practice Compliance &amp; Mitigation] and report throughout Europe &amp; the UK<\/p>\n<p>In addition to <strong>Cybersecurity<\/strong>, I also cover the sectors where I have either operational experience or subject matter expert knowledge including: <strong>Geopolitics, Defence Technology, AI &amp; National Security<\/strong> and contribute to a broad range of European facing news channels, blogs and digital magazines as either Guest Feature Writer, Columnist or Consultant Editor.<\/p>\n<p>LinkedIn Bio: <a href=\"https:\/\/www.linkedin.com\/in\/iainfraserjournalist\/\" target=\"_blank\" rel=\"noopener\">IainFraserJournalist<\/a><br \/>\nEmail: <a href=\"mailto:iain@iainfraser.net\">iain@iainfraser.net<\/a> | <a href=\"http:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">www.iainfraser.net<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: gstudioimagen1\/Freepik Learn More \/&#8230; Learn More \/&#8230; Learn More \/&#8230;<\/p>\n","protected":false},"author":2,"featured_media":11733,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[14],"tags":[419],"ppma_author":[415],"class_list":["post-11730","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberinsights","tag-cyberinsights"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/JEMA-GER-1426-24.jpg",650,492,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/JEMA-GER-1426-24-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/JEMA-GER-1426-24-300x227.jpg",300,227,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/JEMA-GER-1426-24.jpg",640,484,false],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/JEMA-GER-1426-24.jpg",640,484,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/JEMA-GER-1426-24.jpg",650,492,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/JEMA-GER-1426-24.jpg",650,492,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/JEMA-GER-1426-24.jpg",650,492,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/JEMA-GER-1426-24-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist - Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" rel=\"category tag\">SMECYBERIINSIGHTS<\/a>","tag_info":"SMECYBERIINSIGHTS","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=11730"}],"version-history":[{"count":9,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11730\/revisions"}],"predecessor-version":[{"id":12140,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11730\/revisions\/12140"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/11733"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=11730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=11730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=11730"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=11730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}