{"id":12025,"date":"2024-07-22T12:16:34","date_gmt":"2024-07-22T10:16:34","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=12025"},"modified":"2024-11-21T13:47:04","modified_gmt":"2024-11-21T12:47:04","slug":"wake-up-call","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/07\/22\/wake-up-call\/","title":{"rendered":"THREAT INTEL: A Wake-Up Call Long Overdue: The Cost of Ignoring Cybersecurity Failures."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12025\" class=\"elementor elementor-12025\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5176a176 e-flex e-con-boxed e-con e-parent\" data-id=\"5176a176\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57c07b91 elementor-widget elementor-widget-html\" data-id=\"57c07b91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-79e1d151 e-con-full e-flex e-con e-parent\" data-id=\"79e1d151\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-71929e06 e-con-full e-flex e-con e-child\" data-id=\"71929e06\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ff1c6ad elementor-widget elementor-widget-image\" data-id=\"7ff1c6ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"225\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_Technpreneur_Flickr-300x225.jpg\" class=\"attachment-medium size-medium wp-image-7773\" alt=\"Image Credit: Techpreneur\/Flickr\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_Technpreneur_Flickr-300x225.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_Technpreneur_Flickr-768x576.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_Technpreneur_Flickr.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image_Technpreneur_Flickr<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3366c032 elementor-widget elementor-widget-html\" data-id=\"3366c032\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a3a34e3 e-con-full e-flex e-con e-child\" data-id=\"1a3a34e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-793a7f5a elementor-widget elementor-widget-wp-widget-text\" data-id=\"793a7f5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Helping keep European SMEs CYBERSafe!<br \/>\n<\/strong>Gibraltar: Monday 22 July 2024 at 12:50 CET<\/p>\n<p><strong>THREAT INTEL: <span class=\"break-words tvm-parent-container\"><span dir=\"ltr\">A Wake-Up Call Long Overdue: The Cost of Ignoring Cybersecurity Failures.<\/span><\/span><\/strong><\/p>\n<p>By Andy Jenkinson \u2013 Guest Contributor |\u00a0 Group CEO\u00a0<a href=\"https:\/\/www.cybersecip.com\/\" target=\"_blank\" rel=\"noopener\">Cybersec Innovation Partners<\/a><br \/>\nvia <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a><br \/>\nFirst for\u00a0<a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=sme+cybersecurity+news&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=A+Wake-Up+Call+Long+Overdue%3A+The+Cost+of+Ignoring+Cybersecurity+Failures.&amp;sca_esv=cc40cfa443a9a9e9&amp;sca_upv=1&amp;sxsrf=ADLYWIKKBBEZ7H1cIsl7YaZWga_loa5q8w%3A1721730927505&amp;ei=b4efZtvBHvX4kdUPoKWpiAQ&amp;ved=0ahUKEwibtdTC-7yHAxV1fKQEHaBSCkEQ4dUDCA8&amp;uact=5&amp;oq=A+Wake-Up+Call+Long+Overdue%3A+The+Cost+of+Ignoring+Cybersecurity+Failures.&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAaAhgBIklBIFdha2UtVXAgQ2FsbCBMb25nIE92ZXJkdWU6IFRoZSBDb3N0IG9mIElnbm9yaW5nIEN5YmVyc2VjdXJpdHkgRmFpbHVyZXMuMgcQIxgnGOoCMgcQIxgnGOoCMgcQIxgnGOoCMgcQIxgnGOoCMgcQIxgnGOoCMgoQIxgnGOoCGIsDMgoQIxgnGOoCGIsDMgoQIxgnGOoCGIsDMgoQIxgnGOoCGIsDMhAQLhijAxgnGKgDGOoCGIsDMhQQABiABBjjBBi0AhjpBBjqAtgBATIUEAAYgAQY4wQYtAIY6QQY6gLYAQEyFBAAGIAEGOMEGLQCGOkEGOoC2AEBMhQQABiABBjjBBi0AhjpBBjqAtgBATIUEAAYgAQY4wQYtAIY6QQY6gLYAQFIhhBQAFjWBHABeAGQAQCYAQCgAQCqAQC4AQPIAQD4AQH4AQKYAgGgAhmoAg-YAxm6BgYIARABGAGSBwExoAcA&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 220724 at 14:00 CET<\/a><\/p>\n<p><em>#CyberInsights #SMECybersecurityNews #Cybersecurity #WhitethornShield #InternetSecurity #DNS #PKI<\/em><\/p>\n<div class=\" mr2\">\n<div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--expanded \">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p><span class=\"break-words tvm-parent-container\"><span dir=\"ltr\"><strong>A Wake-Up Call Long Overdue: The Cost of Ignoring Cybersecurity Failures.<\/strong><\/span><\/span><\/p>\n<p>Last Week&#8217;s global IT outages may not have been as a result of a cyberattack, but the fallout was just as catastrophic.<\/p>\n<p><strong><a id=\"ember6645\" class=\"ember-view\" href=\"https:\/\/www.linkedin.com\/in\/georgekurtz\/\" target=\"_blank\" rel=\"noopener\">George Kurtz<\/a>\u2019s<\/strong> apology for <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/crowdstrike\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">CrowdStrike<\/a>&#8216;s<\/strong> flawed software updates, which crashed millions of Wintel Operating Systems, underscores a glaring oversight in our Quality Control and digital defenses.<\/p>\n<p>Whilst the incident may not have been a hack, it was, and is a colossal security failure and issue. It is one that echoes the infamous <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>SolarWinds<\/strong><\/a> debacle of December 2020.<\/p>\n<p>The similarities do not end there.<\/p>\n<p><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>SolarWinds<\/strong><\/a>, whose subdomains and <strong>DNS<\/strong> servers were exploited provided complete access to <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>SolarWinds<\/strong><\/a> infrastructure due to their insecurity resulting in the largest <strong>Cyberattack<\/strong> in history. Despite warnings and insights we shared with <a id=\"ember6646\" class=\"ember-view\" href=\"https:\/\/www.linkedin.com\/in\/tim-brown-ciso\/\" target=\"_blank\" rel=\"noopener\"><strong>Tim Brown<\/strong><\/a> of <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">SolarWinds<\/a><\/strong> and thereafter with <strong><a id=\"ember6647\" class=\"ember-view\" href=\"https:\/\/www.linkedin.com\/in\/georgekurtz\/\" target=\"_blank\" rel=\"noopener\">George Kurtz<\/a><\/strong> of <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/crowdstrike\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>CrowdStrike<\/strong><\/a>, both companies exhibited a staggering lapse in addressing those vulnerabilities.<\/p>\n<p>On the 14 May 2021 <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">SolarWinds<\/a><\/strong> addressed their <strong>DNS<\/strong>. It wasn\u2019t until nearly two years later on March 11, 2023, that <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/crowdstrike\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">CrowdStrike<\/a><\/strong> finally tackled their insecure <strong>DNS<\/strong> servers\u2014after multiple notifications from us about the exposure.<\/p>\n<p>These incidents reveal a systemic problem: arrogance in the industry, and software vendors\u2019 updates lack rigorous quality control. Clients naively assume updates are secure. It does not matter if it is an <strong>Orion<\/strong> or <strong>Falcon<\/strong>, or any other software for that matter.<\/p>\n<p>Software, like all digital packets, go from A to B and typically require servers to do so. If those servers are compromised, so can the update be.<\/p>\n<p>Both companies\u2019 servers remain on the <strong>DNS blacklist<\/strong>, indicating they\u2019ve been misused for malicious activities. We have continuously informed <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>SolarWinds<\/strong><\/a> and <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/crowdstrike\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">CrowdStrike<\/a><\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67d686e6 elementor-widget elementor-widget-image\" data-id=\"67d686e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"461\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/crowds.jpg\" class=\"attachment-large size-large wp-image-12028\" alt=\"crowds\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/crowds.jpg 675w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/crowds-300x216.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b809810 elementor-widget elementor-widget-wp-widget-text\" data-id=\"4b809810\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--expanded \">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p><span class=\"break-words\n          tvm-parent-container\"><span dir=\"ltr\"><br \/>\nThe rush to register domains like <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/redir\/suspicious-page?url=http%3A%2F%2Fcrowdstrike-bsod%2ecom\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>crowdstrike-bsod.com<\/strong><\/a> and <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/redir\/suspicious-page?url=http%3A%2F%2Fcrowdstrikefix%2ecom\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>crowdstrikefix.com<\/strong><\/a> during the outage signals the danger for exploitation by bad actors preying on user desperation and their intentions to exploit <strong>DNS<\/strong> to redirect users to malicious domains. There is no better way to do this by using compromised, <strong>Blacklisted DNS<\/strong> servers.<\/p>\n<p>Last Week&#8217;s events, along with the massive aftermath, must serve as a clarion call for world leaders, decision-makers, and citizens alike.<\/p>\n<p>The chaos and disruption from these preventable incidents could cost hundreds of billions of dollars, possibly more. It\u2019s time to demand higher standards in <strong>Cybersecurity<\/strong>, prioritize quality control in software updates, and hold companies accountable for their negligence.<\/p>\n<p>Last Week demonstrated that our Digital World literally hangs by a thread. Complacency should no longer be an option.<\/p>\n<p><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cybersec-innovation-partners\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Cybersec Innovation Partners<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/gchq\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">GCHQ<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/national-cyber-security-centre\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">National Cyber Security Centre<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/fbi\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Federal Bureau of Investigation (FBI)<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/fbicyber\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">FBI Cyber Division<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/central-intelligence-agency\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Central Intelligence Agency<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/deptofdefense\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">United States Department of Defense<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/us-department-of-homeland-security\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">U.S. Department of Homeland Security<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/abcnews\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">ABC News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cnn\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">CNN<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cnbc\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">CNBC<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/fox-news-channel\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Fox News Media<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/bbc-news\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">BBC News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/itv-news\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">ITV News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=internetsecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7220336444110766080&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_company_admin%3BjvRb5bk9QJC%2FkmGQaPlphw%3D%3D\" data-test-app-aware-link=\"\" data-ntt-old-href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=internetsecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7220336444110766080\" target=\"_blank\" rel=\"noopener\">InternetSecurity<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=dns&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7220336444110766080\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\">DNS<\/a> <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=pki&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7220336444110766080\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\">PKI<\/a><\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2090752c e-con-full e-flex e-con e-child\" data-id=\"2090752c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ba40f9d elementor-align-center elementor-widget elementor-widget-button\" data-id=\"3ba40f9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b7253e7 elementor-widget elementor-widget-wp-widget-text\" data-id=\"6b7253e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong><span lang=\"en-GB\">About Andy Jenkinson<\/span><\/strong><\/p>\n<p><strong><span lang=\"en-GB\">Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech &amp; Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset &amp; DNS Vulnerabilities.<\/span><\/strong><\/p>\n<p>Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years\u2019 experience as a hands-on lateral thinking CEO, coach, and leader. A \u2018big deal\u2019 business accelerator, and inspirational, lateral thinker, Andy has crafted, created, and been responsible for delivering 100\u2019s \u00a3 millions of projects within the Cyber, Technical, Risk and Compliance markets for some of the world\u2019s largest, leading organisations. Andy has a demonstrable track record of largescale technical delivery and management within many sectors including the Professional, Managed, and Financial Services.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62cc1cad elementor-align-center elementor-widget elementor-widget-button\" data-id=\"62cc1cad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-34ec462f e-flex e-con-boxed e-con e-parent\" data-id=\"34ec462f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image_Technpreneur_Flickr Learn More \/&#8230; Learn More \/&#8230;<\/p>\n","protected":false},"author":2,"featured_media":7773,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"","footnotes":""},"categories":[440],"tags":[439],"ppma_author":[415],"class_list":["post-12025","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberthreat-intel","tag-cyberthreat-intel"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_Technpreneur_Flickr.jpg",800,600,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_Technpreneur_Flickr-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_Technpreneur_Flickr-300x225.jpg",300,225,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_Technpreneur_Flickr-768x576.jpg",640,480,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_Technpreneur_Flickr.jpg",640,480,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_Technpreneur_Flickr.jpg",800,600,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_Technpreneur_Flickr.jpg",800,600,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_Technpreneur_Flickr.jpg",800,600,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_Technpreneur_Flickr-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist - Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" rel=\"category tag\">SME CYBER\/THREAT INTEL<\/a>","tag_info":"SME CYBER\/THREAT INTEL","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/12025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=12025"}],"version-history":[{"count":12,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/12025\/revisions"}],"predecessor-version":[{"id":12074,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/12025\/revisions\/12074"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/7773"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=12025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=12025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=12025"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=12025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}