{"id":12324,"date":"2024-08-16T06:00:05","date_gmt":"2024-08-16T04:00:05","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=12324"},"modified":"2024-11-21T13:45:06","modified_gmt":"2024-11-21T12:45:06","slug":"cyberinsights-for-160824","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/08\/16\/cyberinsights-for-160824\/","title":{"rendered":"CYBER INSIGHTS: Friday 16 August 2024 \u2013 Today\u2019s SME Cybersecurity News &#038; Intelligence"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12324\" class=\"elementor elementor-12324\">\n\t\t\t\t<div class=\"elementor-element elementor-element-371d3f0c e-flex e-con-boxed e-con e-parent\" data-id=\"371d3f0c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-23d119d9 elementor-widget elementor-widget-html\" data-id=\"23d119d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-244efa45 e-con-full e-flex e-con e-parent\" data-id=\"244efa45\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f1f880f e-con-full e-flex e-con e-child\" data-id=\"f1f880f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-73ad1687 elementor-widget elementor-widget-image\" data-id=\"73ad1687\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"206\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Data-Protection-CyberInsurance-300x206.jpg\" class=\"attachment-medium size-medium wp-image-12327\" alt=\"Data Protection CyberInsurance Image Credit: rawpixel.com\/Freepik\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Data-Protection-CyberInsurance-300x206.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Data-Protection-CyberInsurance.jpg 740w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: rawpixel.com\/Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1aa2ce64 elementor-widget elementor-widget-html\" data-id=\"1aa2ce64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4332f83a e-con-full e-flex e-con e-child\" data-id=\"4332f83a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-64718a2b elementor-widget elementor-widget-wp-widget-text\" data-id=\"64718a2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Helping keep European SMEs CYBERSafe!<br \/>\n<\/strong>Gibraltar: Friday 16 August 2024 at 07:00 CET<\/p>\n<p><strong>CYBER INSIGHTS: The Latest <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;sca_esv=350977eb0947f7bf&amp;sxsrf=ACQVn0-rYmAEbInLOanb9VZn4-wiMXumXw%3A1709712339874&amp;source=hp&amp;ei=0yPoZbGhM_GakdUPj-G_oAM&amp;iflsig=ANes7DEAAAAAZegx4zIh63qA8kSg92IhC_JF7xz151s1&amp;oq=sme+cyber&amp;gs_lp=Egdnd3Mtd2l6IglzbWUgY3liZXIqAggBMgQQIxgnMgQQIxgnMgQQIxgnMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgYQABgWGB5IzCdQAFjlDXAAeACQAQCYAZ8CoAGgDaoBBTAuNS40uAEDyAEA-AEBmAIJoALSDsICChAjGIAEGIoFGCfCAgsQABiABBiKBRiRAsICCxAuGIAEGMcBGNEDwgIKEAAYgAQYigUYQ8ICBRAuGIAEwgIKEAAYgAQYFBiHApgDAJIHBzAuNS4zLjGgB7BS&amp;sclient=gws-wiz#ip=1\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News <\/a><\/strong><strong>&amp; Intelligence &#8230;<\/strong><br \/>\nWritten &amp; Curated By\u00a0<a href=\"https:\/\/www.google.com\/search?q=cybersecurity+journalist&amp;oq=Cybersec&amp;gs_lcrp=EgZjaHJvbWUqCQgAEEUYOxiABDIJCAAQRRg7GIAEMgYIARBFGDsyBwgCEAAYgAQyBggDEEUYQDIGCAQQRRg5MgcIBRAAGIAEMgcIBhAAGIAEMgcIBxAAGIAE0gEJMzc1MmowajE1qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser \u2013 Cybersecurity Journalist<\/a><br \/>\nvia <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;client=opera&amp;hs=QsT&amp;sca_esv=cd08aac0b4846c63&amp;sxsrf=ADLYWIIaZwnvuQfvJpPCaga2UcqJmvux4A%3A1719554579183&amp;ei=E1J-Zu30Cqbpi-gPva6Q6A8&amp;ved=0ahUKEwityvT-z_2GAxWm9AIHHT0XBP0Q4dUDCBA&amp;uact=5&amp;oq=sme+cybersecurity+news&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiFnNtZSBjeWJlcnNlY3VyaXR5IG5ld3MyBBAjGCcyBBAjGCcyBhAAGBYYHjILEAAYgAQYhgMYigUyCxAAGIAEGIYDGIoFMgsQABiABBiGAxiKBTIIEAAYgAQYogRI0hpQuwdYtBJwAXgBkAEAmAHBAaABkAiqAQMwLja4AQPIAQD4AQGYAgagApcHwgIHECMYsAMYJ8ICChAAGLADGNYEGEfCAgUQABiABJgDAIgGAZAGCZIHBTEuNC4xoAerMw&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">First for SME Cybersecurity News<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=today%27s+sme+cyber+news&amp;oq=&amp;gs_lcrp=EgZjaHJvbWUqCQgBECMYJxjqAjIJCAAQIxgnGOoCMgkIARAjGCcY6gIyDwgCEC4YJxivARjHARjqAjIJCAMQIxgnGOoCMgkIBBAjGCcY6gIyCQgFECMYJxjqAjIJCAYQLhgnGOoCMgkIBxAjGCcY6gLSAQkyMzA0ajBqMTWoAgiwAgE&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Google Indexed on 300824 at 08:05 CET<\/a><\/p>\n<p><strong>Welcome to Today&#8217;s Edition of CYBERInsights <\/strong>&#8211; <strong>My Daily Roundup of the Latest European <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;sca_esv=350977eb0947f7bf&amp;sxsrf=ACQVn0-rYmAEbInLOanb9VZn4-wiMXumXw%3A1709712339874&amp;source=hp&amp;ei=0yPoZbGhM_GakdUPj-G_oAM&amp;iflsig=ANes7DEAAAAAZegx4zIh63qA8kSg92IhC_JF7xz151s1&amp;oq=sme+cyber&amp;gs_lp=Egdnd3Mtd2l6IglzbWUgY3liZXIqAggBMgQQIxgnMgQQIxgnMgQQIxgnMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgYQABgWGB5IzCdQAFjlDXAAeACQAQCYAZ8CoAGgDaoBBTAuNS40uAEDyAEA-AEBmAIJoALSDsICChAjGIAEGIoFGCfCAgsQABiABBiKBRiRAsICCxAuGIAEGMcBGNEDwgIKEAAYgAQYigUYQ8ICBRAuGIAEwgIKEAAYgAQYFBiHApgDAJIHBzAuNS4zLjGgB7BS&amp;sclient=gws-wiz#ip=1\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News<\/a> including: 1). Take Cover for Cybersecurity 2). NIS2 Directive\u00a0 3). Cyber Insurance Explained<\/strong><\/p>\n<p><em>#CyberInsights <\/em><em>#SMECyberNews\u00a0 #Cybersecurity #SMECybersecurity #InsuranceCover #NIS2Directive\u00a0 #CyberInsurance<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-310ddc18 e-con-full e-flex e-con e-child\" data-id=\"310ddc18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45d9c5fd elementor-widget elementor-widget-wp-widget-text\" data-id=\"45d9c5fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>1).\u00a0<\/strong><strong>CYBERSECURITY INSURANCE: TAKE COVER<\/strong> &#8211; The global <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-cyber-insurance\/\" target=\"_blank\" rel=\"noopener\"><strong>Cyber Insurance<\/strong><\/a> Market size was valued at 11.82bn Euros (USD 12.94bn) in 2022 and is poised to grow from 14.80 (USD 16.21bn) in 2023 to 91.90bn Euros (USD 100.62bn by 2031, growing at a CAGR of 25.70% in the forecast period (2024-2031). According to a new report by <strong>SkyQuest<\/strong>, Cyber Insurance is becoming more popular, as the main source of safeguard insurance holders financially, as they insure against cyber-attacks such as identity theft, phishing, email etc&#8230;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29459f46 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"29459f46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.skyquestt.com\/report\/cyber-insurance-market\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c68cf4e elementor-widget elementor-widget-wp-widget-text\" data-id=\"2c68cf4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>2).\u00a0<\/strong><strong>\u00a0<\/strong><strong>COMPLIANCE: Understanding the NIS2 Directive<\/strong>\u00a0\u2013 While primarily aimed at\u00a0<strong>EU<\/strong>\u00a0Member States, non-<strong>EU<\/strong>\u00a0companies operating within the\u00a0<strong>EU<\/strong>\u00a0or providing services to\u00a0<strong>EU<\/strong>\u00a0registered firms also need to comply with the directive. As we approach the October 2024 deadline for\u00a0<strong>EU<\/strong>\u00a0Member States to enact the\u00a0<strong>NIS 2 Directive<\/strong>, organizations that do business in Europe must prepare for the significant changes it brings to cybersecurity compliance\u2026<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71296f9f elementor-align-center elementor-widget elementor-widget-button\" data-id=\"71296f9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5022a586 elementor-widget elementor-widget-wp-widget-text\" data-id=\"5022a586\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>3).\u00a0<\/strong><strong>WHAT IS CYBER INSURANCE &amp; Learn if Your SME SHOULD have Cyber Insurance?\u00a0<\/strong>Understanding if you need\u00a0<strong>Cyber Insurance<\/strong>\u00a0 and if it is essential for all\u00a0<strong><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-an-sme\/\" target=\"_blank\" rel=\"noopener\">SMEs<\/a>. Download the CYBERInsights Guide to Cyber Insurance<\/strong>: A Comprehensive KPI to help you understand\u00a0<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-cyber-insurance\/\" target=\"_blank\" rel=\"noopener\"><strong>Cyber Insurance<\/strong><\/a>, its definition, and how to respond to attacks, with a focus on the importance of proactive measures and preparedness. Learn exactly why your\u00a0<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SME<\/strong><\/a>\u00a0should take out\u00a0<strong><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-cyber-insurance\/\" target=\"_blank\" rel=\"noopener\">Cyber Insurance<\/a>\u2026<\/strong><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-544c9816 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"544c9816\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-cyber-insurance\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6895ece4 e-flex e-con-boxed e-con e-parent\" data-id=\"6895ece4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-53ccca57 e-con-full e-flex e-con e-child\" data-id=\"53ccca57\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-545636de elementor-widget elementor-widget-image\" data-id=\"545636de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"400\" height=\"265\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/04\/IF_Kenya_Cropped.png\" class=\"attachment-large size-large wp-image-6370\" alt=\"Nairobi National Park Nairobi, Kenya IainFraser\u00a91996\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/04\/IF_Kenya_Cropped.png 400w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/04\/IF_Kenya_Cropped-300x199.png 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-602167a9 e-con-full e-flex e-con e-child\" data-id=\"602167a9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c235910 elementor-widget elementor-widget-wp-widget-text\" data-id=\"c235910\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>ABOUT IAIN FRASER \u2013<\/strong> I am a Gibraltar based, Accredited Journalist, (*NUJ, IFJ &amp; ONA) Authority Writer,\u00a0 Commentator &amp; Publisher of <a href=\"https:\/\/cyberinsights.iainfraser.net\" target=\"_blank\" rel=\"noopener\"><strong>CYBERinsights<\/strong><\/a> and cover all aspects of <strong>Cybersecurity<\/strong> [Awareness, Threat Management, Best Practice Compliance &amp; Mitigation] and report throughout Europe &amp; the UK<\/p>\n<p>LinkedIn Bio: <a href=\"https:\/\/www.linkedin.com\/in\/iainfraserjournalist\/\" target=\"_blank\" rel=\"noopener\">IainFraserJournalist<\/a><br \/>\nEmail: <a href=\"mailto:iain@iainfraser.net\">iain@iainfraser.net<\/a> | <a href=\"http:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">www.iainfraser.net<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: rawpixel.com\/Freepik Learn More \/&#8230; Learn More \/&#8230; Learn More \/&#8230;<\/p>\n","protected":false},"author":2,"featured_media":12327,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[14],"tags":[419],"ppma_author":[415],"class_list":["post-12324","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberinsights","tag-cyberinsights"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Data-Protection-CyberInsurance.jpg",740,509,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Data-Protection-CyberInsurance-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Data-Protection-CyberInsurance-300x206.jpg",300,206,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Data-Protection-CyberInsurance.jpg",640,440,false],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Data-Protection-CyberInsurance.jpg",640,440,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Data-Protection-CyberInsurance.jpg",740,509,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Data-Protection-CyberInsurance.jpg",740,509,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Data-Protection-CyberInsurance.jpg",740,509,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Data-Protection-CyberInsurance-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist - Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" rel=\"category tag\">SMECYBERIINSIGHTS<\/a>","tag_info":"SMECYBERIINSIGHTS","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/12324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=12324"}],"version-history":[{"count":9,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/12324\/revisions"}],"predecessor-version":[{"id":12588,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/12324\/revisions\/12588"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/12327"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=12324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=12324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=12324"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=12324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}