{"id":13480,"date":"2024-09-11T12:00:03","date_gmt":"2024-09-11T10:00:03","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=13480"},"modified":"2024-11-21T13:41:58","modified_gmt":"2024-11-21T12:41:58","slug":"spam-detection","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/09\/11\/spam-detection\/","title":{"rendered":"EMAIL: SPAM DETECTION \u2013 Study reveals top most dangerous and recurring words used in Scam emails."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13480\" class=\"elementor elementor-13480\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b1672a e-flex e-con-boxed e-con e-parent\" data-id=\"11b1672a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-424af368 elementor-widget elementor-widget-html\" data-id=\"424af368\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eee5ee2 e-con-full e-flex e-con e-parent\" data-id=\"eee5ee2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-280d375e e-con-full e-flex e-con e-child\" data-id=\"280d375e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63ee88ec elementor-widget elementor-widget-image\" data-id=\"63ee88ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/pixabay.com\/users\/geralt-9301\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"329\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image_GerdAltmann_Email_Pixabay-1024x526.jpg\" class=\"attachment-large size-large wp-image-13483\" alt=\"Image Credit: Image Credit: Gerd Altmann\/Pixabay https:\/\/pixabay.com\/users\/geralt-9301\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image_GerdAltmann_Email_Pixabay-1024x526.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image_GerdAltmann_Email_Pixabay-300x154.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image_GerdAltmann_Email_Pixabay-768x395.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image_GerdAltmann_Email_Pixabay.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Gerd Altmann\/Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4970cfbe e-con-full e-flex e-con e-child\" data-id=\"4970cfbe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79a7f74b elementor-widget elementor-widget-html\" data-id=\"79a7f74b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a9fa356 elementor-widget elementor-widget-wp-widget-text\" data-id=\"3a9fa356\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Helping keep European SMEs CYBERSafe!<br \/>\n<\/strong>Gibraltar: Wednesday\u00a0 11 September 2024 at 12:00 CEST<\/p>\n<p><b>EMAIL: SPAM DETECTION \u2013 Study reveals\u00a0<strong>top most dangerous<\/strong>\u00a0and\u00a0<strong>recurring words<\/strong>\u00a0used in\u00a0<strong>Scam emails<\/strong><\/b><br \/>\nSyndicated via\u00a0 <a href=\"https:\/\/docs.google.com\/presentation\/d\/1hoiW_cE9plS9lNkFSCGpmEvNrTC7SC1Da_0yrrdkfJM\/pub?start=true&amp;loop=false&amp;delayms=5000\" target=\"_blank\" rel=\"noopener\">CYBERInsights\/CyberVoice<\/a><br \/>\nFirst for\u00a0<a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=sme+cyber+pr&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity\u00a0 PR<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=EMAIL%3A+SPAM+DETECTION+%E2%80%93+Study+reveals+top+most+dangerous+and+recurring+words+used+in+Scam+emails.&amp;oq=EMAIL%3A+SPAM+DETECTION+%E2%80%93+Study+reveals+top+most+dangerous+and+recurring+words+used+in+Scam+emails.&amp;gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIGCAEQRRg6MgYIAhBFGDwyBggDEEUYPDIGCAQQRRg80gEJMjI2OWowajE1qAIIsAIB&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Google Indexed on 110924 at 13:00 CET<\/a><em><br \/>\n#CyberInsights #SMECyberNews\u00a0<\/em><em>#SMECyberPR<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-516142f5 e-flex e-con-boxed e-con e-parent\" data-id=\"516142f5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b93034a e-con-full e-flex e-con e-child\" data-id=\"b93034a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1cc9a199 elementor-widget elementor-widget-html\" data-id=\"1cc9a199\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-636ddf44 e-con-full e-flex e-con e-child\" data-id=\"636ddf44\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-47967623 elementor-widget elementor-widget-wp-widget-text\" data-id=\"47967623\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>&#8220;Money&#8221;<\/strong>\u00a0is\u00a0the most dangerous word, topping the chart with a\u00a0high infection\/damage rate (83.56%)and having\u00a0the second-highest appearance frequency and CTR<strong>.<\/strong><\/p>\n<p>The word <strong>&#8220;free&#8221;<\/strong>\u00a0appears\u00a0most frequently (2,266 times)but has\u00a0the lowest CTR (0.56%)<strong>,<\/strong>\u00a0indicating it is\u00a0often seen but rarely clicked.<\/p>\n<p>The keyword <strong>&#8220;income&#8221;<\/strong>\u00a0has\u00a0the highest CTR at\u00a04.68%\u00a0despite a moderate appearance frequency (267)<strong>.<\/strong>\u00a0This suggests users find &#8220;income&#8221; highly relevant or interesting.<\/p>\n<p>A recent study by<strong>\u00a0<\/strong><a href=\"https:\/\/www.zerobounce.net\/\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.zerobounce.net&amp;source=gmail&amp;ust=1726133082810000&amp;usg=AOvVaw3YRoKZGZ8NyjMoebg3NdvY\" target=\"_blank\" rel=\"noopener\"><strong>ZeroBounce<\/strong><\/a>\u00a0analyzed\u00a0email datasets for spam detection to detect the top most dangerous\u00a0and\u00a0recurring words\u00a0used in\u00a0<strong>scam emails<\/strong>. The list was compiled by feeding the large-scale email datasets into machine learning models to identify patterns and trends.\u00a0A weighted score\u00a0was calculated considering\u00a0the appearance frequency\u00a0of the word, the\u00a0click-through rate (CTR)<strong>,\u00a0<\/strong>and the\u00a0infection\/damage rate.<\/p>\n<p><strong>&#8220;Money&#8221;<\/strong>\u00a0ranks first on\u00a0<strong>the list of the most dangerous words frequently appearing in emails,<\/strong>\u00a0with a\u00a0<strong>CTR of 4.56%.<\/strong>\u00a0It has\u00a0<strong>the second-highest infection\/damage (83.56%)<\/strong>, suggesting it is both popular and risky.<\/p>\n<p>The\u00a0<strong>second<\/strong>\u00a0on the list is\u00a0<strong>&#8220;Investment,&#8221;<\/strong>\u00a0with a relatively<strong>\u00a0low rate of appearances (226)\u00a0<\/strong>and a\u00a0<strong>high CTR of 4.59%.\u00a0<\/strong>Interestingly, it has\u00a0<strong>the highest infection\/damage\u00a0rate at 89.64%<\/strong>, making it the most dangerous term on the list.<\/p>\n<p><strong>&#8220;Credit&#8221;\u00a0<\/strong>holds the\u00a0<strong>third<\/strong>\u00a0position, appearing\u00a0<strong>726 times<\/strong>, which is a relatively high frequency. Its\u00a0<strong>CTR is slightly lower at 4.22%<\/strong>, with a\u00a0<strong>moderate infection\/damage rate of 50.52%.\u00a0<\/strong><\/p>\n<p>In\u00a0<strong>fourth<\/strong>\u00a0place,\u00a0<strong>&#8220;billion&#8221;<\/strong>\u00a0appears\u00a0<strong>107 times<\/strong>\u00a0with a\u00a0<strong>CTR of 3.97%<\/strong>. It has an\u00a0<strong>infection\/damage rate of 71.93%<\/strong>, which is\u00a0<strong>the third highest\u00a0<\/strong>among the terms. Compared to &#8220;investment&#8221; and &#8220;credit,&#8221; &#8220;billion&#8221; is less frequently seen but has a similar level of risk, suggesting a potential cautionary interest from users.<\/p>\n<p><strong>&#8220;Free&#8221;<\/strong>\u00a0is ranked\u00a0<strong>fifth<\/strong>\u00a0and stands out with\u00a0<strong>the highest appearance frequency (2,266)<\/strong>\u00a0but<strong>\u00a0the lowest CTR (0.56%).\u00a0<\/strong>Unlike &#8220;money&#8221; and &#8220;investment,&#8221; which have high engagement, &#8220;free&#8221; seems to be widely ignored, likely due to user scepticism.<\/p>\n<p><strong>&#8220;Loan,&#8221;<\/strong>\u00a0in<strong>\u00a0sixth<\/strong>\u00a0place, appears\u00a0<strong>176 times<\/strong>\u00a0and has a\u00a0<strong>CTR of 4.31%<\/strong>. Compared to &#8220;free,&#8221; &#8220;loan&#8221; has a higher CTR and more moderate risk, indicating it is more trusted or relevant to users.<\/p>\n<p><strong>&#8220;Debt&#8221;<\/strong>\u00a0is in\u00a0<strong>seventh\u00a0<\/strong>place, with\u00a0<strong>194 appearances,<\/strong>\u00a0a\u00a0<strong>CTR of 3.73%<\/strong>, and an\u00a0<strong>infection\/damage rate of 60.61%.<\/strong>\u00a0This suggests that while &#8220;debt&#8221; has moderate risk and engagement, it doesn&#8217;t attract as much user attention as higher-ranking terms.<\/p>\n<p><strong>&#8220;Cash&#8221;<\/strong>\u00a0ranks\u00a0<strong>eighth<\/strong>\u00a0with\u00a0<strong>321 appearances,<\/strong>\u00a0a\u00a0<strong>CTR of 3.93%<\/strong>, and an\u00a0<strong>infection\/damage rate of 52.66%,<\/strong>\u00a0placing &#8220;cash&#8221; in a relatively safer category.<\/p>\n<p><strong>&#8220;Cost&#8221;\u00a0<\/strong>is\u00a0<strong>ninth<\/strong>, with\u00a0<strong>the second-lowest infection\/damage rate of 43.33%.<\/strong>\u00a0Compared to terms like &#8220;investment&#8221; and &#8220;money,&#8221; &#8220;cost&#8221; is relatively safe and moderately engaging, indicating that users find it less risky.<\/p>\n<p><strong>&#8220;Income&#8221;\u00a0<\/strong>is at the bottom of the list, ranked\u00a0<strong>tenth<\/strong>, but it has\u00a0<strong>the highest CTR at 4.68%<\/strong>\u00a0and\u00a0<strong>the lowest infection\/damage rate at 32.26%.\u00a0<\/strong><\/p>\n<p>CEO of<strong>\u00a0<\/strong><a href=\"https:\/\/www.zerobounce.net\/\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.zerobounce.net&amp;source=gmail&amp;ust=1726133082810000&amp;usg=AOvVaw3YRoKZGZ8NyjMoebg3NdvY\"><strong>ZeroBounce<\/strong><\/a>, Liviu Tanase, comments on the study: &#8220;Every day, scammers are becoming more sophisticated in the increasingly digital world. They often use words like &#8216;money&#8217; or &#8216;important&#8217; to grab your attention and create a false sense of urgency or opportunity, making it easier for people to let their guard down. It\u2019s important to identify these red flags and not take things at face value to avoid these dangerous schemes.&#8221;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-599ad443 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"599ad443\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.zerobounce.net\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1dc2524d e-flex e-con-boxed e-con e-parent\" data-id=\"1dc2524d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-786b0dc e-con-full e-flex e-con e-child\" data-id=\"786b0dc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2c2572cc elementor-widget elementor-widget-image\" data-id=\"2c2572cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&#038;offerid=572706.44&#038;subid=0&#038;type=4\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"144\" height=\"144\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Nord_logo_1.png\" class=\"attachment-2048x2048 size-2048x2048 wp-image-12867\" alt=\"NordVPN\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b3e63c7 e-con-full e-flex e-con e-child\" data-id=\"b3e63c7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3dab13f9 elementor-widget elementor-widget-wp-widget-text\" data-id=\"3dab13f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>What is a VPN &amp; Does my SME Need one?<\/strong> A VPN is a Virtual Private Network a method of securing your communications credentials. When it comes to Small and Medium-sized enterprises (SMEs), the choice of VPNs can significantly impact the security and efficiency of their operations.<\/p>\n<p>The\u00a0<b>NordVPN<\/b> service allows you to connect to 5600+ servers in 60+ countries. It secures your Internet data with military-grade encryption, ensures your web activity remains private and helps bypass geographic content restrictions online. <strong>\u00a0<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.44&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\">Join\u00a0NordVPN\u00a0Today and\u00a0Save\u00a0up to\u00a073%\u00a0and Get 3 months\u00a0Extra Free<\/a> &#8211; Rude Not to \u2026!<\/strong><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e62f6c0 e-flex e-con-boxed e-con e-parent\" data-id=\"5e62f6c0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5d4ba9fe e-con-full e-flex e-con e-child\" data-id=\"5d4ba9fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-670f5961 elementor-widget elementor-widget-image\" data-id=\"670f5961\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/smartmockups_ltgx5ml3-300x200.jpg\" class=\"attachment-medium size-medium wp-image-13007\" alt=\"SME Cybersecurity\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/smartmockups_ltgx5ml3-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/smartmockups_ltgx5ml3-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/smartmockups_ltgx5ml3-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/smartmockups_ltgx5ml3.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-48963ded e-con-full e-flex e-con e-child\" data-id=\"48963ded\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-80dd5cc elementor-widget elementor-widget-html\" data-id=\"80dd5cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f84dea8 elementor-widget elementor-widget-wp-widget-text\" data-id=\"3f84dea8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>ABOUT CYBER VOICE | SME CYBER PR<\/strong><\/p>\n<p><strong>CYBERVoice<\/strong> provides direct, immediate, highly cost-effective access to our Proprietary Subscriber base* of 132,000*+ Named &amp; Profiled (PECR, GDPR &amp; DKIM Compliant) Owners, Partners &amp; Directors of SMEs throughout Europe &amp; the UK.<\/p>\n<p>CYBERVoice is available with varying User Options from Single Release to bi-Annual &amp; Unlimited Annual Campaigns available all delivering outstanding ROI! <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/cyber-voice-syndicate-now\/\" target=\"_blank\" rel=\"noopener\">Post Your First Release FREE!<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c7b4cfe elementor-align-center elementor-widget elementor-widget-button\" data-id=\"4c7b4cfe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/docs.google.com\/presentation\/d\/1hoiW_cE9plS9lNkFSCGpmEvNrTC7SC1Da_0yrrdkfJM\/pub?start=true&#038;loop=false&#038;delayms=5000\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: Gerd Altmann\/Pixabay Learn More \/&#8230; Image Credit: IfOnlyCommunications Learn More \/&#8230;<\/p>\n","protected":false},"author":1,"featured_media":13483,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[36],"tags":[477],"ppma_author":[415],"class_list":["post-13480","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-prchannel","tag-cybervoice"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image_GerdAltmann_Email_Pixabay.jpg",1280,658,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image_GerdAltmann_Email_Pixabay-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image_GerdAltmann_Email_Pixabay-300x154.jpg",300,154,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image_GerdAltmann_Email_Pixabay-768x395.jpg",640,329,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image_GerdAltmann_Email_Pixabay-1024x526.jpg",640,329,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image_GerdAltmann_Email_Pixabay.jpg",1280,658,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image_GerdAltmann_Email_Pixabay.jpg",1280,658,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image_GerdAltmann_Email_Pixabay-1024x526.jpg",1024,526,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image_GerdAltmann_Email_Pixabay-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/prchannel\/\" rel=\"category tag\">CYBER VOICE<\/a>","tag_info":"CYBER VOICE","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/13480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=13480"}],"version-history":[{"count":9,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/13480\/revisions"}],"predecessor-version":[{"id":13544,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/13480\/revisions\/13544"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/13483"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=13480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=13480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=13480"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=13480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}