{"id":13798,"date":"2024-09-18T11:00:30","date_gmt":"2024-09-18T09:00:30","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=13798"},"modified":"2024-11-21T13:41:44","modified_gmt":"2024-11-21T12:41:44","slug":"hybrid-security","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/09\/18\/hybrid-security\/","title":{"rendered":"HYBRID SECURITY: Netwrix Releases its additional findings from its Annual Hybrid Security Trends report"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13798\" class=\"elementor elementor-13798\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5848c929 e-flex e-con-boxed e-con e-parent\" data-id=\"5848c929\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26fa1834 elementor-widget elementor-widget-html\" data-id=\"26fa1834\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2ba3567e e-con-full e-flex e-con e-parent\" data-id=\"2ba3567e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-24537d24 e-con-full e-flex e-con e-child\" data-id=\"24537d24\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f49cc5d elementor-widget elementor-widget-image\" data-id=\"7f49cc5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.freepik.com\/author\/pressfoto\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"427\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image-Credit-PressfotoFreepik.jpg\" class=\"attachment-large size-large wp-image-13801\" alt=\"Image Credit: Pressfoto\/Freepik https:\/\/www.freepik.com\/author\/pressfoto\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image-Credit-PressfotoFreepik.jpg 760w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image-Credit-PressfotoFreepik-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Pressfoto\/Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73e4cd5d e-con-full e-flex e-con e-child\" data-id=\"73e4cd5d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-749362c8 elementor-widget elementor-widget-html\" data-id=\"749362c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d1253c8 elementor-widget elementor-widget-wp-widget-text\" data-id=\"1d1253c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Helping keep European SMEs CYBERSafe!<br \/>\n<\/strong>Gibraltar: Wednesday\u00a0 18 September 2024 at 11:00 CEST<\/p>\n<p><b><strong>HYBRID SECURITY: <a href=\"https:\/\/usw2.nyl.as\/t1\/317\/7f1s4edme90akq8r62e4voh8h\/0\/dfd66a8194669291e6fc635fe10fe76d5e4bfbc7d25d06d32d4380ec2851c3f6\" target=\"_blank\" rel=\"noopener\">Netwrix<\/a> Releases its additional findings from its Annual Hybrid Security Trends report<\/strong><\/b><\/p>\n<p><span lang=\"EN\">By:\u00a0<\/span><span lang=\"EN\"><a href=\"https:\/\/usw2.nyl.as\/t1\/317\/7f1s4edme90akq8r62e4voh8h\/0\/dfd66a8194669291e6fc635fe10fe76d5e4bfbc7d25d06d32d4380ec2851c3f6\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/usw2.nyl.as\/t1\/317\/7f1s4edme90akq8r62e4voh8h\/0\/dfd66a8194669291e6fc635fe10fe76d5e4bfbc7d25d06d32d4380ec2851c3f6&amp;source=gmail&amp;ust=1726735967733000&amp;usg=AOvVaw1KY4IwNrGqDZ3pncmMr9uE\"><strong>Netwrix<\/strong><\/a><\/span><br \/>\nSyndicated via\u00a0 <a href=\"https:\/\/docs.google.com\/presentation\/d\/1hoiW_cE9plS9lNkFSCGpmEvNrTC7SC1Da_0yrrdkfJM\/pub?start=true&amp;loop=false&amp;delayms=5000\" target=\"_blank\" rel=\"noopener\">CYBERInsights\/CyberVoice<\/a><br \/>\nFirst for\u00a0<a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=sme+cyber+pr&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity\u00a0 PR<\/a><em><br \/>\n#CyberInsights #SMECyberNews\u00a0<\/em><em>#SMECyberPR<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ac05a5 e-flex e-con-boxed e-con e-parent\" data-id=\"6ac05a5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3b75bf88 e-con-full e-flex e-con e-child\" data-id=\"3b75bf88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-62623019 elementor-widget elementor-widget-html\" data-id=\"62623019\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0294a6 e-con-full e-flex e-con e-child\" data-id=\"f0294a6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1df5ae1f elementor-widget elementor-widget-wp-widget-text\" data-id=\"1df5ae1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Netwrix<\/strong>, a vendor that delivers effective and accessible cybersecurity to any organisation, today revealed <a href=\"https:\/\/usw2.nyl.as\/t1\/317\/7f1s4edme90akq8r62e4voh8h\/1\/314d91c4c8bddbda227b5c5c109959d7b969668063386c478331e049025855bd\" target=\"_blank\" rel=\"noopener\">additional findings<\/a> for the enterprise sector (organisations with more than 1,000 employees) from its annual global <a href=\"https:\/\/usw2.nyl.as\/t1\/317\/7f1s4edme90akq8r62e4voh8h\/3\/a5d24ee20ee53b6337b8116a41202d6ba3739441de1aaf8da7c3391447da48d7\" target=\"_blank\" rel=\"noopener\">2024 Hybrid Security Trends Report<\/a>.<\/p>\n<p>According to the survey, 84% of organisations in the enterprise sector spotted a cyberattack within the last 12 months, compared to only 65% in 2023. The most common security incidents are <strong>phishing<\/strong>, user or admin account compromise, and <strong>ransomware<\/strong> or other <strong>malware attacks<\/strong>.<\/p>\n<p><em>\u201cThe surge in the attack rates across organisations of all sizes, including the enterprise sector, may indicate that threat actors found AI automation extremely beneficial. With the introduction of AI, sending a massive number of phishing emails and probing systems and services for vulnerabilities is only a matter of orchestration on those platforms operated by cybercriminals. Constant pressure stresses the security teams and might lead to reduced and worn-out protection levels. To ease this burden, organisations should consider involving third-party investigators as a part of their incident response plan. It will help offload the internal security team when dealing with an ongoing attack,\u201d<\/em> says <strong>Dirk Schrader<\/strong>, VP of Security Research and Field CISO EMEA at <strong>Netwrix<\/strong>.<\/p>\n<p>For 53% of attacked large organisations, a security incident resulted in additional unexpected expenses to fix security gaps. Each fifth enterprise faced compliance fines (22%) and a reduced competitive edge (21%). Moreover, 30% of enterprises estimated their financial damage from cyber threats to be at least $50,000, compared to just 17% among organisations overall.<\/p>\n<p><em>\u201cTypically, large enterprises have already implemented the basic security controls and thus must address more complex and costly issues in the aftermath of an attack. Where a smaller organisation may have a quick fix available and can accept certain risks, enterprises must invest in the security team, process changes, and tooling to close even the smallest gaps exploited by the attacker,\u201d<\/em> says <strong>Ilia Sotnikov<\/strong>, Security Strategist at <strong>Netwrix<\/strong>.<\/p>\n<p><strong>About Netwrix<\/strong><\/p>\n<p><strong>Netwrix<\/strong> champions cybersecurity to ensure a brighter digital future for any organisation. <strong>Netwrix&#8217;s<\/strong> innovative solutions safeguard data, identities, and infrastructure, reducing both the risk and impact of a breach for more than 13,500 organisations across 100+ countries. Netwrix empowers security professionals to face digital threats with confidence by enabling them to identify and protect sensitive data as well as to detect, respond to, and recover from attacks. For more information, visit <a href=\"https:\/\/usw2.nyl.as\/t1\/317\/7f1s4edme90akq8r62e4voh8h\/7\/69676d9771e6a21e448ae8ea57a0e678b89a601e6661776366e1baa29c5167ae\" target=\"_blank\" rel=\"noopener\">www.netwrix.com<\/a>.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c36b861 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"c36b861\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-10aab8b e-flex e-con-boxed e-con e-parent\" data-id=\"10aab8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-36b1618 e-con-full e-flex e-con e-child\" data-id=\"36b1618\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d782a21 elementor-widget elementor-widget-image\" data-id=\"4d782a21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&#038;offerid=572706.44&#038;subid=0&#038;type=4\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"144\" height=\"144\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Nord_logo_1.png\" class=\"attachment-2048x2048 size-2048x2048 wp-image-12867\" alt=\"NordVPN\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-612bcdf9 e-con-full e-flex e-con e-child\" data-id=\"612bcdf9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6af5e6f3 elementor-widget elementor-widget-wp-widget-text\" data-id=\"6af5e6f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>What is a VPN &amp; Does my SME Need one?<\/strong> A VPN is a Virtual Private Network a method of securing your communications credentials. When it comes to Small and Medium-sized enterprises (SMEs), the choice of VPNs can significantly impact the security and efficiency of their operations.<\/p>\n<p>The\u00a0<b>NordVPN<\/b> service allows you to connect to 5600+ servers in 60+ countries. It secures your Internet data with military-grade encryption, ensures your web activity remains private and helps bypass geographic content restrictions online. <strong>\u00a0<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.44&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\">Join\u00a0NordVPN\u00a0Today and\u00a0Save\u00a0up to\u00a073%\u00a0and Get 3 months\u00a0Extra Free<\/a> &#8211; Rude Not to \u2026!<\/strong><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-724e5dd3 e-flex e-con-boxed e-con e-parent\" data-id=\"724e5dd3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-15245842 e-con-full e-flex e-con e-child\" data-id=\"15245842\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-340f302f elementor-widget elementor-widget-image\" data-id=\"340f302f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/smartmockups_ltgx5ml3-300x200.jpg\" class=\"attachment-medium size-medium wp-image-13007\" alt=\"SME Cybersecurity\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/smartmockups_ltgx5ml3-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/smartmockups_ltgx5ml3-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/smartmockups_ltgx5ml3-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/smartmockups_ltgx5ml3.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ee55fec e-con-full e-flex e-con e-child\" data-id=\"7ee55fec\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-309a8b49 elementor-widget elementor-widget-html\" data-id=\"309a8b49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54fec9a0 elementor-widget elementor-widget-wp-widget-text\" data-id=\"54fec9a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>ABOUT CYBER VOICE | SME CYBER PR<\/strong><\/p>\n<p><strong>CYBERVoice<\/strong> provides direct, immediate, highly cost-effective access to our Proprietary Subscriber base* of 132,000*+ Named &amp; Profiled (PECR, GDPR &amp; DKIM Compliant) Owners, Partners &amp; Directors of SMEs throughout Europe &amp; the UK.<\/p>\n<p>CYBERVoice is available with varying User Options from Single Release to bi-Annual &amp; Unlimited Annual Campaigns available all delivering outstanding ROI! <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/cyber-voice-syndicate-now\/\" target=\"_blank\" rel=\"noopener\">Post Your First Release FREE!<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14cae93a elementor-align-center elementor-widget elementor-widget-button\" data-id=\"14cae93a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/docs.google.com\/presentation\/d\/1hoiW_cE9plS9lNkFSCGpmEvNrTC7SC1Da_0yrrdkfJM\/pub?start=true&#038;loop=false&#038;delayms=5000\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: Pressfoto\/Freepik Learn More \/&#8230; Image Credit: IfOnlyCommunications Learn More \/&#8230;<\/p>\n","protected":false},"author":1,"featured_media":13801,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[36],"tags":[477],"ppma_author":[415],"class_list":["post-13798","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-prchannel","tag-cybervoice"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image-Credit-PressfotoFreepik.jpg",760,507,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image-Credit-PressfotoFreepik-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image-Credit-PressfotoFreepik-300x200.jpg",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image-Credit-PressfotoFreepik.jpg",640,427,false],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image-Credit-PressfotoFreepik.jpg",640,427,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image-Credit-PressfotoFreepik.jpg",760,507,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image-Credit-PressfotoFreepik.jpg",760,507,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image-Credit-PressfotoFreepik.jpg",760,507,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Image-Credit-PressfotoFreepik-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/prchannel\/\" rel=\"category tag\">CYBER VOICE<\/a>","tag_info":"CYBER VOICE","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/13798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=13798"}],"version-history":[{"count":6,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/13798\/revisions"}],"predecessor-version":[{"id":13805,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/13798\/revisions\/13805"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/13801"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=13798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=13798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=13798"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=13798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}