{"id":13838,"date":"2024-09-11T16:38:24","date_gmt":"2024-09-11T14:38:24","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=13838"},"modified":"2026-04-23T13:01:35","modified_gmt":"2026-04-23T11:01:35","slug":"special-feature-on-phishing","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/09\/11\/special-feature-on-phishing\/","title":{"rendered":"PHISHING: PHISHING KPI\/ Best-practice Anti Phishing for SMEs"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13838\" class=\"elementor elementor-13838\">\n\t\t\t\t<div class=\"elementor-element elementor-element-641e8b23 e-flex e-con-boxed e-con e-parent\" data-id=\"641e8b23\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-253c511 elementor-widget__width-initial elementor-widget elementor-widget-image-carousel\" data-id=\"253c511\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;slides_to_show&quot;:&quot;6&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"CYBERPartners\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners1_NordVPN.png\" alt=\"Partners1_NordVPN\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners3_R3.png\" alt=\"Partners3_R3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners2_Zoho.png\" alt=\"Partners2_Zoho\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Plesk.png\" alt=\"Partners4_Plesk\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/Red_Button_Slider.png\" alt=\"Red_Button_Slider\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/04\/ogo2.png\" alt=\"ogo2\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/Securus_Working_300x250-e1765538235404.png\" alt=\"Detection. Connection. Protection: Why Securus Belongs at the Core of Every Modern SME Security Strategy\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12d68899 elementor-widget elementor-widget-image\" data-id=\"12d68899\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"1584\" height=\"396\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/SpecialFeatureTemplate_Phishing.png\" class=\"attachment-2048x2048 size-2048x2048 wp-image-27272\" alt=\"SpecialFeatureTemplate_Phishing\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/SpecialFeatureTemplate_Phishing.png 1584w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/SpecialFeatureTemplate_Phishing-300x75.png 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/SpecialFeatureTemplate_Phishing-1024x256.png 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/SpecialFeatureTemplate_Phishing-768x192.png 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/SpecialFeatureTemplate_Phishing-1536x384.png 1536w\" sizes=\"auto, (max-width: 1584px) 100vw, 1584px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-19aacafb e-flex e-con-boxed e-con e-parent\" data-id=\"19aacafb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6a99076 e-con-full e-flex e-con e-child\" data-id=\"6a99076\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6bc3191e elementor-widget elementor-widget-html\" data-id=\"6bc3191e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b80a14a elementor-widget elementor-widget-image\" data-id=\"b80a14a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&#038;offerid=572706.44&#038;subid=0&#038;type=4\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"898\" height=\"752\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Phishing.png\" class=\"attachment-2048x2048 size-2048x2048 wp-image-8190\" alt=\"Amazon Book on Phishing\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Phishing.png 898w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Phishing-300x251.png 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Phishing-768x643.png 768w\" sizes=\"auto, (max-width: 898px) 100vw, 898px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a43710 e-con-full e-flex e-con e-child\" data-id=\"2a43710\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-661ecaa6 elementor-widget elementor-widget-wp-widget-text\" data-id=\"661ecaa6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>PHISHING &amp; Understanding the Threat of Phishing. \u2013 CyberKPI:\u00a0 <\/strong>Phishing: Safeguarding <strong>Small Businesses<\/strong> in the <strong>UK<\/strong> and <strong>EU<\/strong> Against Cyber Deceit. Discover how <strong>Phishing<\/strong> attacks threaten small businesses in the <strong>UK<\/strong> and <strong>EU<\/strong>, their impact, and essential prevention strategies.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d2251d0 elementor-widget elementor-widget-video\" data-id=\"2d2251d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=XBkzBrXlle0&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c46eba9 elementor-widget elementor-widget-wp-widget-text\" data-id=\"1c46eba9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Understanding Phishing and Its Threat to Small Businesses<\/strong><\/p>\n<p><strong>Phishing<\/strong> is a form of cyber attack where perpetrators deceive individuals into divulging sensitive information such as passwords, credit card numbers, or personal identification details through fraudulent communications. These attacks are commonly executed via email, SMS, or even phone calls, making them a prevalent threat to <strong>Small Businesses<\/strong> in the <strong>UK<\/strong> and <strong>EU<\/strong>. In fact, <strong>Phishing<\/strong> attacks have increasingly targeted small businesses, with a staggering 83% of UK businesses experiencing such attacks in 2022. This widespread issue indicates that <strong>Small Enterprise<\/strong>s are often seen as easier targets due to typically having fewer resources dedicated to cybersecurity.<\/p>\n<p>The financial implications of <strong>Phishing<\/strong> attacks can be severe. On average, each <strong>Phishing<\/strong> incident results in a loss of approximately \u00a3136, contributing to an overall global theft of nearly $44.2 million in 2021. <strong>Phishing<\/strong> scams often exploit human emotions, such as fear or urgency, compelling victims to act quickly without verifying the source of the communication. This is particularly problematic as about 65% of cybercriminal groups utilise spear Phishing as their primary method for gathering intelligence on their targets. The increase in remote work has further exacerbated this vulnerability, as employees may let their guard down when responding to suspicious messages.<\/p>\n<p><strong>Common Forms of Phishing Attacks<\/strong><\/p>\n<p><strong>Small Businesses<\/strong> should be aware of various forms of <strong>Phishing<\/strong> attacks that can compromise their security. <strong>Email Phishing<\/strong> is the most common type, where attackers send fake emails that appear to be from legitimate organisations, with well-known brands like <strong>Google<\/strong> and <strong>Adobe<\/strong> frequently impersonated to entice victims to click malicious links. <strong>Spear Phishing<\/strong> specifically targets individuals or companies using personal information to lend credibility to the attack, while <strong>Vishing<\/strong> (voice phishing) involves phone calls that trick victims into revealing sensitive data. Another variant, <strong>Smishing<\/strong>, uses SMS messages to create a sense of urgency that prompts quick responses from the recipient.<\/p>\n<p><strong>Whaling<\/strong> is another sophisticated form of <strong>Phishing<\/strong> that focuses on high-profile individuals within a company, such as executives, often using carefully crafted messages to extract sensitive information. <strong>Clone Phishing<\/strong> is also noteworthy; it replicates legitimate emails that have been previously sent, replacing links with malicious ones to deceive recipients. Awareness of these varying tactics is essential for <strong>Small Businesses<\/strong> to bolster their defence against phishing attempts.<\/p>\n<p><strong>Impact of Phishing on Small Businesses<\/strong><\/p>\n<p>The impact of <strong>Phishing<\/strong> on <strong>Small Businesses<\/strong> can be catastrophic. <strong>Phishing<\/strong> is reported as the most prevalent type of cyber attack, affecting 84% of businesses in the <strong>UK<\/strong>. The financial ramifications can be dire, with the average cost of a disruptive breach around \u00a31,205. Furthermore, significant data breaches can lead to even greater financial consequences, with breaches involving 10 million records costing an average of \u00a350 million. Beyond financial losses, <strong>Phishing<\/strong> attacks can severely damage a business&#8217;s reputation, leading to a loss of customer trust and potential revenue.<\/p>\n<p>The recovery from a <strong>Phishing<\/strong> incident can be exceptionally costly, with estimates suggesting that it may exceed $14.8 million for affected organisations. In fact, a staggering 96% of organisations reported experiencing at least one <strong>Phishing<\/strong> attack in the past year, underscoring the pervasive nature of this threat. This statistic highlights the urgency for <strong>Small Businesses<\/strong> to take proactive measures in their cybersecurity strategies.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-161ca895 elementor-widget elementor-widget-image\" data-id=\"161ca895\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"360\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Phishing-5-1024x576.jpg\" class=\"attachment-large size-large wp-image-21583\" alt=\"CI_Feature Phishing (5)\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Phishing-5-1024x576.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Phishing-5-300x169.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Phishing-5-768x432.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Phishing-5-1536x864.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Phishing-5.jpg 1920w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2957ce9 elementor-widget elementor-widget-wp-widget-text\" data-id=\"2957ce9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Best Practices for Preventing Phishing Attacks<\/strong><\/p>\n<p>Preventing <strong>Phishing<\/strong> attacks requires a proactive approach from <strong>Small Businesses<\/strong>. Regular employee training on recognising <strong>Phishing<\/strong> attempts is essential and has been shown to reduce successful attacks by up to 90%. Implementing multi-factor authentication (<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/14\/special-feature-what-is-mfa\/\" target=\"_blank\" rel=\"noopener\"><strong>MFA<\/strong><\/a>) provides an additional layer of security beyond just passwords, making it harder for attackers to gain access to sensitive information. Keeping software regularly updated and patched can close vulnerabilities that <strong>Phishing<\/strong> attacks may exploit.<\/p>\n<p>Developing a robust incident response plan is critical; this plan should outline steps to take if a <strong>Phishing<\/strong> attack occurs, ensuring that all employees know their roles in the event of a breach. Employing <strong>Anti-Phishing<\/strong> email security measures can filter out suspicious emails before they even reach inboxes, and fostering a culture of reporting suspicious communications can enable quick responses to potential threats. These strategies collectively create a formidable defence against <strong>Phishing<\/strong> attacks.<\/p>\n<p><strong>Importance of a Phishing Response Plan<\/strong><\/p>\n<p>Despite the evident risks, only 22% of businesses have a formal incident response plan in place, which is crucial for effectively managing cyber risks. A well-structured response plan should include monitoring for <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/08\/29\/cyber-knowledge-key-point-information-sme-identity-theft\/\" target=\"_blank\" rel=\"noopener\"><strong>Identity Theft<\/strong><\/a> and ensuring that <strong>antivirus software<\/strong> is updated after an attack. Establishing clear reporting procedures for employees when they suspect a <strong>Phishing<\/strong> attempt is also vital. Regularly reviewing and updating the response plan to incorporate new <strong>Phishing<\/strong> tactics and emerging threats is essential for maintaining effectiveness.<\/p>\n<p>Engaging with cybersecurity professionals to conduct drills and simulate <strong>Phishing<\/strong> attacks can enhance employee preparedness and awareness significantly. The importance of a formal <strong>Phishing<\/strong> response plan cannot be overstated, as it equips businesses to act swiftly and effectively in the event of an attack, mitigating potential damages.<\/p>\n<p><strong>Strategies for Enhancing Cybersecurity Awareness in Small Businesses<\/strong><\/p>\n<p>To bolster cybersecurity awareness, <strong>Small Businesses<\/strong> should promote continuous learning about cybersecurity threats through workshops and online courses tailored for employees. Sharing recent case studies and statistics about <strong>Phishing<\/strong> attacks can raise awareness of the potential impacts on the business. Creating an environment where cybersecurity is viewed as a shared responsibility among all staff, rather than solely the domain of the IT department, fosters a culture of vigilance against <strong>Phishing<\/strong> threats.<\/p>\n<p>Collaborating with local cybersecurity organisations can provide access to resources and best practices that can help improve security measures. The proactive engagement of all employees in cybersecurity training and awareness initiatives is a crucial step towards fortifying <strong>Small Businesses<\/strong> against the ongoing threat of <strong>Phishing<\/strong> attacks.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-476f2547 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"476f2547\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/inner-sanctum-2024\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download KPI<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-71456c22 e-flex e-con-boxed e-con e-parent\" data-id=\"71456c22\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-66656e63 e-con-full e-flex e-con e-child\" data-id=\"66656e63\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12830f14 elementor-widget elementor-widget-image\" data-id=\"12830f14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"144\" height=\"144\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Nord_logo_1.png\" class=\"attachment-large size-large wp-image-12867\" alt=\"NordVPN\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b2abeb3 e-con-full e-flex e-con e-child\" data-id=\"5b2abeb3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-410a8981 elementor-widget elementor-widget-wp-widget-text\" data-id=\"410a8981\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>What is a VPN &amp; Does my <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\">SME<\/a> Need one?<\/strong> A <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/08\/26\/special-feature-vpn\/\" target=\"_blank\" rel=\"noopener\"><strong>VPN<\/strong><\/a> is a Virtual Private Network a method of securing your communications credentials. When it comes to Small and Medium-sized enterprises (<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a>), the choice of <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/08\/26\/special-feature-vpn\/\" target=\"_blank\" rel=\"noopener\"><strong>VPNs<\/strong><\/a> can significantly impact the security and efficiency of their operations.<\/p>\n<p>The\u00a0<b>NordVPN<\/b> service allows you to connect to 5600+ servers in 60+ countries. It secures your Internet data with military-grade encryption, ensures your web activity remains private and helps bypass geographic content restrictions online. <strong>\u00a0<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.44&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\">Join\u00a0NordVPN\u00a0Today and\u00a0Save\u00a0up to\u00a073%\u00a0and Get 3 months\u00a0Extra Free<\/a> &#8211; Rude Not to \u2026!<\/strong><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58d4919 e-con-full e-flex e-con e-parent\" data-id=\"58d4919\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5a6f3be e-con-full e-flex e-con e-child\" data-id=\"5a6f3be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5dbc9ab elementor-widget elementor-widget-image\" data-id=\"5dbc9ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"225\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg\" class=\"attachment-medium size-medium wp-image-5079\" alt=\"Image Credit: IfOnlyCommunications | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-1024x768.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-768x576.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0244580 e-con-full e-flex e-con e-child\" data-id=\"0244580\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df98b77 elementor-widget elementor-widget-wp-widget-text\" data-id=\"df98b77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>SMECYBER Insights \u2013 Helping Keep Small Business CYBERSafe!\u00a0<\/strong><\/p>\n<p>Launched in 2020 by\u00a0<strong><a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=cybersecurity+journalist&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">Cybersecurity Journalist<\/a>\u00a0Iain Fraser<\/strong>\u00a0and his team at\u00a0<a href=\"https:\/\/www.iainfraser.net\/\" target=\"_blank\" rel=\"noopener\"><strong>IfOnly&#8230;<\/strong><\/a> <a href=\"https:\/\/smecyberinsights.co.uk\"><strong>SMECYBERInsights<\/strong><\/a> was developed to be the go-to platform providing definitive, reliable &amp; actionable Cybersecurity News, Intel,\u00a0 Awareness &amp; Training specifically written and curated for <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>Small Business<\/strong><\/a> &amp; Enterprise Owners, Partners and Directors throughout the <strong>UK<\/strong>. <span style=\"font-style: italic\">#CyberInsights #CyberSecurity #CyberAttack #CyberAwareness #Compliance #DDoS #Fraud #Ransomware #ScamAlert #SME #SmallBusiness #SmallBusinessOwner #ThreatIntel<\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Download KPI Image Credit: IfOnlyCommunications<\/p>\n","protected":false},"author":1,"featured_media":16187,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[511,604],"tags":[434],"ppma_author":[415],"class_list":["post-13838","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberfeatures","category-scam","tag-phishing"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Phishing-4.jpg",1920,1080,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Phishing-4-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Phishing-4-300x169.jpg",300,169,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Phishing-4-768x432.jpg",640,360,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Phishing-4-1024x576.jpg",640,360,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Phishing-4-1536x864.jpg",1536,864,true],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Phishing-4.jpg",1920,1080,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Phishing-4-1024x576.jpg",1024,576,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Phishing-4-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberfeatures\/\" rel=\"category tag\">SME CYBER FEATURES<\/a> <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/scam\/\" rel=\"category tag\">SCAM<\/a>","tag_info":"SCAM","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/13838","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=13838"}],"version-history":[{"count":37,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/13838\/revisions"}],"predecessor-version":[{"id":27893,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/13838\/revisions\/27893"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/16187"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=13838"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=13838"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=13838"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=13838"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}