{"id":15589,"date":"2024-11-13T11:26:25","date_gmt":"2024-11-13T10:26:25","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=15589"},"modified":"2024-11-21T13:33:22","modified_gmt":"2024-11-21T12:33:22","slug":"scamnetic-scam-protection","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/11\/13\/scamnetic-scam-protection\/","title":{"rendered":"REAL TIME SCAM PROTECTION: Introducing Scamnetic &#8211;\u00a0 Leading the Fight Against Scammers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"15589\" class=\"elementor elementor-15589\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ab3f424 e-flex e-con-boxed e-con e-parent\" data-id=\"4ab3f424\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-617da2c6 elementor-widget elementor-widget-html\" data-id=\"617da2c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ca4ac82 e-con-full e-flex e-con e-parent\" data-id=\"7ca4ac82\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6b91ccd8 e-con-full e-flex e-con e-child\" data-id=\"6b91ccd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6eef0c15 elementor-widget elementor-widget-image\" data-id=\"6eef0c15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/pixabay.com\/users\/viarami-13458823\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"427\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay-1024x683.jpg\" class=\"attachment-large size-large wp-image-15591\" alt=\"Small Business Cybersecurity\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay-1536x1024.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay.jpg 1920w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Markus Winkler_Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f61fc9b e-con-full e-flex e-con e-child\" data-id=\"7f61fc9b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6955e22d elementor-widget elementor-widget-html\" data-id=\"6955e22d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f55275a elementor-widget elementor-widget-wp-widget-text\" data-id=\"7f55275a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Helping Keep Small Business CYBERSafe!<br \/>\n<\/strong>Gibraltar: Wednesday 13 November 2024 at 11:30 CET<\/p>\n<p><b><strong>REAL TIME SCAM PROTECTION: Introducing Scamnetic &#8211;\u00a0 Leading the Fight Against Scammers with AI-based Scam Detection for Everyone<\/strong><\/b><br \/>\nBy: Iain Fraser &#8211; <a href=\"https:\/\/www.google.com\/search?q=cybersecurity+journalist&amp;client=opera&amp;hs=J2J&amp;sca_esv=4b48ab93829afc9b&amp;sxsrf=ADLYWIJJxCdzfo9XXGpMHq8BhsB4jkM6-g%3A1725554192279&amp;ei=EN7ZZu7sELiikdUPj53AsAs&amp;ved=0ahUKEwjutK-lnqyIAxU4UaQEHY8OELYQ4dUDCBA&amp;uact=5&amp;oq=cybersecurity+journalist&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiGGN5YmVyc2VjdXJpdHkgam91cm5hbGlzdDIKECMYgAQYJxiKBTIKECMYgAQYJxiKBTIEECMYJzIFEAAYgAQyBhAAGBYYHjILEAAYgAQYhgMYigUyCBAAGIAEGKIESNpQUKMIWPRCcAJ4AJABBJgB7AGgAd4mqgEGMC4zMi4xuAEDyAEA-AEBmAIboALHH6gCCsICBxAjGLADGCfCAgcQABiwAxgewgIOEAAYgAQYsAMYhgMYigXCAgsQABiABBiwAxiiBMICBxAjGCcY6gLCAhEQLhiABBiRAhjRAxjHARiKBcICCxAAGIAEGJECGIoFwgIKEAAYgAQYQxiKBcICEBAuGIAEGNEDGEMYxwEYigXCAgoQLhiABBhDGIoFwgILEC4YgAQY0QMYxwHCAgUQLhiABJgDB4gGAZAGCJIHBjIuMjMuMqAHgM8C&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Cybersecurity Journalist<\/a><br \/>\n<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;client=opera&amp;hs=QsT&amp;sca_esv=cd08aac0b4846c63&amp;sxsrf=ADLYWIIaZwnvuQfvJpPCaga2UcqJmvux4A%3A1719554579183&amp;ei=E1J-Zu30Cqbpi-gPva6Q6A8&amp;ved=0ahUKEwityvT-z_2GAxWm9AIHHT0XBP0Q4dUDCBA&amp;uact=5&amp;oq=sme+cybersecurity+news&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiFnNtZSBjeWJlcnNlY3VyaXR5IG5ld3MyBBAjGCcyBBAjGCcyBhAAGBYYHjILEAAYgAQYhgMYigUyCxAAGIAEGIYDGIoFMgsQABiABBiGAxiKBTIIEAAYgAQYogRI0hpQuwdYtBJwAXgBkAEAmAHBAaABkAiqAQMwLja4AQPIAQD4AQGYAgagApcHwgIHECMYsAMYJ8ICChAAGLADGNYEGEfCAgUQABiABJgDAIgGAZAGCZIHBTEuNC4xoAerMw&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">First for SME Cybersecurity News<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=REAL+TIME+SCAM+PROTECTION%3A+Introducing+Scamnetic+%E2%80%93++Leading+the+Fight+Against+Scammers&amp;sca_esv=01cba71388b00108&amp;sxsrf=ADLYWILaUNcH7MgGE48t6O5Y2dh2TnJCcw%3A1731514817623&amp;ei=wdE0Z_HXJbSIxc8PhZz24A4&amp;ved=0ahUKEwixvIKt29mJAxU0RPEDHQWOHewQ4dUDCA8&amp;uact=5&amp;oq=REAL+TIME+SCAM+PROTECTION%3A+Introducing+Scamnetic+%E2%80%93++Leading+the+Fight+Against+Scammers&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiWFJFQUwgVElNRSBTQ0FNIFBST1RFQ1RJT046IEludHJvZHVjaW5nIFNjYW1uZXRpYyDigJMgIExlYWRpbmcgdGhlIEZpZ2h0IEFnYWluc3QgU2NhbW1lcnNIqBFQAFisBXABeACQAQCYAZADoAGQA6oBAzQtMbgBA8gBAPgBAfgBApgCAaACFKgCD8ICBxAjGCcY6gLCAhQQABiABBiRAhi0AhiKBRjqAtgBAZgDFLoGBggBEAEYAZIHATGgBy0&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 131124 at 11:36 CET<\/a><em><br \/>\n#CyberInsights #CyberSecurity\u00a0<\/em><em>#CyberMedia #CyberPR #CyberAwareness<br \/>\n#SME #SmallBusiness #smallbusinessowner #ScamDetection #Scamnetic<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6795eea0 e-flex e-con-boxed e-con e-parent\" data-id=\"6795eea0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2fe4fcdc e-con-full e-flex e-con e-child\" data-id=\"2fe4fcdc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c9434c6 elementor-widget elementor-widget-html\" data-id=\"6c9434c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f6f66a8 e-con-full e-flex e-con e-child\" data-id=\"1f6f66a8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e5cd14b elementor-widget elementor-widget-wp-widget-text\" data-id=\"3e5cd14b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>REAL TIME SCAM PROTECTION:<\/strong> Introducing <a href=\"http:\/\/www.scamnetic.com\" target=\"_blank\" rel=\"noopener\">Scamnetic<\/a> &#8211; Leading the Fight Against Scammers with AI-based Scam Detection for Everyone<\/p>\n<p><strong>Cybercriminals<\/strong> frequently target <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a> with schemes like identity theft and credit card fraud to steal money. As a <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>Small Business<\/strong><\/a> owner, you are just as vulnerable. The consequences of a cyberattack or a deceptive scheme can be severe, threatening your business and livelihood.<\/p>\n<p>With scammers constantly evolving their tactics, it is crucial for you and your team to stay vigilant and be aware of the wide range of potential risks &#8211; Introducing <a href=\"http:\/\/www.scamnetic.com\" target=\"_blank\" rel=\"noopener\"><strong>Scamnetic<\/strong><\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23e0d270 elementor-widget elementor-widget-video\" data-id=\"23e0d270\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/EjlcTElKhO4?si=k1YM90zAGR1pJZb_&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28f866ab elementor-widget elementor-widget-wp-widget-text\" data-id=\"28f866ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><a href=\"http:\/\/www.scamnetic.com\" target=\"_blank\" rel=\"noopener\"><strong>Scamnetic&#8217;s<\/strong><\/a> mission is clear: To <em>&#8220;Identify and stop scams before losses occur by empowering consumers and their trusted service providers.&#8221;<\/em>\u00a0 With its innovative <strong><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\">AI-driven<\/a><\/strong> technology, <a href=\"https:\/\/scamnetic.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Scamnetic<\/strong><\/a> offers real-time scam detection solutions that minimize human error and seamlessly integrate into enterprise platforms, transforming service providers from potential scam enablers to guardians of consumer safety.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-133f2d94 elementor-widget elementor-widget-image\" data-id=\"133f2d94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/pixabay.com\/users\/viarami-13458823\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"427\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay-1024x683.jpg\" class=\"attachment-large size-large wp-image-15591\" alt=\"Small Business Cybersecurity\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay-1536x1024.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay.jpg 1920w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Markus Winkler_Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-553e4713 elementor-widget elementor-widget-wp-widget-text\" data-id=\"553e4713\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>COMPREHENSIVE SCAMNETIC SOLUTIONS:<\/strong><\/p>\n<p><a href=\"https:\/\/scamnetic.com\/ideveryone\/\" target=\"_blank\" rel=\"noopener\"><strong>ID EVERYONE:<\/strong>\u00a0<strong>Verify Identities with Ease<\/strong><\/a><br \/>\nNeed to confirm someone\u2019s identity? <strong>IDEveryone<\/strong> simplifies identity proofing for consumers. Combining identity verification and authentication, this tool ensures that people are who they claim to be by verifying the authenticity of their identity information. With just a phone number or email address, you can gain confidence in who you\u2019re communicating with\u2014while respecting privacy through a permission-based process.<\/p>\n<p>&#8211; Quickly and easily verifies identities<br \/>\n&#8211; Works across multiple communication channels<br \/>\n&#8211; Simple, user-friendly steps for both parties<br \/>\n&#8211; Helps build confidence in online connections<strong><br \/>\n<\/strong><\/p>\n<p><a href=\"https:\/\/scamnetic.com\/scanscore\/\" target=\"_blank\" rel=\"noopener\"><strong>SCAN AND SCORE:<\/strong> <strong>Detailed Scam Risk Assessments<\/strong><\/a><br \/>\nStay ahead of scams with <strong>Scan &amp; Score<\/strong>, which provides clear, at-a-glance insights using the proprietary <strong>Scam Score<\/strong>\u2122 system. No more worrying about whether a message or email might be a scam\u2014just scan it to get a quick, detailed risk assessment. With convenient features like Autoscan\u2122 and an Image Upload option, <a href=\"https:\/\/scamnetic.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Scamnetic<\/strong><\/a> ensures you can assess the risk of emails, texts, images, and URLs effortlessly.<\/p>\n<p>&#8211; Scan various forms of communication<br \/>\n&#8211; Quickly understand potential risks<br \/>\n&#8211; Initiate scans easily with a press, click, or upload<br \/>\n&#8211; Receive tailored recommendations for safety<\/p>\n<p><a href=\"https:\/\/scamnetic.com\/scam-intervention\/\" target=\"_blank\" rel=\"noopener\"><strong>SCAM INTERVENTION: 24\/7 US-Based Scam Support<\/strong><\/a><br \/>Facing a scam or recovering from one? Scam Intervention provides comprehensive Scam resolution services to protect your digital safety and help secure your assets. Our team is available around the clock to provide expert assistance and peace of mind.<\/p>\n<p>&#8211; Fast, reliable support for scam resolution<br \/>\n&#8211; Assistance with digital security and scam recovery<\/p>\n<p><a href=\"https:\/\/scamnetic.com\/scam-education\/\" target=\"_blank\" rel=\"noopener\"><strong>SCAM EDUCATION: Stay Informed with Expert Tips<\/strong><\/a><br \/>\nKnowledge is a powerful defence against scams. Scam Education offers timely tips and resources to help you recognize and protect yourself from evolving scam tactics. Gain insights and learn practical advice to keep yourself and your data secure.<\/p>\n<p>&#8211; Stay updated on the latest scams<br \/>\n&#8211; Practical advice for online safety<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-299380d4 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"299380d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/www.scamnetic.com\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6d870b73 e-con-full e-flex e-con e-parent\" data-id=\"6d870b73\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1e81494e e-con-full e-flex e-con e-child\" data-id=\"1e81494e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17f55aed elementor-widget elementor-widget-image\" data-id=\"17f55aed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"225\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg\" class=\"attachment-medium size-medium wp-image-5079\" alt=\"Image Credit: IfOnlyCommunications | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-1024x768.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-768x576.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-54ea98d7 e-con-full e-flex e-con e-child\" data-id=\"54ea98d7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5eccc8af elementor-widget elementor-widget-html\" data-id=\"5eccc8af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a7b5255 elementor-widget elementor-widget-wp-widget-text\" data-id=\"5a7b5255\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>CYBER Insights \u2013 Helping Keep Small Business CYBERSafe!\u00a0<\/strong><\/p>\n<p>Launched in 2020 by\u00a0<strong><a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=cybersecurity+journalist&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">Cybersecurity Journalist<\/a>\u00a0Iain Fraser<\/strong>\u00a0and his team at\u00a0<a href=\"https:\/\/www.iainfraser.net\/\" target=\"_blank\" rel=\"noopener\"><strong>IfOnly&#8230;<\/strong><\/a> <a href=\"https:\/\/cyberinsights.iainfraser.net\/\" target=\"_blank\" rel=\"noopener\"><strong>CYBERInsights<\/strong><\/a> was developed to be the go-to platform providing definitive, reliable &amp; actionable Cybersecurity News, Intel,\u00a0 Awareness &amp; Training specifically written and curated for <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>Small Business<\/strong><\/a> &amp; Enterprise Owners, Partners and Directors throughout the UK. #CyberInsights #CyberSecurity #CyberMedia #CyberPR #CyberAwareness #SME #SmallBusiness #smallbusinessowner<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-13b07569 e-flex e-con-boxed e-con e-parent\" data-id=\"13b07569\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7e1cf1b e-con-full e-flex e-con e-child\" data-id=\"7e1cf1b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6825c2d4 elementor-widget elementor-widget-image\" data-id=\"6825c2d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&#038;offerid=572706.44&#038;subid=0&#038;type=4\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"144\" height=\"144\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Nord_logo_1.png\" class=\"attachment-2048x2048 size-2048x2048 wp-image-12867\" alt=\"NordVPN\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-746ab5d1 e-con-full e-flex e-con e-child\" data-id=\"746ab5d1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-53789260 elementor-widget elementor-widget-wp-widget-text\" data-id=\"53789260\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>What is a VPN &amp; Does my SME Need one?<\/strong> A <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/08\/26\/special-feature-vpn\/\" target=\"_blank\" rel=\"noopener\"><strong>VPN<\/strong><\/a> is a Virtual Private Network a method of securing your communications credentials. When it comes to Small and Medium-sized enterprises (<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a>), the choice of <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/08\/26\/special-feature-vpn\/\" target=\"_blank\" rel=\"noopener\"><strong>VPNs<\/strong><\/a> can significantly impact the security and efficiency of their operations.<\/p>\n<p>The\u00a0<b>NordVPN<\/b> service allows you to connect to 5600+ servers in 60+ countries. It secures your Internet data with military-grade encryption, ensures your web activity remains private and helps bypass geographic content restrictions online. \u00a0<strong><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.44&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\">Join\u00a0NordVPN\u00a0Today and\u00a0Save\u00a0up to\u00a073%\u00a0and Get 3 months\u00a0Extra Free<\/a>\u00a0Rude Not to \u2026!<\/strong><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a04349b e-flex e-con-boxed e-con e-parent\" data-id=\"5a04349b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76e4492 elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"76e4492\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-AI-3-768x432.jpg\" alt=\"CI_Feature AI (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-Cloud-Security-1-1-768x432.jpg\" alt=\"CI_Feature Cloud Security (1)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-GDPR-1-1-768x432.jpg\" alt=\"_CI_Feature GDPR (1)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-Identity-Theft-2-768x432.jpg\" alt=\"CI_Feature Identity Theft (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Attack-Mitigation-6-768x432.jpg\" alt=\"CI_Feature Attack Mitigation (6)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Phishing-3-768x432.jpg\" alt=\"CI_Feature Phishing (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Blockchain-5-768x432.jpg\" alt=\"CI_Feature Blockchain (5)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-MFA-2-768x432.jpg\" alt=\"CI_Feature MFA (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-ISO-27001-2-768x432.jpg\" alt=\"CI_Feature Cyber ISO 27001 (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-EU-CRA-2-768x432.jpg\" alt=\"CI_Feature Cyber EU CRA (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Report-Cybercrime-3-768x432.jpg\" alt=\"CI_Report Cybercrime (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"12 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-Compliance-3-768x432.jpg\" alt=\"CI_Feature Cyber Compliance (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"13 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-NIS2-2-768x432.jpg\" alt=\"CI_Feature Cyber NIS2 (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"14 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-MSPs-2-768x432.jpg\" alt=\"CI_Feature MSPs (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"15 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-SaaS-2-768x432.jpg\" alt=\"CI_Feature SaaS (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"16 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Email-Security-1-768x432.jpg\" alt=\"CI_Feature Email Security (1)\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: Markus Winkler_Pixabay Image Credit: Markus Winkler_Pixabay Learn More \/&#8230; Image Credit: IfOnlyCommunications<\/p>\n","protected":false},"author":2,"featured_media":15591,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"","footnotes":""},"categories":[14],"tags":[419],"ppma_author":[415],"class_list":["post-15589","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberinsights","tag-cyberinsights"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay.jpg",1920,1280,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay-300x200.jpg",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay-768x512.jpg",640,427,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay-1024x683.jpg",640,427,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay-1536x1024.jpg",1536,1024,true],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay.jpg",1920,1280,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay-1024x683.jpg",1024,683,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image-Credit-Markus-Winkler_Pixabay-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist - Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" rel=\"category tag\">SMECYBERIINSIGHTS<\/a>","tag_info":"SMECYBERIINSIGHTS","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/15589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=15589"}],"version-history":[{"count":32,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/15589\/revisions"}],"predecessor-version":[{"id":15691,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/15589\/revisions\/15691"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/15591"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=15589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=15589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=15589"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=15589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}