{"id":16660,"date":"2024-12-12T11:34:42","date_gmt":"2024-12-12T10:34:42","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=16660"},"modified":"2025-02-20T15:17:57","modified_gmt":"2025-02-20T14:17:57","slug":"ai-scams","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/12\/12\/ai-scams\/","title":{"rendered":"CYBER THREAT INTEL:  AI &#8211; Experts Warn that AI-Generated Scams Are More Dangerous Than Ever"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"16660\" class=\"elementor elementor-16660\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d27259a e-flex e-con-boxed e-con e-parent\" data-id=\"7d27259a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-643dbbd1 elementor-widget elementor-widget-html\" data-id=\"643dbbd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-69e633af e-con-full e-flex e-con e-parent\" data-id=\"69e633af\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-646968be e-con-full e-flex e-con e-child\" data-id=\"646968be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7a03a26d elementor-widget elementor-widget-image\" data-id=\"7a03a26d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.pixabay.com\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"427\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920-1024x683.jpg\" class=\"attachment-large size-large wp-image-16662\" alt=\"Image Credit: Sammy-Sander via Pixabay\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920-1536x1024.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920.jpg 1920w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"> Image Credit: Sammy-Sander via Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-319fee7a e-con-full e-flex e-con e-child\" data-id=\"319fee7a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3dec82df elementor-widget elementor-widget-html\" data-id=\"3dec82df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32f05400 elementor-widget elementor-widget-wp-widget-text\" data-id=\"32f05400\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Helping Keep Small Business CYBERSafe!<br \/>\n<\/strong>Gibraltar: Thursday\u00a0 12 December 2024 at 11:30 CET<\/p>\n<p><b><strong>CYBER THREAT INTEL: Experts Warn Why AI-Generated Scams Are More Dangerous Than Ever<\/strong>\u00a0<\/b><br \/>\nBy: Iain Fraser &#8211; <a href=\"https:\/\/www.google.com\/search?q=cybersecurity+journalist&amp;client=opera&amp;hs=J2J&amp;sca_esv=4b48ab93829afc9b&amp;sxsrf=ADLYWIJJxCdzfo9XXGpMHq8BhsB4jkM6-g%3A1725554192279&amp;ei=EN7ZZu7sELiikdUPj53AsAs&amp;ved=0ahUKEwjutK-lnqyIAxU4UaQEHY8OELYQ4dUDCBA&amp;uact=5&amp;oq=cybersecurity+journalist&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiGGN5YmVyc2VjdXJpdHkgam91cm5hbGlzdDIKECMYgAQYJxiKBTIKECMYgAQYJxiKBTIEECMYJzIFEAAYgAQyBhAAGBYYHjILEAAYgAQYhgMYigUyCBAAGIAEGKIESNpQUKMIWPRCcAJ4AJABBJgB7AGgAd4mqgEGMC4zMi4xuAEDyAEA-AEBmAIboALHH6gCCsICBxAjGLADGCfCAgcQABiwAxgewgIOEAAYgAQYsAMYhgMYigXCAgsQABiABBiwAxiiBMICBxAjGCcY6gLCAhEQLhiABBiRAhjRAxjHARiKBcICCxAAGIAEGJECGIoFwgIKEAAYgAQYQxiKBcICEBAuGIAEGNEDGEMYxwEYigXCAgoQLhiABBhDGIoFwgILEC4YgAQY0QMYxwHCAgUQLhiABJgDB4gGAZAGCJIHBjIuMjMuMqAHgM8C&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Cybersecurity Journalist<\/a><br \/>\n<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;client=opera&amp;hs=QsT&amp;sca_esv=cd08aac0b4846c63&amp;sxsrf=ADLYWIIaZwnvuQfvJpPCaga2UcqJmvux4A%3A1719554579183&amp;ei=E1J-Zu30Cqbpi-gPva6Q6A8&amp;ved=0ahUKEwityvT-z_2GAxWm9AIHHT0XBP0Q4dUDCBA&amp;uact=5&amp;oq=sme+cybersecurity+news&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiFnNtZSBjeWJlcnNlY3VyaXR5IG5ld3MyBBAjGCcyBBAjGCcyBhAAGBYYHjILEAAYgAQYhgMYigUyCxAAGIAEGIYDGIoFMgsQABiABBiGAxiKBTIIEAAYgAQYogRI0hpQuwdYtBJwAXgBkAEAmAHBAaABkAiqAQMwLja4AQPIAQD4AQGYAgagApcHwgIHECMYsAMYJ8ICChAAGLADGNYEGEfCAgUQABiABJgDAIgGAZAGCZIHBTEuNC4xoAerMw&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">First for SME Cybersecurity News<\/a><em><br \/>\n<\/em><span style=\"font-style: italic\">#CyberInsights\u00a0 #CyberSecurityAwareness\u00a0 #CyberThreatIntel<em> #SMECybersecurity #AI #AIScams #AIScammers #DeepFake #VoiceCloning<\/em><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5be632d6 e-flex e-con-boxed e-con e-parent\" data-id=\"5be632d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-aad613 e-con-full e-flex e-con e-child\" data-id=\"aad613\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f3b8d4d elementor-widget elementor-widget-html\" data-id=\"1f3b8d4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114166\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114166\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2118c72 e-con-full e-flex e-con e-child\" data-id=\"2118c72\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17df7fcd elementor-widget elementor-widget-wp-widget-text\" data-id=\"17df7fcd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>As <strong>AI<\/strong> technology advances, <strong>Scams<\/strong> become more realistic and harder to detect. Experts at <a href=\"http:\/\/www.Psono.com\" target=\"_blank\" rel=\"noopener\"><strong>Psono.com<\/strong><\/a> highlight modern scams like AI-powered phishing, clone emails, and gift card fraud that use personal data to create highly convincing attacks.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8d18ec elementor-widget elementor-widget-video\" data-id=\"f8d18ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/4PB5ITj420Q?feature=shared&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6bf537d7 elementor-widget elementor-widget-wp-widget-text\" data-id=\"6bf537d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Understanding how these scams work is essential to protecting personal information and money. Experts from <strong><a href=\"http:\/\/www.psono.com\" target=\"_blank\" rel=\"noopener\">Psono.com<\/a><\/strong> have highlighted the most common modern scams that are becoming harder to detect, especially with the rapid advancement of <strong>AI<\/strong>. These insights are based on recent cybersecurity trends and evolving scam tactics.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b735d82 elementor-widget elementor-widget-image\" data-id=\"2b735d82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.pixabay.com\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"427\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920-1024x683.jpg\" class=\"attachment-large size-large wp-image-16662\" alt=\"Image Credit: Sammy-Sander via Pixabay\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920-1536x1024.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920.jpg 1920w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Sammy-Sander via Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f58f321 elementor-widget elementor-widget-wp-widget-text\" data-id=\"3f58f321\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>\u00a01. AI-Powered Scams<\/strong><br \/>\n<strong>Scammers<\/strong> now use <strong>AI<\/strong> to impersonate family or friends, creating realistic voice recordings or videos from social media content. These deepfakes are used to ask for money or personal information, making the scams feel alarmingly real. <em>What to Do: If you receive an unexpected request, ask questions or details only the real person would know. A wrong or vague answer is a strong sign of a scam.<\/em><\/p>\n<p><strong>2. Gift Card Scams<\/strong><br \/>\n<strong>Scammers<\/strong> analyse online shopping habits to target victims with gift card requests from stores they frequently use, especially during busy shopping seasons. The cards are quickly redeemed once the codes are shared, leaving the victim with financial loss. <em>What to Do: If someone asks for gift card codes, especially for payment or problem resolution, it\u2019s likely a scam. Always verify requests directly with the person or organization before taking action.<\/em><\/p>\n<p><strong>3. Vishing<\/strong><br \/>\n<strong>Vishing<\/strong> involves phone scams where attackers impersonate trusted organizations, like banks or government agencies, creating urgency\u2014such as reporting <em>\u201csuspicious activity\u201d<\/em>\u2014to pressure victims into sharing sensitive details.<br \/>\n<em>What to Do: No legitimate organization will ever ask over the phone for sensitive information, like PINs or card details. If unsure, hang up and contact the institution directly using a verified number. Always take a moment to verify before acting on any request.<\/em><\/p>\n<p><strong>4. Smishing<\/strong><br \/>\n<strong>Smishing<\/strong> scams use fake text messages that mimic delivery updates or account alerts, often targeting online shoppers, to steal credentials or spread malware. <em>What to Do: Always check the sender\u2019s number. If it doesn\u2019t match the official organization, it\u2019s likely a scam. Verify messages directly with the company before taking action.<\/em><\/p>\n<p><strong>5. Clone Phishing<\/strong><br \/>\n<strong>Clone phishing<\/strong> replicates real emails, like receipts or notifications, but replaces links or attachments with malicious ones. The familiarity makes them easy to fall for. <em>What to Do: Check the sender\u2019s email address and double-check any links by hovering over them. If the email feels off, contact the sender directly using their official contact details.<\/em><\/p>\n<p><strong>6. Social Media Phishing<\/strong><br \/>\n<strong>Social media phishing<\/strong> uses fake or hacked profiles to send messages that mimic giveaways or urgent requests. These scams aim to steal login credentials or personal information. <em>What to Do: Avoid clicking links in unsolicited messages. Verify requests directly with the sender and double-check login pages for authenticity.<\/em><\/p>\n<p><strong>7. Man-in-the-Middle Attacks<\/strong><br \/>\n<strong>Man-in-the-middle attacks<\/strong> happen when hackers, like passwords or banking details, intercept what you send or receive on public Wi-Fi. Using Wi-Fi at places like caf\u00e9s or airports can make your data a target. <em>What to Do: Avoid logging into important accounts on public Wi-Fi. Use a VPN for extra security and look for &#8220;https:\/\/&#8221; on websites to ensure they are encrypted.<\/em><\/p>\n<p><strong>8. Ransomware<\/strong><br \/>\n<strong>Ransomware<\/strong> blocks access to files or devices by encrypting them and then demands payment to unlock them. These attacks often start with <strong>Phishing<\/strong> emails or fake downloads and target personal data like photos or documents.<br \/>\n<em>What to Do: Back up important files offline and avoid clicking on suspicious links or attachments. If attacked, report the incident to relevant authorities and seek professional advice on the next steps.<\/em><\/p>\n<p><strong>9. DNS Spoofing<\/strong><br \/>\n<strong>DNS spoofing<\/strong> redirects users to fake websites that look like real ones. These sites are designed to steal sensitive information like passwords or credit card details. <em>What to Do: Always check the website address carefully before entering any information. Use secure websites with &#8220;https:\/\/&#8221; and consider tools that protect against DNS attacks.<\/em><\/p>\n<p><strong>10. Fake Job Offers<\/strong><br \/>\n<strong>Scammers<\/strong> post fake job offers, often promising high pay or remote work, to steal personal details or money. They may ask for fees or sensitive information, pretending to be real companies. <em>What to Do: Before paying or sharing personal information, ensure the request comes from the right source. Research the company and confirm details through official channels.<\/em><\/p>\n<p>Commenting on the findings, Sascha Pfeiffer, CEO at <strong><a href=\"http:\/\/www.Psono.com\" target=\"_blank\" rel=\"noopener\">Psono.com<\/a><\/strong>, stated, <em>&#8220;AI is changing how scammers operate, making their attacks more personal and harder to spot. They use tools to mimic voices, create fake videos, or send messages that seem to come from trusted contacts. It\u2019s now easier than ever to fall for a scam, whether it\u2019s a text from a friend asking for help or a gift card offer from a favourite store. Staying alert is important, as these scams can lead to serious financial losses. Under no condition should you share very personal data, such as passport details or credit card CVV, via email, phone, or any other method that can be easily accessed by hackers. Additionally, if you hear the voice of a close person asking for help, take extra precautions to verify their identity by asking specific questions or details only they would know, ensuring you\u2019re speaking to the real person.&#8221;<\/em><\/p>\n<p><em>Post Impressions:\u00a0\u00a0 <\/em> <\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24c0d772 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"24c0d772\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-72a5fe25 e-con-full e-flex e-con e-parent\" data-id=\"72a5fe25\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-721226f4 e-con-full e-flex e-con e-child\" data-id=\"721226f4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-35e8cf02 elementor-widget elementor-widget-image\" data-id=\"35e8cf02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"225\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg\" class=\"attachment-medium size-medium wp-image-5079\" alt=\"Image Credit: IfOnlyCommunications | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-1024x768.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-768x576.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2104a559 e-con-full e-flex e-con e-child\" data-id=\"2104a559\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51953c73 elementor-widget elementor-widget-html\" data-id=\"51953c73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-683a9667 elementor-widget elementor-widget-wp-widget-text\" data-id=\"683a9667\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>CYBER Insights \u2013 Helping Keep Small Business CYBERSafe!\u00a0<\/strong><\/p>\n<p>Launched in 2020 by\u00a0<strong><a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=cybersecurity+journalist&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">Cybersecurity Journalist<\/a>\u00a0Iain Fraser<\/strong>\u00a0and his team at\u00a0<a href=\"https:\/\/www.iainfraser.net\/\" target=\"_blank\" rel=\"noopener\"><strong>IfOnly&#8230;<\/strong><\/a> <a href=\"https:\/\/cyberinsights.iainfraser.net\/\" target=\"_blank\" rel=\"noopener\"><strong>CYBERInsights<\/strong><\/a> was developed to be the go-to platform providing definitive, reliable &amp; actionable Cybersecurity News, Intel,\u00a0 Awareness &amp; Training specifically written and curated for <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>Small Business<\/strong><\/a> &amp; Enterprise Owners, Partners and Directors throughout the UK. <span style=\"font-style: italic\">#CyberInsights #CyberSecurity #CyberAttack #CyberAwareness #CyberSecurityAwareness #Compliance #DDoS #Fraud #Ransomware #ScamAlert #SME #SmallBusiness #SmallBusinessOwner #ThreatIntel <\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-29c2725a e-flex e-con-boxed e-con e-parent\" data-id=\"29c2725a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-12b2adab e-con-full e-flex e-con e-child\" data-id=\"12b2adab\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40768dad elementor-widget elementor-widget-image\" data-id=\"40768dad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&#038;offerid=572706.44&#038;subid=0&#038;type=4\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"144\" height=\"144\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Nord_logo_1.png\" class=\"attachment-2048x2048 size-2048x2048 wp-image-12867\" alt=\"NordVPN\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7940bb31 e-con-full e-flex e-con e-child\" data-id=\"7940bb31\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-536e5bd6 elementor-widget elementor-widget-wp-widget-text\" data-id=\"536e5bd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>What is a VPN &amp; Does my SME Need one?<\/strong> A <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/08\/26\/special-feature-vpn\/\" target=\"_blank\" rel=\"noopener\"><strong>VPN<\/strong><\/a> is a Virtual Private Network a method of securing your communications credentials. When it comes to Small and Medium-sized enterprises (<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a>), the choice of <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/08\/26\/special-feature-vpn\/\" target=\"_blank\" rel=\"noopener\"><strong>VPNs<\/strong><\/a> can significantly impact the security and efficiency of their operations.<\/p>\n<p>The\u00a0<b>NordVPN<\/b> service allows you to connect to 5600+ servers in 60+ countries. It secures your Internet data with military-grade encryption, ensures your web activity remains private and helps bypass geographic content restrictions online. \u00a0<strong><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.44&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\">Join\u00a0NordVPN\u00a0Today and\u00a0Save\u00a0up to\u00a073%\u00a0and Get 3 months\u00a0Extra Free<\/a>\u00a0Rude Not to \u2026!<\/strong><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51144e43 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"51144e43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/nordvpn.com\/special\/?utm_medium=affiliate&#038;utm_term=&#038;utm_content=rv_nShY4wLA-emnpSewtfAm9zRdw1TNpcw&#038;utm_campaign=off15&#038;utm_source=aff8398\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-376382d2 e-flex e-con-boxed e-con e-parent\" data-id=\"376382d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d3e066c elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"1d3e066c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-AI-3-768x432.jpg\" alt=\"CI_Feature AI (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-Cloud-Security-1-1-768x432.jpg\" alt=\"CI_Feature Cloud Security (1)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-GDPR-1-1-768x432.jpg\" alt=\"_CI_Feature GDPR (1)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-Identity-Theft-2-768x432.jpg\" alt=\"CI_Feature Identity Theft (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Attack-Mitigation-6-768x432.jpg\" alt=\"CI_Feature Attack Mitigation (6)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Phishing-3-768x432.jpg\" alt=\"CI_Feature Phishing (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Blockchain-5-768x432.jpg\" alt=\"CI_Feature Blockchain (5)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-MFA-2-768x432.jpg\" alt=\"CI_Feature MFA (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-ISO-27001-2-768x432.jpg\" alt=\"CI_Feature Cyber ISO 27001 (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-EU-CRA-2-768x432.jpg\" alt=\"CI_Feature Cyber EU CRA (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Report-Cybercrime-3-768x432.jpg\" alt=\"CI_Report Cybercrime (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"12 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-Compliance-3-768x432.jpg\" alt=\"CI_Feature Cyber Compliance (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"13 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-NIS2-2-768x432.jpg\" alt=\"CI_Feature Cyber NIS2 (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"14 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-MSPs-2-768x432.jpg\" alt=\"CI_Feature MSPs (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"15 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-SaaS-2-768x432.jpg\" alt=\"CI_Feature SaaS (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"16 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Email-Security-1-768x432.jpg\" alt=\"CI_Feature Email Security (1)\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: Sammy-Sander via Pixabay Image Credit: Sammy-Sander via Pixabay Learn More \/&#8230; Image Credit:&#8230;<\/p>\n","protected":false},"author":1,"featured_media":16662,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"","footnotes":""},"categories":[604,440],"tags":[581,439],"ppma_author":[505],"class_list":["post-16660","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scam","category-cyberthreat-intel","tag-aiscams","tag-cyberthreat-intel"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920.jpg",1920,1280,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920-300x200.jpg",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920-768x512.jpg",640,427,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920-1024x683.jpg",640,427,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920-1536x1024.jpg",1536,1024,true],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920.jpg",1920,1280,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920-1024x683.jpg",1024,683,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/12\/scam-4126798_1920-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/scam\/\" rel=\"category tag\">SCAM<\/a> <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" rel=\"category tag\">SME CYBER\/THREAT INTEL<\/a>","tag_info":"SME CYBER\/THREAT INTEL","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/16660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=16660"}],"version-history":[{"count":8,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/16660\/revisions"}],"predecessor-version":[{"id":16674,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/16660\/revisions\/16674"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/16662"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=16660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=16660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=16660"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=16660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}