{"id":17945,"date":"2025-02-05T12:18:55","date_gmt":"2025-02-05T11:18:55","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=17945"},"modified":"2025-02-05T12:48:36","modified_gmt":"2025-02-05T11:48:36","slug":"best-practice-advice","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2025\/02\/05\/best-practice-advice\/","title":{"rendered":"BEST PRACTICE: Protecting your Business in an evolving Threat landscape"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"17945\" class=\"elementor elementor-17945\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a47838d e-flex e-con-boxed e-con e-parent\" data-id=\"a47838d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a91e96e elementor-widget elementor-widget-html\" data-id=\"3a91e96e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-284a8e72 e-flex e-con-boxed e-con e-parent\" data-id=\"284a8e72\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46c0d9a1 elementor-widget__width-initial elementor-widget elementor-widget-image-carousel\" data-id=\"46c0d9a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;slides_to_show&quot;:&quot;6&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"CYBERPartners\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners1_NordVPN.png\" alt=\"Partners1_NordVPN\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners3_R3.png\" alt=\"Partners3_R3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners2_Zoho.png\" alt=\"Partners2_Zoho\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Plesk.png\" alt=\"Partners4_Plesk\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Ensurety.png\" alt=\"Partners4_Ensurety\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners7_Passware.png\" alt=\"Partners7_Passware\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7482a1db e-con-full e-flex e-con e-parent\" data-id=\"7482a1db\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-48094a20 e-con-full e-flex e-con e-child\" data-id=\"48094a20\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c560253 elementor-widget elementor-widget-image\" data-id=\"c560253\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"300\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/SME-Best-Practice-Advice-080-300x300.jpg\" class=\"attachment-medium size-medium wp-image-17965\" alt=\"UK Small Business Cybersecurity\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/SME-Best-Practice-Advice-080-300x300.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/SME-Best-Practice-Advice-080-1024x1024.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/SME-Best-Practice-Advice-080-150x150.jpg 150w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/SME-Best-Practice-Advice-080-768x768.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/SME-Best-Practice-Advice-080.jpg 1080w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-252d20b5 e-con-full e-flex e-con e-child\" data-id=\"252d20b5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4034b8f0 elementor-widget elementor-widget-html\" data-id=\"4034b8f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27e4ced0 elementor-widget elementor-widget-wp-widget-text\" data-id=\"27e4ced0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Cybersecurity Best Practices for UK Small Businesses &#8211; Protecting Your Business in an Evolving Threat Landscape<\/strong><\/p>\n<p>In today\u2019s digital economy, UK small businesses are prime targets for cybercriminals. Unlike large enterprises with dedicated cybersecurity teams, smaller businesses often lack the resources to defend against cyber threats, making them vulnerable to attacks. Implementing robust cybersecurity measures is no longer optional\u2014it\u2019s essential to safeguarding operations, protecting customer data, and maintaining trust. Here\u2019s how UK small businesses can strengthen their defences.<\/p>\n<p><strong>Understanding the UK Cybersecurity Landscape<\/strong><\/p>\n<p>The cyber threat landscape is constantly evolving. From ransomware and phishing scams to insider threats, small businesses must stay ahead of emerging risks. The UK government, alongside organisations such as the National Cyber Security Centre (NCSC), provides resources to help businesses navigate these challenges. One of the most effective starting points is the Cyber Essentials Scheme.<\/p>\n<p><strong>Cyber Essentials: A Baseline for Security<\/strong><\/p>\n<p>The Cyber Essentials certification is a government-backed initiative that helps UK businesses protect themselves against common cyber threats. Achieving certification demonstrates a commitment to cybersecurity, builds customer confidence, and may even be a prerequisite for securing certain government contracts.<\/p>\n<p><strong>Key Benefits of Cyber Essentials Certification:<\/strong><\/p>\n<p>* Protection against common threats like malware, phishing, and hacking attempts.<br \/>\n* Enhanced understanding of cybersecurity risks and mitigation strategies.<br \/>\n* Competitive advantage by demonstrating a proactive security approach.<br \/>\n* Core Cybersecurity Best Practices for UK SMEs<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b3c05be e-flex e-con-boxed e-con e-parent\" data-id=\"b3c05be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-325d921 e-con-full e-flex e-con e-child\" data-id=\"325d921\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0b251b1 e-con-full e-flex e-con e-child\" data-id=\"0b251b1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ead901 elementor-widget elementor-widget-image\" data-id=\"3ead901\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"366\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/imagebot_04_02_2025-1024x585.jpg\" class=\"attachment-large size-large wp-image-17998\" alt=\"Small Business Cybersecurity Platform\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/imagebot_04_02_2025-1024x585.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/imagebot_04_02_2025-300x171.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/imagebot_04_02_2025-768x439.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/imagebot_04_02_2025.jpg 1344w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-83cd993 e-con-full e-flex e-con e-parent\" data-id=\"83cd993\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6cd1e5b e-con-full e-flex e-con e-child\" data-id=\"6cd1e5b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-47ba876 e-con-full e-flex e-con e-child\" data-id=\"47ba876\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1883809 elementor-widget elementor-widget-wp-widget-text\" data-id=\"1883809\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>1. Strengthening Access Controls<\/strong><\/p>\n<p>Restricting access to sensitive systems is crucial to reducing the risk of breaches.<\/p>\n<p><strong>Best practices:<\/strong><\/p>\n<p>* Implement role-based access control (RBAC) and least privilege policies<br \/>\n* Regularly review and update user permissions.<br \/>\n* Avoid shared logins; assign unique user credentials for accountability.<\/p>\n<p><strong>2. Enhancing Password Security<\/strong><\/p>\n<p>Weak passwords remain one of the biggest security risks for businesses.<\/p>\n<p><strong>Best practices:<\/strong><\/p>\n<p>* Enforce strong password policies (mix of letters, numbers, and symbols).<br \/>\n* Enable multi-factor authentication (MFA) for critical accounts.<br \/>\n* Discourage password reuse across different platforms.<\/p>\n<p>Fact: Over 80% of hacking-related breaches involve compromised or weak passwords (Verizon Data Breach Investigations Report).<\/p>\n<p><strong>3. Deploying Effective Firewalls<\/strong><\/p>\n<p>Firewalls act as a first line of defence against external threats.<\/p>\n<p><strong>Best practices:<\/strong><\/p>\n<p>* Deploy network and host-based firewalls for layered security.<br \/>\n* Regularly update firewall configurations to address new threats.<br \/>\n* Monitor firewall logs to detect suspicious activity.<\/p>\n<p><strong>4. Ensuring Secure System Configurations<\/strong><\/p>\n<p>Default system settings can expose businesses to unnecessary risks.<\/p>\n<p><strong>Best practices:<\/strong><\/p>\n<p>*Disable unnecessary software and services.<br \/>\n* Change default passwords on all systems and devices.<br \/>\n*Conduct regular security audits to ensure configurations remain secure.<\/p>\n<p><strong>5. Keeping Software Updated<\/strong><\/p>\n<p>Cybercriminals exploit vulnerabilities in outdated software.<\/p>\n<p><strong>Best practices:<\/strong><\/p>\n<p>* Enable automatic updates where possible.<br \/>\n* Regularly check and apply patches for operating systems and applications.<br \/>\n* Prioritise updates addressing critical security vulnerabilities.<br \/>\n*The NCSC reports that timely patching can prevent up to 80% of attacks exploiting known vulnerabilities.<\/p>\n<p><strong>6. Implementing Robust Malware Protection<\/strong><\/p>\n<p>Malware can disrupt operations and compromise sensitive data.<\/p>\n<p><strong>Best practices:<\/strong><\/p>\n<p>* Install reputable anti-malware software on all devices.<br \/>\n* Keep virus definitions up to date to detect emerging threats.<br \/>\n* Train staff to recognise malicious links and email attachments.<\/p>\n<p>Fact: 39% of UK businesses reported a cyberattack in the last 12 months<\/p>\n<p>Building a Security-Conscious Workforce<\/p>\n<p><strong>7. Employee Training and Awareness<\/strong><\/p>\n<p>Human error is a leading cause of cybersecurity breaches.<\/p>\n<p><strong>Best practices:<\/strong><\/p>\n<p>* Conduct regular cybersecurity awareness training.<br \/>\n* Provide updates on emerging threats and response strategies.<br \/>\n* Foster a culture of vigilance where employees report suspicious activity<\/p>\n<p><strong>8. Developing an Incident Response Plan<\/strong><\/p>\n<p>A well-defined response plan minimises damage and accelerates recovery.<\/p>\n<p><strong>Best practices:<\/strong><\/p>\n<p>* Assign clear roles and responsibilities for incident handling.<br \/>\n* Establish communication protocols for notifying stakeholders.<br \/>\n* Regularly test and update the plan to maintain effectiveness.<br \/>\n* Leveraging Technology and External Support<\/p>\n<p><strong>9. Secure Cloud Adoption<\/strong><\/p>\n<p>Cloud services offer flexibility but require secure configurations.<\/p>\n<p><strong>Best practices:<\/strong><\/p>\n<p>* Choose trusted cloud providers with strong security features.<br \/>\n* Understand the shared responsibility model in cloud security.<br \/>\n* Encrypt sensitive data stored in the cloud.<\/p>\n<p><strong>10. Seeking Professional Assistance<\/strong><\/p>\n<p>Many UK SMEs lack in-house cybersecurity expertise.<\/p>\n<p><strong>Options:<\/strong><\/p>\n<p>* Consult cybersecurity specialists to assess and mitigate risks.<br \/>\n* Engage Managed Security Service Providers (MSSPs) for ongoing monitoring.<br \/>\n* Join industry security networks to stay informed.<br \/>\n* Compliance and Regulatory Considerations<\/p>\n<p><strong>11. Adhering to Data Protection Laws<\/strong><\/p>\n<p>Compliance with GDPR and UK data protection laws is non-negotiable.<\/p>\n<p><strong>Best practices:<\/strong><\/p>\n<p>Understand the data you collect and ensure it\u2019s securely processed.<\/p>\n<p>* Implement data retention and disposal policies.<br \/>\n* Maintain transparency in how customer data is handled.<br \/>\n* Non-compliance with GDPR can result in severe fines and reputational damage.<br \/>\n* Leadership and Cybersecurity Commitment<\/p>\n<p><strong>12. Executive Buy-In and Continuous Monitoring<\/strong><\/p>\n<p>Cybersecurity must be a leadership priority.<\/p>\n<p><strong>Best practices:<\/strong><\/p>\n<p>* Allocate adequate resources for cybersecurity initiatives.<br \/>\n* Integrate security into business strategy and risk management.<br \/>\n* Stay updated on emerging threats and adapt defences accordingly.<br \/>\n* Strengthening Your Cyber Resilience<\/p>\n<p>By implementing these cybersecurity best practices, UK small businesses can significantly reduce their risk exposure while building customer trust. Proactive security measures not only safeguard business operations but also create a competitive advantage in today\u2019s digital-first landscape.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c57c0e7 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"c57c0e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">DOWNLOAD \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-271f08f e-flex e-con-boxed e-con e-parent\" data-id=\"271f08f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9708955 e-con-full e-flex e-con e-child\" data-id=\"9708955\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0aff1b7 elementor-widget elementor-widget-image\" data-id=\"0aff1b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ensurety.co.uk\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"200\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/ensurety_logo.jpeg\" class=\"attachment-2048x2048 size-2048x2048 wp-image-16381\" alt=\"Are you GDPR Compliant?\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/ensurety_logo.jpeg 200w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/ensurety_logo-150x150.jpeg 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-229d8b7 e-con-full e-flex e-con e-child\" data-id=\"229d8b7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7290ecb elementor-widget elementor-widget-wp-widget-text\" data-id=\"7290ecb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>GDPR Training &amp; Audits &#8211; <\/strong>Your business&#8217;s reputation is everything. If you&#8217;re not <strong>GDPR<\/strong> compliant, there is much more at stake for your company than a fine. Without your reputation and proof that you can offer your clients\/customers complete privacy and protection, you could be left out in the cold. Our online course offers you a human approach to training while being informative and easy to follow. We also offer in-house training with Keith, who has been involved in the development of the General Data Protection Regulation with both the UK Information Commissioner&#8217;s Office and the Internet Advertising Bureau. As well as training, we are able to run full <strong>GDPR<\/strong> audits on your businesses terms and conditions and privacy policies.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c361852 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"c361852\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.ensurety.co.uk\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">LEARN MORE\/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c5f3873 e-con-full e-flex e-con e-parent\" data-id=\"c5f3873\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c2c0151 e-con-full e-flex e-con e-child\" data-id=\"c2c0151\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-29711e5 elementor-widget elementor-widget-image\" data-id=\"29711e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"225\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg\" class=\"attachment-medium size-medium wp-image-5079\" alt=\"Image Credit: IfOnlyCommunications | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-1024x768.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-768x576.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ace1fa8 e-con-full e-flex e-con e-child\" data-id=\"ace1fa8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd3a5ef elementor-widget elementor-widget-html\" data-id=\"fd3a5ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b3e90f elementor-widget elementor-widget-wp-widget-text\" data-id=\"2b3e90f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>For further guidance, Cybersecurity Best Practice Advice to help keep your Small Business Cybersafe<\/strong> head over to <strong><a href=\"https:\/\/cyberinsights.iainfraser.net\" target=\"_blank\" rel=\"noopener\">CYBERInsghts<\/a><\/strong>\u00a0 or Join <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\"><strong>CYBERConfidential<\/strong><\/a> Free Now! &amp; Access my <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/forum\/sign-up\/\" target=\"_blank\" rel=\"noopener\"><strong>SME Cyber Forum<\/strong><\/a> &#8211; Read, Learn, Engage, Share &#8230;<\/p>\n<p>The Latest <strong>SME<\/strong> Cybersecurity News, Threat Intelligence &amp; Analysis, Timely Scam Alerts, Best-practice Compliance, Mitigation &amp; Free to use Resources specifically curated for UK Based <strong>SMEs<\/strong> in a Single Weekly Email direct to your Inbox or Smart Device together with Unrestricted Free Access to our entire <strong>SME<\/strong> Cyber Knowledge &amp; Tutorial Library. <span style=\"font-style: italic\">#CyberInsights #CyberSecurity #CyberAttack #CyberAwareness\u00a0 #Compliance #DDoS #Fraud #Ransomware #ScamAlert #SME #SmallBusiness #SmallBusinessOwner #ThreatIntel <\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-65b6e23 e-flex e-con-boxed e-con e-parent\" data-id=\"65b6e23\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74ce86b5 elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"74ce86b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-AI-3-768x432.jpg\" alt=\"CI_Feature AI (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-Cloud-Security-1-1-768x432.jpg\" alt=\"CI_Feature Cloud Security (1)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-GDPR-1-1-768x432.jpg\" alt=\"_CI_Feature GDPR (1)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-Identity-Theft-2-768x432.jpg\" alt=\"CI_Feature Identity Theft (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Attack-Mitigation-6-768x432.jpg\" alt=\"CI_Feature Attack Mitigation (6)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Phishing-3-768x432.jpg\" alt=\"CI_Feature Phishing (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Blockchain-5-768x432.jpg\" alt=\"CI_Feature Blockchain (5)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-MFA-2-768x432.jpg\" alt=\"CI_Feature MFA (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-ISO-27001-2-768x432.jpg\" alt=\"CI_Feature Cyber ISO 27001 (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-EU-CRA-2-768x432.jpg\" alt=\"CI_Feature Cyber EU CRA (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Report-Cybercrime-3-768x432.jpg\" alt=\"CI_Report Cybercrime (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"12 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-Compliance-3-768x432.jpg\" alt=\"CI_Feature Cyber Compliance (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"13 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-NIS2-2-768x432.jpg\" alt=\"CI_Feature Cyber NIS2 (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"14 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-MSPs-2-768x432.jpg\" alt=\"CI_Feature MSPs (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"15 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-SaaS-2-768x432.jpg\" alt=\"CI_Feature SaaS (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"16 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Email-Security-1-768x432.jpg\" alt=\"CI_Feature Email Security (1)\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>DOWNLOAD \/&#8230; LEARN MORE\/&#8230; Image Credit: IfOnlyCommunications<\/p>\n","protected":false},"author":1,"featured_media":17965,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"","footnotes":""},"categories":[587,516],"tags":[588,517],"ppma_author":[505],"class_list":["post-17945","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practice-advice-cyberawareness","category-cyberawareness","tag-bestpractice","tag-cyberawareness"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/SME-Best-Practice-Advice-080.jpg",1080,1080,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/SME-Best-Practice-Advice-080-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/SME-Best-Practice-Advice-080-300x300.jpg",300,300,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/SME-Best-Practice-Advice-080-768x768.jpg",640,640,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/SME-Best-Practice-Advice-080-1024x1024.jpg",640,640,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/SME-Best-Practice-Advice-080.jpg",1080,1080,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/SME-Best-Practice-Advice-080.jpg",1080,1080,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/SME-Best-Practice-Advice-080-1024x1024.jpg",1024,1024,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/SME-Best-Practice-Advice-080-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberawareness\/best-practice-advice-cyberawareness\/\" rel=\"category tag\">BEST PRACTICE ADVICE<\/a> <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberawareness\/\" rel=\"category tag\">SME CYBER AWARENESS<\/a>","tag_info":"SME CYBER AWARENESS","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/17945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=17945"}],"version-history":[{"count":34,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/17945\/revisions"}],"predecessor-version":[{"id":18017,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/17945\/revisions\/18017"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/17965"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=17945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=17945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=17945"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=17945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}