{"id":18549,"date":"2025-02-19T10:04:02","date_gmt":"2025-02-19T09:04:02","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=18549"},"modified":"2025-02-24T17:52:45","modified_gmt":"2025-02-24T16:52:45","slug":"what-is-a-cybersecurity-journalist","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2025\/02\/19\/what-is-a-cybersecurity-journalist\/","title":{"rendered":"REPORTAGE: What is a Cybersecurity Journalist? Journalist or Blogger &#8211; The Pathway to Authority!"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"18549\" class=\"elementor elementor-18549\">\n\t\t\t\t<div class=\"elementor-element elementor-element-649fdd7e e-flex e-con-boxed e-con e-parent\" data-id=\"649fdd7e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40270280 elementor-widget elementor-widget-html\" data-id=\"40270280\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-37a4ddee e-flex e-con-boxed e-con e-parent\" data-id=\"37a4ddee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6048f80 elementor-widget__width-initial elementor-widget elementor-widget-image-carousel\" data-id=\"6048f80\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;slides_to_show&quot;:&quot;6&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"CYBERPartners\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners1_NordVPN.png\" alt=\"Partners1_NordVPN\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners3_R3.png\" alt=\"Partners3_R3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners2_Zoho.png\" alt=\"Partners2_Zoho\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Plesk.png\" alt=\"Partners4_Plesk\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Ensurety.png\" alt=\"Partners4_Ensurety\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners7_Passware.png\" alt=\"Partners7_Passware\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2b1b8c88 e-con-full e-flex e-con e-parent\" data-id=\"2b1b8c88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-184acab e-con-full e-flex e-con e-child\" data-id=\"184acab\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7eb1385d elementor-widget elementor-widget-image\" data-id=\"7eb1385d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/pixabay.com\/users\/nhattienle94-2999173\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"427\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/photographer-1584840_1920-1024x683.jpg\" class=\"attachment-large size-large wp-image-18551\" alt=\"Practical Small Business Cybersecurity\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/photographer-1584840_1920-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/photographer-1584840_1920-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/photographer-1584840_1920-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/photographer-1584840_1920-1536x1024.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/photographer-1584840_1920.jpg 1920w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Nhat-Tien Le via Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73d2c694 elementor-widget elementor-widget-html\" data-id=\"73d2c694\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114166\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114166\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-320b9bb1 e-con-full e-flex e-con e-child\" data-id=\"320b9bb1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34cc678b elementor-widget elementor-widget-wp-widget-text\" data-id=\"34cc678b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Helping Keep Small Business CYBERSafe!<br \/>\n<\/strong>Gibraltar: Wednesday 19th February 2025 at 11:04 CET<\/p>\n<p><b><strong>CYBERSECURITY JOURNALIST: What is a Cybersecurity Journalist? <\/strong><\/b><br \/>\nBy: <a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=iain+%2B+cybersecurity&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser<\/a> &#8211; <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+journalist&amp;client=firefox-b-d&amp;sca_esv=604417a22f933246&amp;biw=1920&amp;bih=937&amp;sxsrf=ADLYWII9GQo-CShq2VQjmub9bZo3edd4sw%3A1732797372997&amp;ei=vGNIZ_W2PLGgkdUP2Z6JsQc&amp;ved=0ahUKEwj1hIqfhf-JAxUxUKQEHVlPInY4ChDh1QMIDw&amp;uact=5&amp;oq=sme+cybersecurity+journalist&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiHHNtZSBjeWJlcnNlY3VyaXR5IGpvdXJuYWxpc3QyBBAjGCcyCBAAGIAEGKIEMggQABiABBiiBDIIEAAYgAQYogRI4g5QgQhY1AtwAXgBkAEAmAGwAaAB8QSqAQMwLjS4AQPIAQD4AQGYAgOgAtYCwgIHECMYsAMYJ8ICChAAGLADGNYEGEfCAgcQIxiwAhgnmAMAiAYBkAYKkgcDMS4yoAekHQ&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Cybersecurity Journalist<\/a><br \/>\n<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;client=opera&amp;hs=QsT&amp;sca_esv=cd08aac0b4846c63&amp;sxsrf=ADLYWIIaZwnvuQfvJpPCaga2UcqJmvux4A%3A1719554579183&amp;ei=E1J-Zu30Cqbpi-gPva6Q6A8&amp;ved=0ahUKEwityvT-z_2GAxWm9AIHHT0XBP0Q4dUDCBA&amp;uact=5&amp;oq=sme+cybersecurity+news&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiFnNtZSBjeWJlcnNlY3VyaXR5IG5ld3MyBBAjGCcyBBAjGCcyBhAAGBYYHjILEAAYgAQYhgMYigUyCxAAGIAEGIYDGIoFMgsQABiABBiGAxiKBTIIEAAYgAQYogRI0hpQuwdYtBJwAXgBkAEAmAHBAaABkAiqAQMwLja4AQPIAQD4AQGYAgagApcHwgIHECMYsAMYJ8ICChAAGLADGNYEGEfCAgUQABiABJgDAIgGAZAGCZIHBTEuNC4xoAerMw&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">First\u00a0 For Small Business Cybersecurity<br \/>\n<\/a>Google Indexed on 190225 at 12:15 CET<em><br \/>\n#CyberInsights #CyberSecurity #CyberAwareness #CyberSafe #SME #SmallBusiness<br \/>\n<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b6dc93d elementor-widget elementor-widget-wp-widget-text\" data-id=\"5b6dc93d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>What is a Cybersecurity Journalist?<\/strong><\/p>\n<p>A <a href=\"https:\/\/www.google.com\/search?q=cybersecurity+Journalist&amp;rlz=1C1FKPE_enES1123ES1124&amp;oq=cybersecurity+Journalist+&amp;gs_lcrp=EgZjaHJvbWUyCggAEEUYFhgeGDkyBwgBEAAYgAQyBggCEEUYOzIGCAMQRRg7MggIBBAAGBYYHjIICAUQABgWGB4yDQgGEAAYhgMYgAQYigUyDQgHEAAYhgMYgAQYigUyBwgIEAAY7wXSAQk4OTY3ajBqMTWoAgiwAgE&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\"><strong>Cybersecurity Journalist<\/strong><\/a> reports on Cyber threats, hacking incidents, and data security trends. They analyse Cybercrime, Investigate data breaches, and Explain Cybersecurity issues in simple terms for businesses, policymakers, and the public.<\/p>\n<p><strong>Key Responsibilities:<\/strong><\/p>\n<p>\u2714 Investigating cyberattacks, data breaches, and digital espionage.<br \/>\n\u2714 Reporting on cybersecurity policies, regulations, and corporate security practices.<br \/>\n\u2714 Explaining technical topics like malware, ransomware, phishing, and encryption.<br \/>\n\u2714 Interviewing cybersecurity experts, ethical hackers, and industry leaders.<br \/>\n\u2714 Analysing global cyber risks and their impact on businesses and individuals.<\/p>\n<p><strong>Why It Matters<\/strong><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=cybersecurity+Journalist&amp;rlz=1C1FKPE_enES1123ES1124&amp;oq=cybersecurity+Journalist+&amp;gs_lcrp=EgZjaHJvbWUyCggAEEUYFhgeGDkyBwgBEAAYgAQyBggCEEUYOzIGCAMQRRg7MggIBBAAGBYYHjIICAUQABgWGB4yDQgGEAAYhgMYgAQYigUyDQgHEAAYhgMYgAQYigUyBwgIEAAY7wXSAQk4OTY3ajBqMTWoAgiwAgE&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\"><strong>Cybersecurity journalists<\/strong><\/a> play a crucial role in educating the public, exposing cyber threats, and influencing policy decisions. Their work helps businesses stay informed and individuals stay safe online.<\/p>\n<p>\ud83d\udd39<strong> Related Searches:<\/strong> <a href=\"https:\/\/www.google.com\/search?q=cybersecurity+reporting&amp;client=opera&amp;hs=AXk&amp;sca_esv=fc24ddbdfeda5bef&amp;sxsrf=AHTn8zpuLYxJ2LvKVS0prXWvihM8f9gw-g%3A1739955248556&amp;ei=MJy1Z_XZIYj4kdUPzOm9sQM&amp;ved=0ahUKEwj1sY-0rs-LAxUIfKQEHcx0LzYQ4dUDCBA&amp;uact=5&amp;oq=cybersecurity+reporting&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiF2N5YmVyc2VjdXJpdHkgcmVwb3J0aW5nMgoQIxiABBgnGIoFMgsQABiABBiRAhiKBTIFEAAYgAQyCxAAGIAEGJECGIoFMgYQABgWGB4yBhAAGBYYHjIGEAAYFhgeMgYQABgWGB4yBhAAGBYYHjIGEAAYFhgeSIILUPYEWJoIcAF4AZABAJgBiQGgAfwBqgEDMC4yuAEDyAEA-AEBmAIDoAKpAsICChAAGLADGNYEGEeYAwCIBgGQBgiSBwMxLjKgB4MP&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Cybersecurity reporting<\/a>, <a href=\"https:\/\/www.google.com\/search?q=Cyber+threat+journalism&amp;client=opera&amp;hs=EsP&amp;sca_esv=fc24ddbdfeda5bef&amp;sxsrf=AHTn8zq8Hn9tt0Faimxyfi4g0tK1QiJdOg%3A1739955271579&amp;ei=R5y1Z_yAI-XV7M8Pxd_VwAg&amp;ved=0ahUKEwi8wIy_rs-LAxXlKvsDHcVvFYgQ4dUDCBA&amp;uact=5&amp;oq=Cyber+threat+journalism&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiF0N5YmVyIHRocmVhdCBqb3VybmFsaXNtMgYQABgWGB4yCxAAGIAEGIYDGIoFMgsQABiABBiGAxiKBTIFEAAY7wUyBRAAGO8FSL8dUKQGWN8VcAJ4AZABBJgBsQGgAdoOqgEEMC4xNLgBA8gBAPgBAfgBApgCBKAC6QKoAhTCAgcQIxiwAxgnwgIKEAAYsAMY1gQYR8ICChAjGIAEGCcYigXCAgUQABiABMICBxAjGCcY6gLCAg0QLhjHARgnGOoCGK8BwgIUEAAYgAQYkQIYtAIYigUY6gLYAQHCAhQQABiABBjjBBi0AhjpBBjqAtgBAZgDGvEFgPDlR-MOP3iIBgGQBgm6BgYIARABGAGSBwMyLjKgB_eGAQ&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Cyber threat journalism<\/a>, <a href=\"https:\/\/www.google.com\/search?q=Digital+security+news&amp;client=opera&amp;hs=aD5&amp;sca_esv=fc24ddbdfeda5bef&amp;sxsrf=AHTn8zqqMchASa6_LtvZXtcTbU7Hr-YFmA%3A1739955317241&amp;ei=dZy1Z_yvDvDYkdUPm9PjsQ4&amp;ved=0ahUKEwi8vu_Urs-LAxVwbKQEHZvpOOYQ4dUDCBA&amp;uact=5&amp;oq=Digital+security+news&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiFURpZ2l0YWwgc2VjdXJpdHkgbmV3czIFEAAYgAQyBhAAGBYYHjIGEAAYFhgeMgYQABgWGB4yBhAAGBYYHjIGEAAYFhgeMgYQABgWGB4yBhAAGBYYHjIGEAAYFhgeMgYQABgWGB5IhRBQAFiRBXABeAGQAQCYAYsBoAGLAaoBAzAuMbgBA8gBAPgBAfgBApgCAqACpwGoAhLCAgcQIxgnGOoCwgINEC4YxwEYJxjqAhivAcICFBAAGIAEGJECGLQCGIoFGOoC2AEBwgIUEAAYgAQY4wQYtAIY6QQY6gLYAQGYAxDxBW6kDD4ydd_fugYGCAEQARgBkgcDMS4xoAfZBw&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Digital security news<\/a><\/p>\n<p>Want to become a Cybersecurity Journalist? I myself am an accredited Cybersecurity Journalist. Every day I receive emails from all over the world asking how to become a Cybersecurity Journalist. So I have produced a series of 16 Professional Modules ranked as beginner, intermediate and advanced. To learn how you can become a Cybersecurity Journalist from a professional. Drop me an email to <a href=\"mailto:iain@iainfraser.net\">iain@iainfraser.net<\/a> I was always respond!<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58940165 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"58940165\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/hire-me\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Hire Me!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7814ac1 e-flex e-con-boxed e-con e-parent\" data-id=\"7814ac1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-907810d elementor-grid-4 elementor-grid-tablet-2 elementor-grid-mobile-1 elespare-section-title-elespare-left elementor-widget elementor-widget-post-grid\" data-id=\"907810d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;columns&quot;:&quot;4&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;}\" data-widget_type=\"post-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elespare-widget-title-section title-style-2 elespare-left\">\n\t\t\t\t<h2 class=\"elespare-widget-title\">\n\t\t\t\t\t<span class=\"elespare-section-title-before\"><\/span>\n\t\t\t\t\t<span class=\"elespare-section-title\">Reportage by Iain Fraser Journalist<\/span>\n\t\t\t\t\t<span class=\"elespare-section-title-after\"><\/span>\n\t\t\t\t<\/h2>\n\t\t\t<\/div>    <div class=\"elespare-grid-wrap grid-layout has-background  elespare-has-equal-height\">\n\n      <div class=\"elespare-posts-wrap  elementor-grid grid-style-1  elespare-image-zoom elespare-light \">\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/02\/14\/china-state-actor-salt-typhoon\/\" aria-label=\"PST warning: Salt Typhoon and the contractor-linked model behind critical infrastructure hacking\">\n        <img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/flag-china_compressed-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"PST warning: Salt Typhoon and the contractor-linked model behind critical infrastructure hacking\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/flag-china_compressed-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/flag-china_compressed-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/flag-china_compressed-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/flag-china_compressed-1536x1024.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/flag-china_compressed-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/reportage\/\" aria-label=\"View all posts in REPORTAGE category\">\n                      \n                        REPORTAGE\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/02\/14\/china-state-actor-salt-typhoon\/\"> <span>PST warning: Salt Typhoon and the contractor-linked model behind critical infrastructure hacking<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              February 14, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/02\/07\/geo-imperative-of-cyber\/\" aria-label=\"The Geopolitical Imperative of Cybersecurity: Navigating Risks and Opportunities for EU Corporates\">\n        <img loading=\"lazy\" width=\"300\" height=\"210\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/cybersecurity-global-data-protection-300x210.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"The Geopolitical Imperative of Cybersecurity: Navigating Risks and Opportunities for European Corporates\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/cybersecurity-global-data-protection-300x210.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/cybersecurity-global-data-protection-1024x716.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/cybersecurity-global-data-protection-768x537.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/cybersecurity-global-data-protection.jpg 1096w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/reportage\/\" aria-label=\"View all posts in REPORTAGE category\">\n                      \n                        REPORTAGE\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/02\/07\/geo-imperative-of-cyber\/\"> <span>The Geopolitical Imperative of Cybersecurity: Navigating Risks and Opportunities for EU Corporates<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              February 7, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/31\/the-emergence-of-cybersecurity-in-geopolitics\/\" aria-label=\"Reportage The Emergence of Cybersecurity as a Major Geopolitical Factor\">\n        <img loading=\"lazy\" width=\"300\" height=\"169\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/data-center-facility-employing-deep-learning-technology_compressed-300x169.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Reportage The Emergence of Cybersecurity as a Major Geopolitical Factor - What to Know and Do Now.\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/data-center-facility-employing-deep-learning-technology_compressed-300x169.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/data-center-facility-employing-deep-learning-technology_compressed-1024x576.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/data-center-facility-employing-deep-learning-technology_compressed-768x432.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/data-center-facility-employing-deep-learning-technology_compressed-1536x864.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/data-center-facility-employing-deep-learning-technology_compressed-2048x1152.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/reportage\/\" aria-label=\"View all posts in REPORTAGE category\">\n                      \n                        REPORTAGE\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/31\/the-emergence-of-cybersecurity-in-geopolitics\/\"> <span>Reportage The Emergence of Cybersecurity as a Major Geopolitical Factor<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 31, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/24\/russian-hacktivist-disruption\/\" aria-label=\"REPORTAGE: Hacktivist Disruption &#8211; What You Need to Know About Russian\u2011Aligned Cyber Attacks\">\n        <img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/anonymous-person-with-mask-asks-ransom-russian-governmental-hacking-room_compressed-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"REPORTAGE: Hacktivist Disruption - What You Need to Know About Russian Aligned Cyber Attacks\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/anonymous-person-with-mask-asks-ransom-russian-governmental-hacking-room_compressed-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/anonymous-person-with-mask-asks-ransom-russian-governmental-hacking-room_compressed-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/anonymous-person-with-mask-asks-ransom-russian-governmental-hacking-room_compressed-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/anonymous-person-with-mask-asks-ransom-russian-governmental-hacking-room_compressed-1536x1024.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/anonymous-person-with-mask-asks-ransom-russian-governmental-hacking-room_compressed-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/ncsc\/\" aria-label=\"View all posts in NCSC category\">\n                      \n                        NCSC\n                      <\/a>\n                  <\/li><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/reportage\/\" aria-label=\"View all posts in REPORTAGE category\">\n                      \n                        REPORTAGE\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/24\/russian-hacktivist-disruption\/\"> <span>REPORTAGE: Hacktivist Disruption &#8211; What You Need to Know About Russian\u2011Aligned Cyber Attacks<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 24, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n              <\/div>\n    <\/div>\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9471391 e-flex e-con-boxed e-con e-parent\" data-id=\"9471391\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-69be1ce e-con-full e-flex e-con e-child\" data-id=\"69be1ce\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a4bf28b elementor-widget elementor-widget-image\" data-id=\"a4bf28b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"400\" height=\"265\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/04\/IF_Kenya_Cropped.png\" class=\"attachment-large size-large wp-image-6370\" alt=\"Nairobi National Park Nairobi, Kenya IainFraser\u00a91996\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/04\/IF_Kenya_Cropped.png 400w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/04\/IF_Kenya_Cropped-300x199.png 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-45c2131 e-con-full e-flex e-con e-child\" data-id=\"45c2131\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8bd381 elementor-widget elementor-widget-html\" data-id=\"e8bd381\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6298499 elementor-widget elementor-widget-wp-widget-text\" data-id=\"6298499\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>ABOUT IAIN FRASER \u2013<\/strong> I am a Gibraltar based, Accredited Journalist, (*NUJ, IFJ &amp; ONA) Authority Writer,\u00a0 Commentator &amp; Publisher of <a href=\"https:\/\/cyberinsights.iainfraser.net\" target=\"_blank\" rel=\"noopener\"><strong>CYBERinsights<\/strong><\/a> and cover all aspects of <strong>Cybersecurity<\/strong> [Awareness, Threat Management, Best Practice Compliance &amp; Mitigation] and report throughout Europe &amp; the UK<\/p>\n<p>LinkedIn Bio: <a href=\"https:\/\/www.linkedin.com\/in\/iainfraserjournalist\/\" target=\"_blank\" rel=\"noopener\">IainFraserJournalist<\/a><br \/>\nEmail: <a href=\"mailto:iain@iainfraser.net\">iain@iainfraser.net<\/a> | <a href=\"http:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">www.iainfraser.net<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11c5cd6 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"11c5cd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"mailto:iain@iainfraser.net\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">HIRE ME!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-39f3c2d9 e-flex e-con-boxed e-con e-parent\" data-id=\"39f3c2d9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48cc949e elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"48cc949e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-AI-3-768x432.jpg\" alt=\"CI_Feature AI (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-Cloud-Security-1-1-768x432.jpg\" alt=\"CI_Feature Cloud Security (1)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-GDPR-1-1-768x432.jpg\" alt=\"_CI_Feature GDPR (1)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-Identity-Theft-2-768x432.jpg\" alt=\"CI_Feature Identity Theft (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Attack-Mitigation-6-768x432.jpg\" alt=\"CI_Feature Attack Mitigation (6)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Phishing-3-768x432.jpg\" alt=\"CI_Feature Phishing (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Blockchain-5-768x432.jpg\" alt=\"CI_Feature Blockchain (5)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-MFA-2-768x432.jpg\" alt=\"CI_Feature MFA (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-ISO-27001-2-768x432.jpg\" alt=\"CI_Feature Cyber ISO 27001 (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-EU-CRA-2-768x432.jpg\" alt=\"CI_Feature Cyber EU CRA (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Report-Cybercrime-3-768x432.jpg\" alt=\"CI_Report Cybercrime (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"12 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-Compliance-3-768x432.jpg\" alt=\"CI_Feature Cyber Compliance (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"13 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-NIS2-2-768x432.jpg\" alt=\"CI_Feature Cyber NIS2 (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"14 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-MSPs-2-768x432.jpg\" alt=\"CI_Feature MSPs (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"15 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-SaaS-2-768x432.jpg\" alt=\"CI_Feature SaaS (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"16 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Email-Security-1-768x432.jpg\" alt=\"CI_Feature Email Security (1)\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: Nhat-Tien Le via Pixabay Hire Me! Reportage by Iain Fraser Journalist Reportage REPORTAGE:&#8230;<\/p>\n","protected":false},"author":1,"featured_media":18551,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"","footnotes":""},"categories":[594],"tags":[595],"ppma_author":[505],"class_list":["post-18549","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-reportage","tag-reportage"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/photographer-1584840_1920.jpg",1920,1280,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/photographer-1584840_1920-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/photographer-1584840_1920-300x200.jpg",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/photographer-1584840_1920-768x512.jpg",640,427,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/photographer-1584840_1920-1024x683.jpg",640,427,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/photographer-1584840_1920-1536x1024.jpg",1536,1024,true],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/photographer-1584840_1920.jpg",1920,1280,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/photographer-1584840_1920-1024x683.jpg",1024,683,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/photographer-1584840_1920-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/reportage\/\" rel=\"category tag\">REPORTAGE<\/a>","tag_info":"REPORTAGE","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/18549","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=18549"}],"version-history":[{"count":22,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/18549\/revisions"}],"predecessor-version":[{"id":18903,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/18549\/revisions\/18903"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/18551"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=18549"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=18549"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=18549"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=18549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}