{"id":18977,"date":"2025-03-06T06:00:31","date_gmt":"2025-03-06T05:00:31","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=18977"},"modified":"2025-03-06T11:33:31","modified_gmt":"2025-03-06T10:33:31","slug":"cyberinsights-for-060325","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2025\/03\/06\/cyberinsights-for-060325\/","title":{"rendered":"CYBER INSIGHTS: Thursday 06 March 2025 \u2013 Today\u2019s SME Cybersecurity News &#038; Intel"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"18977\" class=\"elementor elementor-18977\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3eb006f3 e-flex e-con-boxed e-con e-parent\" data-id=\"3eb006f3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a305af0 elementor-widget elementor-widget-html\" data-id=\"4a305af0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-25e92f55 e-flex e-con-boxed e-con e-parent\" data-id=\"25e92f55\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a9c5c8 elementor-widget__width-initial elementor-widget elementor-widget-image-carousel\" data-id=\"5a9c5c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;slides_to_show&quot;:&quot;6&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"CYBERPartners\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners1_NordVPN.png\" alt=\"Partners1_NordVPN\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners3_R3.png\" alt=\"Partners3_R3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners2_Zoho.png\" alt=\"Partners2_Zoho\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Plesk.png\" alt=\"Partners4_Plesk\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Ensurety.png\" alt=\"Partners4_Ensurety\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners7_Passware.png\" alt=\"Partners7_Passware\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/CIP-Logo.png\" alt=\"CIP Logo\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/Red_Button_Slider.png\" alt=\"Red_Button_Slider\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/FoxTech_Partner_Logo_Banner.png\" alt=\"FoxTech_Partner_Logo_Banner\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e94c676 e-con-full e-flex e-con e-parent\" data-id=\"3e94c676\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3993fb7f e-con-full e-flex e-con e-child\" data-id=\"3993fb7f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51d8f89 elementor-widget elementor-widget-html\" data-id=\"51d8f89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114166\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114166\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-17fb80c1 e-con-full e-flex e-con e-child\" data-id=\"17fb80c1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3858e30 elementor-widget elementor-widget-html\" data-id=\"3858e30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1abece96 elementor-widget elementor-widget-wp-widget-text\" data-id=\"1abece96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Helping Keep Small Business CYBERSafe!<br \/>\n<\/strong>Gibraltar: Thursday 06 March 2025 at 07:00 CET<\/p>\n<p><strong>CYBER INSIGHTS: <\/strong><strong>Welcome to Today&#8217;s Edition of CYBERInsights &#8211; The Roundup of Today\u00b4s UK Small Business Cybersecurity Best Practice &amp; Advice &#8230;<\/strong><br \/>\nWritten &amp; Curated By\u00a0<a href=\"https:\/\/www.google.com\/search?q=cybersecurity+journalist&amp;oq=Cybersec&amp;gs_lcrp=EgZjaHJvbWUqCQgAEEUYOxiABDIJCAAQRRg7GIAEMgYIARBFGDsyBwgCEAAYgAQyBggDEEUYQDIGCAQQRRg5MgcIBRAAGIAEMgcIBhAAGIAEMgcIBxAAGIAE0gEJMzc1MmowajE1qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser \u2013 Cybersecurity Journalist<\/a><br \/>\n<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a> &#8211; <a href=\"https:\/\/www.google.com\/search?q=sme+cyber+insights&amp;sca_esv=be29cc62fc8e0244&amp;sxsrf=AHTn8zoCB6dZRT9bnajtMwrWSYf5UJQPMg%3A1740146973252&amp;ei=HYm4Z--ID_CokdUP2vjq6QU&amp;gs_ssp=eJzj4tVP1zc0LLc0MsrNqUo3YLRSMahIMUhOSjMzMEm2MDIEsqwMKkwN0kzNzVPSLI0NEy3MjS29hIpzUxWSK5NSixQy84oz0zNKigEDqBYY&amp;oq=sme+cyber+insight&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiEXNtZSBjeWJlciBpbnNpZ2h0KgIICTIKECMYgAQYJxiKBTIEECMYJzIEECMYJzILEC4YgAQYxwEYrwEyCxAAGIAEGIYDGIoFMgsQABiABBiGAxiKBTILEAAYgAQYhgMYigUyCBAAGIAEGKIEMggQABiABBiiBDIaEC4YgAQYxwEYrwEYlwUY3AQY3gQY4ATYAQFIpTpQlwtYlwtwAXgAkAEAmAGuAaABrgGqAQMwLjG4AQHIAQD4AQGYAgKgAuABwgIHECMYsAMYJ8ICDhAuGIAEGLADGMcBGK8BwgIOEAAYgAQYsAMYhgMYigXCAggQABiwAxjvBcICCxAAGIAEGLADGKIEmAMAiAYBkAYJugYGCAEQARgUkgcFMS4wLjGgB8kM&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">The UK Small Business Cybersecurity Network<\/a><br \/>\n<em>#CyberInsights #CyberSecurity #CyberAwareness #CyberSafe #SME #SmallBusiness<br \/>\n<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-57441a74 e-con-full e-flex e-con e-child\" data-id=\"57441a74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1fa39e90 elementor-widget elementor-widget-wp-widget-text\" data-id=\"1fa39e90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>1). CYBER INSURANCE:\u00a0 <\/strong><strong>Cyberattacks have inflicted a staggering \u00a344 billion (\u20ac52.64 billion) in revenue losses on UK businesses over the past five years, according to a report by insurance broker\u00a0<a href=\"https:\/\/www.howdeninsurance.co.uk\/small-business\/\" target=\"_blank\" rel=\"noopener\">Howden<\/a>. <\/strong>Over half (52%) of private sector companies reported experiencing at least one attack during this period, with the financial impact averaging 1.9% of annual revenue per business. <a href=\"https:\/\/www.howdengroupholdings.com\/news\/cyber-attacks-have-cost-uk-businesses-44bn-in-the-last-five-years-according-to-howden\" target=\"_blank\" rel=\"noopener\">The report<\/a>\u00a0highlights that businesses with annual revenues exceeding \u00a3100 million are the most frequent targets, underscoring the vulnerabilities faced by larger enterprises. However, the findings also reveal significant opportunities for cost reduction.\u00a0<strong><a href=\"https:\/\/www.howdeninsurance.co.uk\/small-business\/\" target=\"_blank\" rel=\"noopener\">Howden<\/a><\/strong>\u00a0estimates that companies could slash\u00a0<strong>Cyberattack<\/strong>-related losses by up to 75%\u2014equivalent to \u00a330 billion\u2014by adopting basic\u00a0<strong>Cybersecurity<\/strong> measures more broadly &#8230;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-530c72b2 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"530c72b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.howdengroupholdings.com\/news\/cyber-attacks-have-cost-uk-businesses-44bn-in-the-last-five-years-according-to-howden\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">LEARN MORE \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59e47314 elementor-widget elementor-widget-wp-widget-text\" data-id=\"59e47314\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>2).\u00a0<\/strong><strong>CLOUD SECURITY: AI \u2013 AI Surge Predicted to Fuel 20% Growth in Global Cloud Spending \u2013 Research\u00a0<\/strong>Global\u00a0<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/08\/26\/special-feature-what-is-cloud-security\/\" target=\"_blank\" rel=\"noopener\"><strong>cloud<\/strong><\/a> infrastructure services spending reached $86 billion in Q4 2024, marking a 20% year-on-year increase. Full-year spending also grew 20%, rising from $267.7 billion in 2023 to $321.3 billion in 2024. Market intelligence firm <strong>Canalys<\/strong>\u00a0forecasts 19% growth in 2025, driven primarily by the rapid adoption of\u00a0<strong>AI<\/strong> models. By late 2024, the top cloud vendors\u00a0 <strong>AWS<\/strong><strong>,<\/strong>\u00a0<strong>Microsoft Azure<\/strong>, and\u00a0<strong>Google Cloud<\/strong>\u2014reported strong returns on <strong>AI<\/strong>\u00a0investments, with\u00a0<strong>AI<\/strong>\u00a0applications significantly influencing their cloud business performance. However, as<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong>\u00a0AI<\/strong><\/a>-driven demand surged, capacity constraints limited growth, creating a tight supply-demand balance \u2026<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5307e7f0 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"5307e7f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/canalys.com\/newsroom\/worldwide-cloud-service-q4-2024\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ FULL REPORT \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34aa36ee elementor-widget elementor-widget-wp-widget-text\" data-id=\"34aa36ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>3).\u00a0WHAT IS CYBER INSURANCE \u2013 Cyber Insurance: Essential Shield for Small Businesses in the UK and EU \u2013 CyberKPI:<\/strong> Cyber insurance serves as a critical financial safety measure for small businesses in the <strong>UK<\/strong> and EU, aimed at mitigating the financial risks stemming from cyberattacks and data breaches. With the rapid digitisation of business processes, the global Cyber Insurance market is projected to grow significantly, driven by heightened awareness of cyber threats and the necessity for regulatory <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/10\/16\/cyber-awareness-cyber-compliance\/\" target=\"_blank\" rel=\"noopener\"><strong>compliance<\/strong><\/a>. This is particularly relevant for <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>small businesses<\/strong><\/a>, as 87% of decision-makers express concerns about their inadequate protection against cyber risks &#8230;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14dbd558 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"14dbd558\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/08\/cyber-knowledge-key-point-information-cyber-insurance\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">LEARN MORE \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ec2418a e-flex e-con-boxed e-con e-parent\" data-id=\"ec2418a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fe374fd e-con-full e-flex e-con e-child\" data-id=\"fe374fd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab9eab7 elementor-widget elementor-widget-image\" data-id=\"ab9eab7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/tinyurl.com\/mpns5cjj\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"239\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/Red-Button-DDoS-Day-Banner-1.jpg\" class=\"attachment-2048x2048 size-2048x2048 wp-image-19234\" alt=\"DDoS Day 2025 - House of Lords, London\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-15479c8 e-con-full e-flex e-con e-child\" data-id=\"15479c8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a8f45a2 elementor-widget elementor-widget-wp-widget-text\" data-id=\"a8f45a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong><b>CYBER\u00a0 EVENT: DDoS \u2013\u00a0 Join the Exclusive DDoS Day 2025\u00a0<\/b><\/strong><\/p>\n<p><a href=\"https:\/\/www.red-button.net\/\" target=\"_blank\" rel=\"noopener\"><strong>DDoS<\/strong><\/a>\u00a0attacks are often mistakenly perceived as a low-tech criminal nuisance, but the reality is far more alarming. As attacks grow in complexity and scale, they have become a critical tool leveraged by hostile states, posing a direct threat to national security and business resilience.<\/p>\n<p>On March 20, 2025, the House of Lords\u00a0<a href=\"https:\/\/tinyurl.com\/mpns5cjj\" target=\"_blank\" rel=\"noopener\"><strong>DDoS Day<\/strong><\/a>, hosted by\u00a0<a href=\"https:\/\/www.red-button.net\/\" target=\"_blank\" rel=\"noopener\"><strong>Red Button<\/strong><\/a>, will bring together some of the leading minds in\u00a0<a href=\"https:\/\/cyberinsights.iainfraser.net\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a>\u00a0for an invite-only event, dedicated to equipping organizations with the latest strategies to combat modern\u00a0<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/18\/cyber-knowledge-key-point-information-ddos\/\" target=\"_blank\" rel=\"noopener\"><strong>DDoS<\/strong><\/a>\u00a0threats.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd0464e elementor-align-center elementor-widget elementor-widget-button\" data-id=\"cd0464e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/tinyurl.com\/mpns5cjj\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">DDoS Day 2025<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2194bec5 e-con-full e-flex e-con e-parent\" data-id=\"2194bec5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5744e3e5 e-con-full e-flex e-con e-child\" data-id=\"5744e3e5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b1f23b2 elementor-widget elementor-widget-image\" data-id=\"2b1f23b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"225\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg\" class=\"attachment-medium size-medium wp-image-5079\" alt=\"Image Credit: IfOnlyCommunications | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-1024x768.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-768x576.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4397e7a9 e-con-full e-flex e-con e-child\" data-id=\"4397e7a9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-488e2b4c elementor-widget elementor-widget-html\" data-id=\"488e2b4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ecae778 elementor-widget elementor-widget-wp-widget-text\" data-id=\"3ecae778\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>CYBER Insights \u2013 Helping Keep Small Business CYBERSafe!\u00a0<\/strong><\/p>\n<p>Launched in 2020 by\u00a0<strong><a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=cybersecurity+journalist&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">Cybersecurity Journalist<\/a>\u00a0Iain Fraser<\/strong>\u00a0and his team at\u00a0<a href=\"https:\/\/www.iainfraser.net\/\" target=\"_blank\" rel=\"noopener\"><strong>IfOnly&#8230;<\/strong><\/a> <a href=\"https:\/\/cyberinsights.iainfraser.net\/\" target=\"_blank\" rel=\"noopener\"><strong>CYBERInsights<\/strong><\/a> was developed to be the go-to platform providing definitive, reliable &amp; actionable Cybersecurity News, Intel,\u00a0 Awareness &amp; Training specifically written and curated for <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>Small Business<\/strong><\/a> &amp; Enterprise Owners, Partners and Directors throughout the UK. <span style=\"font-style: italic\">#CyberInsights #CyberSecurity #CyberAttack #CyberAwareness\u00a0 #Compliance #DDoS #Fraud #Ransomware #ScamAlert #SME #SmallBusiness #SmallBusinessOwner #ThreatIntel <\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f5d9a06 e-flex e-con-boxed e-con e-parent\" data-id=\"6f5d9a06\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-18b0932e elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"18b0932e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-AI-3-768x432.jpg\" alt=\"CI_Feature AI (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-Cloud-Security-1-1-768x432.jpg\" alt=\"CI_Feature Cloud Security (1)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-GDPR-1-1-768x432.jpg\" alt=\"_CI_Feature GDPR (1)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-Identity-Theft-2-768x432.jpg\" alt=\"CI_Feature Identity Theft (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Attack-Mitigation-6-768x432.jpg\" alt=\"CI_Feature Attack Mitigation (6)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Phishing-3-768x432.jpg\" alt=\"CI_Feature Phishing (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Blockchain-5-768x432.jpg\" alt=\"CI_Feature Blockchain (5)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-MFA-2-768x432.jpg\" alt=\"CI_Feature MFA (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-ISO-27001-2-768x432.jpg\" alt=\"CI_Feature Cyber ISO 27001 (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-EU-CRA-2-768x432.jpg\" alt=\"CI_Feature Cyber EU CRA (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Report-Cybercrime-3-768x432.jpg\" alt=\"CI_Report Cybercrime (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"12 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-Compliance-3-768x432.jpg\" alt=\"CI_Feature Cyber Compliance (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"13 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-NIS2-2-768x432.jpg\" alt=\"CI_Feature Cyber NIS2 (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"14 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-MSPs-2-768x432.jpg\" alt=\"CI_Feature MSPs (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"15 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-SaaS-2-768x432.jpg\" alt=\"CI_Feature SaaS (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"16 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Email-Security-1-768x432.jpg\" alt=\"CI_Feature Email Security (1)\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>LEARN MORE \/&#8230; READ FULL REPORT \/&#8230; LEARN MORE \/&#8230; DDoS Day 2025 Image Credit:&#8230;<\/p>\n","protected":false},"author":1,"featured_media":16078,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[14],"tags":[419],"ppma_author":[505],"class_list":["post-18977","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberinsights","tag-cyberinsights"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image20Credit20Rawpixel.com_Freepik_compressed-scaled.jpg",2560,1921,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image20Credit20Rawpixel.com_Freepik_compressed-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image20Credit20Rawpixel.com_Freepik_compressed-300x225.jpg",300,225,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image20Credit20Rawpixel.com_Freepik_compressed-768x576.jpg",640,480,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image20Credit20Rawpixel.com_Freepik_compressed-1024x769.jpg",640,481,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image20Credit20Rawpixel.com_Freepik_compressed-1536x1153.jpg",1536,1153,true],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image20Credit20Rawpixel.com_Freepik_compressed-2048x1537.jpg",2048,1537,true],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image20Credit20Rawpixel.com_Freepik_compressed-1024x769.jpg",1024,769,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/11\/Image20Credit20Rawpixel.com_Freepik_compressed-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" rel=\"category tag\">SMECYBERIINSIGHTS<\/a>","tag_info":"SMECYBERIINSIGHTS","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/18977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=18977"}],"version-history":[{"count":11,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/18977\/revisions"}],"predecessor-version":[{"id":19629,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/18977\/revisions\/19629"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/16078"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=18977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=18977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=18977"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=18977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}