{"id":19428,"date":"2025-03-05T12:00:30","date_gmt":"2025-03-05T11:00:30","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=19428"},"modified":"2025-03-08T11:22:23","modified_gmt":"2025-03-08T10:22:23","slug":"relying-on-msps","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2025\/03\/05\/relying-on-msps\/","title":{"rendered":"MANAGED SERVICES: The Hidden Dangers of Relying Solely on MSPs for Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"19428\" class=\"elementor elementor-19428\">\n\t\t\t\t<div class=\"elementor-element elementor-element-59bdeb1a e-flex e-con-boxed e-con e-parent\" data-id=\"59bdeb1a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-126a9fb1 elementor-widget elementor-widget-html\" data-id=\"126a9fb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-afd6254 e-flex e-con-boxed e-con e-parent\" data-id=\"afd6254\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c47b22a elementor-widget__width-initial elementor-widget elementor-widget-image-carousel\" data-id=\"c47b22a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;slides_to_show&quot;:&quot;6&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"CYBERPartners\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners1_NordVPN.png\" alt=\"Partners1_NordVPN\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners3_R3.png\" alt=\"Partners3_R3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners2_Zoho.png\" alt=\"Partners2_Zoho\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Plesk.png\" alt=\"Partners4_Plesk\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Ensurety.png\" alt=\"Partners4_Ensurety\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners7_Passware.png\" alt=\"Partners7_Passware\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/CIP-Logo.png\" alt=\"CIP Logo\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/Red_Button_Slider.png\" alt=\"Red_Button_Slider\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 9\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/FoxTech_Partner_Logo_Banner.png\" alt=\"FoxTech_Partner_Logo_Banner\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1eabead8 e-con-full e-flex e-con e-parent\" data-id=\"1eabead8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5a9e35a4 e-con-full e-flex e-con e-child\" data-id=\"5a9e35a4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65db14c6 elementor-widget elementor-widget-image\" data-id=\"65db14c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"360\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/85861.jpg\" class=\"attachment-large size-large wp-image-19433\" alt=\"Practical Small Business Cybersecurity\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/85861.jpg 1000w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/85861-300x169.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/85861-768x432.jpg 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: DC Studio Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32f9e0c8 e-con-full e-flex e-con e-child\" data-id=\"32f9e0c8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cec73b0 elementor-widget elementor-widget-html\" data-id=\"3cec73b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f608119 elementor-widget elementor-widget-wp-widget-text\" data-id=\"3f608119\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Helping Keep Small Business CYBERSafe!<br \/>\n<\/strong>Gibraltar: Wednesday 05 March 2025 at 12:00 CET<\/p>\n<p><b><strong>MANAGED SERVICES: The Hidden Dangers of Relying Solely on MSPs for Cybersecurity<\/strong><\/b><br \/>\n<em>Published in Collaboration with:<\/em> <a href=\"https:\/\/www.foxtrot-technologies.com\/\" target=\"_blank\" rel=\"noopener\"><strong>FoxTech<\/strong><\/a><br \/>\n<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a> \u2013\u00a0<a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;client=opera&amp;hs=QsT&amp;sca_esv=cd08aac0b4846c63&amp;sxsrf=ADLYWIIaZwnvuQfvJpPCaga2UcqJmvux4A%3A1719554579183&amp;ei=E1J-Zu30Cqbpi-gPva6Q6A8&amp;ved=0ahUKEwityvT-z_2GAxWm9AIHHT0XBP0Q4dUDCBA&amp;uact=5&amp;oq=sme+cybersecurity+news&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiFnNtZSBjeWJlcnNlY3VyaXR5IG5ld3MyBBAjGCcyBBAjGCcyBhAAGBYYHjILEAAYgAQYhgMYigUyCxAAGIAEGIYDGIoFMgsQABiABBiGAxiKBTIIEAAYgAQYogRI0hpQuwdYtBJwAXgBkAEAmAHBAaABkAiqAQMwLja4AQPIAQD4AQGYAgagApcHwgIHECMYsAMYJ8ICChAAGLADGNYEGEfCAgUQABiABJgDAIgGAZAGCZIHBTEuNC4xoAerMw&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">The UK Small Business Cybersecurity Network<\/a><br \/>\n<span style=\"font-style: italic\"><em>#CyberInsights #CyberSecurity #CyberAwareness #CyberSafe #SME #SmallBusiness #MSPs #FoxTech<\/em><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3eccd202 e-flex e-con-boxed e-con e-parent\" data-id=\"3eccd202\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-54d34c8e e-con-full e-flex e-con e-child\" data-id=\"54d34c8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1c79a330 elementor-widget elementor-widget-html\" data-id=\"1c79a330\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-5781064184570704\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block; text-align:center;\"\r\n     data-ad-layout=\"in-article\"\r\n     data-ad-format=\"fluid\"\r\n     data-ad-client=\"ca-pub-5781064184570704\"\r\n     data-ad-slot=\"2462866401\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-62935f62 e-con-full e-flex e-con e-child\" data-id=\"62935f62\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ec329c6 elementor-widget elementor-widget-wp-widget-text\" data-id=\"1ec329c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>In today\u2019s digital-first world, businesses of all sizes depend on Managed Service Providers (<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/10\/21\/cyber-awareness-multi-service-providers-selecting-an-msp-for-your-small-business\/\" target=\"_blank\" rel=\"noopener\"><strong>MSPs<\/strong><\/a>) to manage their IT infrastructure and handle a range of critical services. While <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/10\/21\/cyber-awareness-multi-service-providers-selecting-an-msp-for-your-small-business\/\" target=\"_blank\" rel=\"noopener\"><strong>MSPs<\/strong><\/a> can be a valuable asset for streamlining operations, many organizations overlook a crucial aspect: <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/10\/21\/cyber-awareness-multi-service-providers-selecting-an-msp-for-your-small-business\/\" target=\"_blank\" rel=\"noopener\"><strong>MSPs<\/strong><\/a> may not be equipped to provide the level of cybersecurity needed to fully protect sensitive data and systems in an increasingly complex threat landscape.<\/p>\n<p>This case study highlights a scenario where a company\u2019s heavy reliance on their <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/10\/21\/cyber-awareness-multi-service-providers-selecting-an-msp-for-your-small-business\/\" target=\"_blank\" rel=\"noopener\"><strong>MSP\u2019s<\/strong><\/a> cybersecurity measures led to multiple vulnerabilities, putting their sensitive data at risk. It illustrates why engaging a cybersecurity expert like <a href=\"https:\/\/www.foxtrot-technologies.com\/\" target=\"_blank\" rel=\"noopener\"><strong>FoxTech<\/strong><\/a> is essential in identifying and addressing potential risks before they escalate into severe consequences.<\/p>\n<p><strong>Background:<\/strong><\/p>\n<p>Company A, a mid-sized organization with a significant online presence, relied on their <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/10\/21\/cyber-awareness-multi-service-providers-selecting-an-msp-for-your-small-business\/\" target=\"_blank\" rel=\"noopener\"><strong>MSP<\/strong><\/a> for all IT-related needs, including cybersecurity. The company believed that their <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/10\/21\/cyber-awareness-multi-service-providers-selecting-an-msp-for-your-small-business\/\" target=\"_blank\" rel=\"noopener\"><strong>MSP\u2019s<\/strong><\/a> services were sufficient to keep them secure, unaware of the gaps in their security posture and the potential risks they faced.<\/p>\n<p><strong>The Challenge:<\/strong><\/p>\n<p>When Company A became aware of <a href=\"https:\/\/www.foxtrot-technologies.com\/\" target=\"_blank\" rel=\"noopener\"><strong>FoxTech\u2019s<\/strong><\/a> reputation for comprehensive cybersecurity services, including penetration testing, they decided to commission a test. Their goal was to validate the effectiveness of their <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/10\/21\/cyber-awareness-multi-service-providers-selecting-an-msp-for-your-small-business\/\" target=\"_blank\" rel=\"noopener\"><strong>MSP\u2019s<\/strong><\/a> security measures, hoping to confirm that their cybersecurity needs were adequately met.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16912ee8 elementor-widget elementor-widget-image\" data-id=\"16912ee8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"360\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/85861.jpg\" class=\"attachment-large size-large wp-image-19433\" alt=\"Practical Small Business Cybersecurity\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/85861.jpg 1000w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/85861-300x169.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/85861-768x432.jpg 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: DC Studio Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ae775bd elementor-widget elementor-widget-wp-widget-text\" data-id=\"5ae775bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>The Penetration Test:<\/strong><\/p>\n<p><a href=\"https:\/\/www.foxtrot-technologies.com\/\" target=\"_blank\" rel=\"noopener\"><strong>FoxTech\u2019s<\/strong><\/a> team of cybersecurity experts performed a thorough penetration test, simulating real-world cyberattacks to identify potential vulnerabilities in Company A\u2019s infrastructure. The results were concerning.<\/p>\n<p><strong>Key Findings:<\/strong><\/p>\n<p><strong>1. Critical Vulnerabilities:<\/strong> The test exposed multiple critical vulnerabilities within Company A\u2019s network, which cybercriminals could exploit to gain unauthorized access to sensitive data.<\/p>\n<p><strong>2. Exposed Data:<\/strong> A database containing sensitive client information was found to be easily accessible from the public internet. This exposure left both the company and its clients vulnerable to identity theft, fraud, and other malicious cyber activities.<\/p>\n<p><strong>3. Inadequate MSP Security:<\/strong> It became evident that while the <strong>MSP<\/strong> had provided some security measures, they were insufficient to protect Company A from modern cyber threats. The <strong>MSP<\/strong>, despite claiming cybersecurity expertise, lacked the depth of knowledge necessary to address emerging risks.<\/p>\n<p><strong>The Solution:<\/strong><\/p>\n<p>Upon uncovering these vulnerabilities, <a href=\"https:\/\/www.foxtrot-technologies.com\/\" target=\"_blank\" rel=\"noopener\"><strong>FoxTech<\/strong><\/a> worked hand-in-hand with Company A to implement a comprehensive solution:<\/p>\n<p><strong>&#8211; Remediating Vulnerabilities:<\/strong> <a href=\"https:\/\/www.foxtrot-technologies.com\/\" target=\"_blank\" rel=\"noopener\"><strong>FoxTech\u2019s<\/strong><\/a> experts provided actionable steps to address the identified vulnerabilities, significantly strengthening Company A\u2019s network security.<\/p>\n<p><strong>&#8211; Securing Exposed Data:<\/strong> FoxTech helped Company A secure the exposed database by implementing encryption, configuring proper access controls, and ensuring that sensitive client information was protected.<\/p>\n<p><strong>&#8211; Improving Cybersecurity Posture:<\/strong> <a href=\"https:\/\/www.foxtrot-technologies.com\/\" target=\"_blank\" rel=\"noopener\"><strong>FoxTech<\/strong><\/a> also delivered a tailored strategy to enhance Company A\u2019s overall cybersecurity framework. This included employee training, developing robust security policies, and setting up a proactive incident response plan.<\/p>\n<p><strong>Conclusion:<\/strong><\/p>\n<p>The experience of Company A serves as a cautionary tale for organizations relying solely on <strong>MSPs<\/strong> for cybersecurity. While <strong>MSPs<\/strong> are valuable for managing IT operations, they may lack the necessary expertise to safeguard businesses against today\u2019s advanced and evolving cyber threats.<\/p>\n<p>By partnering with <a href=\"https:\/\/www.foxtrot-technologies.com\/\" target=\"_blank\" rel=\"noopener\"><strong>FoxTech<\/strong><\/a> for penetration testing and expert cybersecurity guidance, Company A was able to identify and address critical security gaps that their <strong>MSP<\/strong> had overlooked. This case underscores the value of engaging specialized cybersecurity experts like FoxTech to ensure that your digital assets and sensitive data are properly protected.<\/p>\n<p>Trust <strong>FoxTech<\/strong> to Fortify Your Cybersecurity<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cb434c5 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6cb434c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.foxtrot-technologies.com\/foxtech-defend\/book-demo\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">GET A DEMO \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1592c3b9 elementor-widget elementor-widget-html\" data-id=\"1592c3b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-5781064184570704\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block; text-align:center;\"\r\n     data-ad-layout=\"in-article\"\r\n     data-ad-format=\"fluid\"\r\n     data-ad-client=\"ca-pub-5781064184570704\"\r\n     data-ad-slot=\"2462866401\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-152ed02f e-con-full e-flex e-con e-parent\" data-id=\"152ed02f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7d8bb74 e-con-full e-flex e-con e-child\" data-id=\"7d8bb74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6eec240d elementor-widget elementor-widget-image\" data-id=\"6eec240d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"225\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg\" class=\"attachment-medium size-medium wp-image-5079\" alt=\"Image Credit: IfOnlyCommunications | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-1024x768.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-768x576.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-60995fe0 e-con-full e-flex e-con e-child\" data-id=\"60995fe0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56bc002f elementor-widget elementor-widget-html\" data-id=\"56bc002f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5adf1ba5 elementor-widget elementor-widget-wp-widget-text\" data-id=\"5adf1ba5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>CYBER Insights \u2013 Helping Keep Small Business CYBERSafe!\u00a0<\/strong><\/p>\n<p>Launched in 2020 by\u00a0<strong><a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=cybersecurity+journalist&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">Cybersecurity Journalist<\/a>\u00a0Iain Fraser<\/strong>\u00a0and his team at\u00a0<a href=\"https:\/\/www.iainfraser.net\/\" target=\"_blank\" rel=\"noopener\"><strong>IfOnly&#8230;<\/strong><\/a> <a href=\"https:\/\/cyberinsights.iainfraser.net\/\" target=\"_blank\" rel=\"noopener\"><strong>CYBERInsights<\/strong><\/a> was developed to be the go-to platform providing definitive, reliable &amp; actionable Cybersecurity News, Intel,\u00a0 Awareness &amp; Training specifically written and curated for <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>Small Business<\/strong><\/a> &amp; Enterprise Owners, Partners and Directors throughout the UK. <span style=\"font-style: italic\">#CyberInsights #CyberSecurity #CyberAttack #CyberAwareness\u00a0 #Compliance #DDoS #Fraud #Ransomware #ScamAlert #SME #SmallBusiness #SmallBusinessOwner #ThreatIntel <\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-668c004 e-flex e-con-boxed e-con e-parent\" data-id=\"668c004\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e4eac3f e-con-full e-flex e-con e-child\" data-id=\"e4eac3f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33024f6 elementor-widget elementor-widget-image\" data-id=\"33024f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/tinyurl.com\/mpns5cjj\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"71\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/FoxTech_Edited_1-300x71.png\" class=\"attachment-medium size-medium wp-image-19387\" alt=\"FoxTech_Edited_1\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/FoxTech_Edited_1-300x71.png 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/FoxTech_Edited_1.png 501w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e737d06 e-con-full e-flex e-con e-child\" data-id=\"e737d06\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-23cb3de elementor-widget elementor-widget-wp-widget-text\" data-id=\"23cb3de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>FOXTECH &#8211; Effortless Security | World-class Expertise<\/strong><br \/>\nManaged Cyber Security Services for <strong>SMEs &#8211; <\/strong>Security monitoring, vulnerability management, penetration testing and consultancy.\u00a0Get straightforward advice on how to make your business more secure.<\/p>\n<p><strong>Get In Touch &#8211;\u00a0<\/strong>Get in touch for a free, no obligation consultation. If you would prefer to speak to an expert now call us on: <strong>0330 223 5622<\/strong><\/p>\n<p>LinkedIn: @<a href=\"https:\/\/www.linkedin.com\/company\/foxtechuk\/\" target=\"_blank\" rel=\"noopener\">FoxtechUK\u00a0<\/a> | Email: <a href=\"mailto:info@foxtrot-technologies.com\">info@foxtrot-technologies.com<\/a><br \/>\nFoxtrot Technologies, England. UK<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1cd569b elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1cd569b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.foxtrot-technologies.com\/foxtech-defend\/book-demo\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get a Demo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-616cf69f e-flex e-con-boxed e-con e-parent\" data-id=\"616cf69f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ef07e96 elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"7ef07e96\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-AI-3-768x432.jpg\" alt=\"CI_Feature AI (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-Cloud-Security-1-1-768x432.jpg\" alt=\"CI_Feature Cloud Security (1)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-GDPR-1-1-768x432.jpg\" alt=\"_CI_Feature GDPR (1)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-Identity-Theft-2-768x432.jpg\" alt=\"CI_Feature Identity Theft (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Attack-Mitigation-6-768x432.jpg\" alt=\"CI_Feature Attack Mitigation (6)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Phishing-3-768x432.jpg\" alt=\"CI_Feature Phishing (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Blockchain-5-768x432.jpg\" alt=\"CI_Feature Blockchain (5)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-MFA-2-768x432.jpg\" alt=\"CI_Feature MFA (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-ISO-27001-2-768x432.jpg\" alt=\"CI_Feature Cyber ISO 27001 (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-EU-CRA-2-768x432.jpg\" alt=\"CI_Feature Cyber EU CRA (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Report-Cybercrime-3-768x432.jpg\" alt=\"CI_Report Cybercrime (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"12 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-Compliance-3-768x432.jpg\" alt=\"CI_Feature Cyber Compliance (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"13 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-NIS2-2-768x432.jpg\" alt=\"CI_Feature Cyber NIS2 (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"14 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-MSPs-2-768x432.jpg\" alt=\"CI_Feature MSPs (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"15 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-SaaS-2-768x432.jpg\" alt=\"CI_Feature SaaS (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"16 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Email-Security-1-768x432.jpg\" alt=\"CI_Feature Email Security (1)\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: DC Studio Freepik Image Credit: DC Studio Freepik GET A DEMO \/&#8230; Image&#8230;<\/p>\n","protected":false},"author":1,"featured_media":19433,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[14,619],"tags":[419,598,552],"ppma_author":[505],"class_list":["post-19428","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberinsights","category-sponsoredcontent","tag-cyberinsights","tag-foxtech","tag-msp"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/85861.jpg",1000,563,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/85861-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/85861-300x169.jpg",300,169,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/85861-768x432.jpg",640,360,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/85861.jpg",640,360,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/85861.jpg",1000,563,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/85861.jpg",1000,563,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/85861.jpg",1000,563,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/85861-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" rel=\"category tag\">SMECYBERIINSIGHTS<\/a> <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/sponsoredcontent\/\" rel=\"category tag\">SPONSORED CONTENT<\/a>","tag_info":"SPONSORED CONTENT","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/19428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=19428"}],"version-history":[{"count":17,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/19428\/revisions"}],"predecessor-version":[{"id":19618,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/19428\/revisions\/19618"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/19433"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=19428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=19428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=19428"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=19428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}