{"id":21335,"date":"2025-05-23T10:00:01","date_gmt":"2025-05-23T08:00:01","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=21335"},"modified":"2025-05-27T11:05:23","modified_gmt":"2025-05-27T09:05:23","slug":"top-password-mistakes","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2025\/05\/23\/top-password-mistakes\/","title":{"rendered":"PASSWORD SECURITY: Experts Reveal Top Password Mistakes Driving Data Breaches in 2025"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"21335\" class=\"elementor elementor-21335\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7718a979 e-flex e-con-boxed e-con e-parent\" data-id=\"7718a979\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16fb6629 elementor-widget elementor-widget-html\" data-id=\"16fb6629\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1708705c e-con-full e-flex e-con e-child\" data-id=\"1708705c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f4873df elementor-widget__width-initial elementor-widget elementor-widget-image-carousel\" data-id=\"1f4873df\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;slides_to_show&quot;:&quot;6&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"CYBERPartners\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners1_NordVPN.png\" alt=\"Partners1_NordVPN\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners3_R3.png\" alt=\"Partners3_R3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners2_Zoho.png\" alt=\"Partners2_Zoho\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Plesk.png\" alt=\"Partners4_Plesk\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Ensurety.png\" alt=\"Partners4_Ensurety\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners7_Passware.png\" alt=\"Partners7_Passware\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/CIP-Logo.png\" alt=\"CIP Logo\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/Red_Button_Slider.png\" alt=\"Red_Button_Slider\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/FoxTech_Partner_Logo_Banner.png\" alt=\"FoxTech_Partner_Logo_Banner\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/04\/ogo2.png\" alt=\"ogo2\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-40623736 e-con-full e-flex e-con e-parent\" data-id=\"40623736\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3a6be50 e-con-full e-flex e-con e-child\" data-id=\"3a6be50\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e73eecc elementor-widget elementor-widget-image\" data-id=\"5e73eecc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"624\" height=\"403\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/Password-Security.jpg\" class=\"attachment-large size-large wp-image-21336\" alt=\"Password Security\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/Password-Security.jpg 624w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/Password-Security-300x194.jpg 300w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Mohamed Hassan from Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66994d52 elementor-widget elementor-widget-html\" data-id=\"66994d52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-5781064184570704\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block; text-align:center;\"\r\n     data-ad-layout=\"in-article\"\r\n     data-ad-format=\"fluid\"\r\n     data-ad-client=\"ca-pub-5781064184570704\"\r\n     data-ad-slot=\"2462866401\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-557e7731 e-con-full e-flex e-con e-child\" data-id=\"557e7731\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a481b90 elementor-widget elementor-widget-wp-widget-text\" data-id=\"5a481b90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Helping Keep Small Business CYBERSafe!<br \/>\n<\/strong>Gibraltar: Friday 23 May 2025 at 10:00 CET<\/p>\n<p><strong>PASSWORD SECURITY: Experts Reveal Top Password Mistakes Driving Data Breaches in 2025<br \/>\n<\/strong><b><\/b>By: <a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=iain+%2B+cybersecurity&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser<\/a> &#8211; <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+journalist&amp;client=firefox-b-d&amp;sca_esv=604417a22f933246&amp;biw=1920&amp;bih=937&amp;sxsrf=ADLYWII9GQo-CShq2VQjmub9bZo3edd4sw%3A1732797372997&amp;ei=vGNIZ_W2PLGgkdUP2Z6JsQc&amp;ved=0ahUKEwj1hIqfhf-JAxUxUKQEHVlPInY4ChDh1QMIDw&amp;uact=5&amp;oq=sme+cybersecurity+journalist&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiHHNtZSBjeWJlcnNlY3VyaXR5IGpvdXJuYWxpc3QyBBAjGCcyCBAAGIAEGKIEMggQABiABBiiBDIIEAAYgAQYogRI4g5QgQhY1AtwAXgBkAEAmAGwAaAB8QSqAQMwLjS4AQPIAQD4AQGYAgOgAtYCwgIHECMYsAMYJ8ICChAAGLADGNYEGEfCAgcQIxiwAhgnmAMAiAYBkAYKkgcDMS4yoAekHQ&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Cybersecurity Journalist<\/a><br \/>\nPublished in Collaboration with: <a href=\"https:\/\/nordvpn.com\/special\/?utm_medium=affiliate&amp;utm_term=&amp;utm_content=rv_nShY4wLA-4Baxkk4SZGqT7YGVlX9Mhw&amp;utm_campaign=off15&amp;utm_source=aff8398\" target=\"_blank\" rel=\"noopener\">Nord VPN<\/a><br \/>\n<a href=\"SMECyberInsights.co.uk\">SMECyberInsights.co.uk<\/a><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\"> &#8211;\u00a0<\/a><a href=\"https:\/\/www.google.com\/search?q=SME+Cybersecurity&amp;sca_esv=01731d022ec92237&amp;rlz=1C1FKPE_enES1123ES1124&amp;sxsrf=AHTn8zozW-9dbXRwHlu5zyHfc5aukU6yeQ%3A1747146305898&amp;ei=QVYjaILMNsyKkdUP1teCyQk&amp;ved=0ahUKEwjC8LuX06CNAxVMRaQEHdarIJkQ4dUDCBA&amp;uact=5&amp;oq=SME+Cybersecurity&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiEVNNRSBDeWJlcnNlY3VyaXR5MgoQIxiABBgnGIoFMgQQIxgnMgQQIxgnMgYQABgHGB4yCxAAGIAEGJECGIoFMggQABgHGAgYHjIIEAAYBxgIGB4yCBAAGAcYCBgeMggQABgHGAgYHjIIEAAYBxgIGB5Iwy9QAFj5JHAAeAGQAQCYAZ0BoAG2A6oBAzAuM7gBA8gBAPgBAZgCA6AC-wPCAgQQABgewgIGEAAYCBgewgIHEAAYgAQYDcICCBAAGAUYDRgemAMAkgcDMC4zoAf9GbIHAzAuM7gH-wPCBwUzLTIuMcgHPg&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">First for SME Cybersecurity<br \/>\n<\/a><a href=\"https:\/\/www.google.com\/search?q=Experts+Reveal+Top+Password+Mistakes+Driving+Data+Breaches+in+2025&amp;sca_esv=286dcc3e3e4e435f&amp;rlz=1C1GCEU_en&amp;sxsrf=AE3TifOfUH8u5ldsR1aq-YLabqPP9HGcXg%3A1748336555540&amp;ei=q381aKTaINudkdUP0ZXH6QQ&amp;ved=0ahUKEwjk29yapcONAxXbTqQEHdHKMU0Q4dUDCBA&amp;uact=5&amp;oq=Experts+Reveal+Top+Password+Mistakes+Driving+Data+Breaches+in+2025&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiQkV4cGVydHMgUmV2ZWFsIFRvcCBQYXNzd29yZCBNaXN0YWtlcyBEcml2aW5nIERhdGEgQnJlYWNoZXMgaW4gMjAyNUjiDFAAWOQEcAF4AJABAJgBsQGgAbEBqgEDMC4xuAEDyAEA-AEB-AECmAIBoAIhqAIPwgINEC4YxwEYJxjqAhivAcICBxAjGCcY6gLCAhQQABiABBiRAhi0AhiKBRjqAtgBAcICGhAuGIAEGJECGNEDGLQCGMcBGIoFGOoC2AEBmAMh8QXXXW6TjYBMHboGBggBEAEYAZIHATGgB3ayBwC4BwDCBwM0LTHIBx4&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 230525 at 11:20 CET<\/a><em><br \/>\n#SMECyberInsights #SMECyberSecurity #SMECyberAwareness #CyberSafe #SME #SmallBusiness<br \/>\n<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49f11aea elementor-widget elementor-widget-wp-widget-text\" data-id=\"49f11aea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Poor password practices continue to be the Achilles&#8217; heel of cybersecurity, with over 80% of data breaches linked to compromised credentials, according to a new analysis by web hosting provider <a href=\"https:\/\/www.hostinger.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Hostinger<\/strong><\/a>.<\/p>\n<p>The company&#8217;s security team conducted an extensive investigation into thousands of leaked password datasets, applying machine learning and behavioural analysis techniques to understand why many users still create passwords that offer minimal protection.<\/p>\n<p><strong>Critical Password Vulnerabilities Identified<\/strong><\/p>\n<p><em>&#8220;Many people assume they&#8217;re fully protected once they&#8217;ve set up a strong password, but security is an ongoing process,&#8221;<\/em> explains <a href=\"https:\/\/www.hostinger.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Hostinger&#8217;s<\/strong><\/a> cybersecurity team. <em>&#8220;New threats emerge constantly, and staying safe requires regular attention to your security practices.&#8221;<\/em><\/p>\n<p>The research identified four primary password mistakes that consistently leave users vulnerable:<\/p>\n<p><strong>1. Inadequate Password Length<\/strong><\/p>\n<p>More than one-fifth (21.7%) of analysed passwords contained fewer than eight characters\u2014all of which were instantly crackable in security tests. Despite the well-documented risks, many users continue to prioritize convenience over security by creating short passwords that are easier to type and remember.<\/p>\n<p>Security experts recommend passwords of at least 12 characters, ideally based on memorable phrases or sentences.<\/p>\n<p><strong>2. Predictable &#8220;Unique&#8221; Patterns<\/strong><\/p>\n<p>Many users believe they&#8217;ve created secure passwords by using seemingly unique combinations like &#8220;minebluecar67.&#8221; However, <a href=\"https:\/\/www.hostinger.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Hostinger&#8217;s<\/strong><\/a> analysis revealed these formats follow predictable low-entropy patterns that sophisticated cracking tools can easily decipher.<\/p>\n<p>To create truly secure passwords, cybersecurity professionals advise using a mix of uppercase and lowercase letters, numbers, and special characters while avoiding common words or predictable patterns.<\/p>\n<p><strong>3. The Length Misconception<\/strong><\/p>\n<p>The research uncovered a concerning trend: even passwords exceeding 20 characters had a 13% crack rate, making them nearly as vulnerable as much shorter options. This contradicts the common belief that longer passwords are automatically more secure.<\/p>\n<p>&#8220;Length alone isn&#8217;t enough,&#8221; notes the report. <em>&#8220;Passwords with repetitive elements like &#8216;aaaaaaa&#8217; or &#8216;123123123&#8217; significantly compromise security regardless of character count.&#8221;<\/em><\/p>\n<p><strong>4. Continued Use of Known Compromised Passwords<\/strong><\/p>\n<p>Perhaps most alarmingly, many users continue using passwords that appear in the top 10 million leaked password lists. The study identified 475 passwords that matched high-frequency entries from global breach databases.<\/p>\n<p>This occurs because users often remain unaware their credentials have been compromised or continue reusing familiar passwords out of habit.<\/p>\n<p><strong>Protecting Your Digital Assets<\/strong><\/p>\n<p>Cybersecurity experts recommend regularly checking credentials through services like &#8220;<a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener\">Have I Been Pwned<\/a>&#8221; and implementing two-factor authentication (2FA) wherever possible.<\/p>\n<p><em>&#8220;Security-related settings should be maintained over time to ensure they still reflect your needs and provide the right level of protection,&#8221;<\/em> emphasizes <a href=\"https:\/\/www.hostinger.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Hostinger&#8217;s<\/strong><\/a> security team.<\/p>\n<p>As data breaches continue affecting businesses of all sizes, <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a> are particularly encouraged to review their password policies and implement comprehensive security awareness training for all staff members.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e76c94e elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2e76c94e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Join SME Cyber Now! \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1121d99c elementor-widget elementor-widget-html\" data-id=\"1121d99c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-5781064184570704\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block; text-align:center;\"\r\n     data-ad-layout=\"in-article\"\r\n     data-ad-format=\"fluid\"\r\n     data-ad-client=\"ca-pub-5781064184570704\"\r\n     data-ad-slot=\"2462866401\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2b3e8970 e-flex e-con-boxed e-con e-parent\" data-id=\"2b3e8970\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-24fad271 e-con-full e-flex e-con e-child\" data-id=\"24fad271\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42f74554 elementor-widget elementor-widget-image\" data-id=\"42f74554\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&#038;offerid=572706.44&#038;subid=0&#038;type=4\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"144\" height=\"144\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Nord_logo_1.png\" class=\"attachment-2048x2048 size-2048x2048 wp-image-12867\" alt=\"NordVPN\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-42cef77b e-con-full e-flex e-con e-child\" data-id=\"42cef77b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e3654ca elementor-widget elementor-widget-wp-widget-text\" data-id=\"2e3654ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>What is a VPN &amp; Does my SME Need one?<\/strong> A <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/08\/26\/special-feature-vpn\/\" target=\"_blank\" rel=\"noopener\"><strong>VPN<\/strong><\/a> is a Virtual Private Network a method of securing your communications credentials. When it comes to Small and Medium-sized enterprises (<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a>), the choice of <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/08\/26\/special-feature-vpn\/\" target=\"_blank\" rel=\"noopener\"><strong>VPNs<\/strong><\/a> can significantly impact the security and efficiency of their operations.<\/p>\n<p>The\u00a0<b>NordVPN<\/b> service allows you to connect to 5600+ servers in 60+ countries. It secures your Internet data with military-grade encryption, ensures your web activity remains private and helps bypass geographic content restrictions online. \u00a0<strong><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.44&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\">Join\u00a0NordVPN\u00a0Today and\u00a0Save\u00a0up to\u00a073%\u00a0and Get 3 months\u00a0Extra Free<\/a> &#8211; Rude Not to \u2026!<\/strong><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15899756 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"15899756\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/nordvpn.com\/special\/?utm_medium=affiliate&#038;utm_term=&#038;utm_content=rv_nShY4wLA-emnpSewtfAm9zRdw1TNpcw&#038;utm_campaign=off15&#038;utm_source=aff8398\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-67e30476 e-con-full e-flex e-con e-parent\" data-id=\"67e30476\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d538e76 e-con-full e-flex e-con e-child\" data-id=\"d538e76\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17a6c1d4 elementor-widget elementor-widget-image\" data-id=\"17a6c1d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280-300x200.jpg\" class=\"attachment-medium size-medium wp-image-19834\" alt=\"CYBERInsights | Practical Small Business Cybersecurity\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6622c157 e-con-full e-flex e-con e-child\" data-id=\"6622c157\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-38283c84 elementor-widget elementor-widget-html\" data-id=\"38283c84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1edca9e6 elementor-widget elementor-widget-wp-widget-text\" data-id=\"1edca9e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><h4>UK Small Business Owner? Join SMECyber Free Now! &amp; Access the SME Cyber Forum &#8211; Read, Learn, Engage, Share &#8230;<\/h4>\n<p>The Latest <strong>SME<\/strong> Cybersecurity News, Threat Intelligence &amp; Analysis, Timely Scam Alerts, Best-practice Compliance, Mitigation &amp; Resources specifically curated for UK Based <strong>SMEs<\/strong> in a Single Weekly Email direct to your Inbox or Smart Device together with Unrestricted Free Access to our entire <strong>SME<\/strong> Cyber Knowledge &amp; Tutorial Library.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dbb09e0 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1dbb09e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f4db89 e-flex e-con-boxed e-con e-parent\" data-id=\"f4db89\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-574b79a7 elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"574b79a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-AI-3-768x432.jpg\" alt=\"CI_Feature AI (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-Cloud-Security-1-1-768x432.jpg\" alt=\"CI_Feature Cloud Security (1)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-GDPR-1-1-768x432.jpg\" alt=\"_CI_Feature GDPR (1)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-Identity-Theft-2-768x432.jpg\" alt=\"CI_Feature Identity Theft (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Attack-Mitigation-6-768x432.jpg\" alt=\"CI_Feature Attack Mitigation (6)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Phishing-3-768x432.jpg\" alt=\"CI_Feature Phishing (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Blockchain-5-768x432.jpg\" alt=\"CI_Feature Blockchain (5)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-MFA-2-768x432.jpg\" alt=\"CI_Feature MFA (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-ISO-27001-2-768x432.jpg\" alt=\"CI_Feature Cyber ISO 27001 (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-EU-CRA-2-768x432.jpg\" alt=\"CI_Feature Cyber EU CRA (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Report-Cybercrime-3-768x432.jpg\" alt=\"CI_Report Cybercrime (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"12 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-Compliance-3-768x432.jpg\" alt=\"CI_Feature Cyber Compliance (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"13 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-NIS2-2-768x432.jpg\" alt=\"CI_Feature Cyber NIS2 (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"14 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-MSPs-2-768x432.jpg\" alt=\"CI_Feature MSPs (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"15 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-SaaS-2-768x432.jpg\" alt=\"CI_Feature SaaS (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"16 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Email-Security-1-768x432.jpg\" alt=\"CI_Feature Email Security (1)\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: Mohamed Hassan from Pixabay Join SME Cyber Now! \/&#8230; Learn More \/&#8230; Image&#8230;<\/p>\n","protected":false},"author":1,"featured_media":21336,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[440],"tags":[439],"ppma_author":[505],"class_list":["post-21335","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberthreat-intel","tag-cyberthreat-intel"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/Password-Security.jpg",624,403,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/Password-Security-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/Password-Security-300x194.jpg",300,194,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/Password-Security.jpg",624,403,false],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/Password-Security.jpg",624,403,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/Password-Security.jpg",624,403,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/Password-Security.jpg",624,403,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/Password-Security.jpg",624,403,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/Password-Security-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" rel=\"category tag\">SME CYBER\/THREAT INTEL<\/a>","tag_info":"SME CYBER\/THREAT INTEL","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/21335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=21335"}],"version-history":[{"count":8,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/21335\/revisions"}],"predecessor-version":[{"id":21609,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/21335\/revisions\/21609"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/21336"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=21335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=21335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=21335"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=21335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}