{"id":21864,"date":"2025-06-09T10:00:51","date_gmt":"2025-06-09T08:00:51","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=21864"},"modified":"2025-06-10T12:18:43","modified_gmt":"2025-06-10T10:18:43","slug":"councils-trial-humphrey-ai","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2025\/06\/09\/councils-trial-humphrey-ai\/","title":{"rendered":"AI: Yes Minister, How Humphrey AI Council Tools Could Transform SME Operations"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"21864\" class=\"elementor elementor-21864\">\n\t\t\t\t<div class=\"elementor-element elementor-element-664ef969 e-flex e-con-boxed e-con e-parent\" data-id=\"664ef969\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-137db4ac elementor-widget elementor-widget-html\" data-id=\"137db4ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d603673 e-con-full e-flex e-con e-child\" data-id=\"7d603673\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f8d14ed elementor-widget__width-initial elementor-widget elementor-widget-image-carousel\" data-id=\"f8d14ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;slides_to_show&quot;:&quot;6&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"CYBERPartners\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners1_NordVPN.png\" alt=\"Partners1_NordVPN\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners3_R3.png\" alt=\"Partners3_R3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners2_Zoho.png\" alt=\"Partners2_Zoho\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Plesk.png\" alt=\"Partners4_Plesk\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Ensurety.png\" alt=\"Partners4_Ensurety\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners7_Passware.png\" alt=\"Partners7_Passware\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/CIP-Logo.png\" alt=\"CIP Logo\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/Red_Button_Slider.png\" alt=\"Red_Button_Slider\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/FoxTech_Partner_Logo_Banner.png\" alt=\"FoxTech_Partner_Logo_Banner\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/04\/ogo2.png\" alt=\"ogo2\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-14895541 e-con-full e-flex e-con e-parent\" data-id=\"14895541\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1ed52cab e-con-full e-flex e-con e-child\" data-id=\"1ed52cab\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69796742 elementor-widget elementor-widget-image\" data-id=\"69796742\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.geograph.org.uk\/profile\/6597\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"624\" height=\"468\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/AI-Image-Credit-Stephen-Craven-via-Wikimedia-Commons-under-CC-BY-SA-2.0.jpg\" class=\"attachment-large size-large wp-image-21865\" alt=\"AI - Image Credit Stephen Craven, via Wikimedia Commons under CC BY-SA 2.0\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/AI-Image-Credit-Stephen-Craven-via-Wikimedia-Commons-under-CC-BY-SA-2.0.jpg 624w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/AI-Image-Credit-Stephen-Craven-via-Wikimedia-Commons-under-CC-BY-SA-2.0-300x225.jpg 300w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Stephen Craven, via Wikimedia Commons under CC BY-SA 2.0 <\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ed9e859 e-con-full e-flex e-con e-child\" data-id=\"7ed9e859\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4696ce51 elementor-widget elementor-widget-wp-widget-text\" data-id=\"4696ce51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Helping Keep Small Business CYBERSafe!<br \/>\n<\/strong>Gibraltar: Monday 09 June 2025 at 10:00 CET<\/p>\n<p><strong>AI: How AI Council Tools Could Transform SME Operations: Lessons from Government&#8217;s \u00a345bn Digital Push<br \/>\n<\/strong><b><\/b>By: <a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=iain+%2B+cybersecurity&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser<\/a> &#8211; <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+journalist&amp;client=firefox-b-d&amp;sca_esv=604417a22f933246&amp;biw=1920&amp;bih=937&amp;sxsrf=ADLYWII9GQo-CShq2VQjmub9bZo3edd4sw%3A1732797372997&amp;ei=vGNIZ_W2PLGgkdUP2Z6JsQc&amp;ved=0ahUKEwj1hIqfhf-JAxUxUKQEHVlPInY4ChDh1QMIDw&amp;uact=5&amp;oq=sme+cybersecurity+journalist&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiHHNtZSBjeWJlcnNlY3VyaXR5IGpvdXJuYWxpc3QyBBAjGCcyCBAAGIAEGKIEMggQABiABBiiBDIIEAAYgAQYogRI4g5QgQhY1AtwAXgBkAEAmAGwAaAB8QSqAQMwLjS4AQPIAQD4AQGYAgOgAtYCwgIHECMYsAMYJ8ICChAAGLADGNYEGEfCAgcQIxiwAhgnmAMAiAYBkAYKkgcDMS4yoAekHQ&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Cybersecurity Journalist<\/a><br \/>\nPublished in Collaboration with: <a href=\"https:\/\/nordvpn.com\/special\/?utm_medium=affiliate&amp;utm_term=&amp;utm_content=rv_nShY4wLA-4Baxkk4SZGqT7YGVlX9Mhw&amp;utm_campaign=off15&amp;utm_source=aff8398\" target=\"_blank\" rel=\"noopener\">Nord VPN<\/a><br \/>\n<a href=\"SMECyberInsights.co.uk\">SMECyberInsights.co.uk<\/a><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\"> &#8211;\u00a0<\/a><a href=\"https:\/\/www.google.com\/search?q=SME+Cybersecurity&amp;sca_esv=01731d022ec92237&amp;rlz=1C1FKPE_enES1123ES1124&amp;sxsrf=AHTn8zozW-9dbXRwHlu5zyHfc5aukU6yeQ%3A1747146305898&amp;ei=QVYjaILMNsyKkdUP1teCyQk&amp;ved=0ahUKEwjC8LuX06CNAxVMRaQEHdarIJkQ4dUDCBA&amp;uact=5&amp;oq=SME+Cybersecurity&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiEVNNRSBDeWJlcnNlY3VyaXR5MgoQIxiABBgnGIoFMgQQIxgnMgQQIxgnMgYQABgHGB4yCxAAGIAEGJECGIoFMggQABgHGAgYHjIIEAAYBxgIGB4yCBAAGAcYCBgeMggQABgHGAgYHjIIEAAYBxgIGB5Iwy9QAFj5JHAAeAGQAQCYAZ0BoAG2A6oBAzAuM7gBA8gBAPgBAZgCA6AC-wPCAgQQABgewgIGEAAYCBgewgIHEAAYgAQYDcICCBAAGAUYDRgemAMAkgcDMC4zoAf9GbIHAzAuM7gH-wPCBwUzLTIuMcgHPg&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">First for SME Cybersecurity<br \/>\n<\/a><a href=\"https:\/\/www.google.com\/search?q=AI%3A+Yes+Minister%2C+How+Humphrey+AI+Council+Tools+Could+Transform+SME+Operations&amp;sca_esv=813765718ccf2407&amp;sxsrf=AE3TifO2lgdE_phI0JPjV1GzGP5wegQG4w%3A1749550337395&amp;ei=AQVIaIHwF8vNkdUP2eWAoA0&amp;ved=0ahUKEwjB9IHzzuaNAxXLZqQEHdkyANQQ4dUDCBA&amp;uact=5&amp;oq=AI%3A+Yes+Minister%2C+How+Humphrey+AI+Council+Tools+Could+Transform+SME+Operations&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiTkFJOiBZZXMgTWluaXN0ZXIsIEhvdyBIdW1waHJleSBBSSBDb3VuY2lsIFRvb2xzIENvdWxkIFRyYW5zZm9ybSBTTUUgT3BlcmF0aW9uc0j4D1AAWJEFcAF4AJABAJgBggKgAYICqgEDMi0xuAEDyAEA-AEB-AECmAIBoAIeqAIQwgINEC4YxwEYJxjqAhivAcICBxAjGCcY6gLCAgcQLhgnGOoCwgIUEAAYgAQYkQIYtAIYigUY6gLYAQHCAhoQLhiABBiRAhjRAxi0AhjHARiKBRjqAtgBAZgDHvEFRkv0gW1OFIm6BgYIARABGAGSBwExoAeCAbIHALgHAMIHAzQtMcgHGw&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 090625 at 11:26 CET<\/a><em><br \/>\n#SMECyberInsights #SMECyberSecurity #SMECyberAwareness #CyberSafe #SME #SmallBusiness #AI<br \/>\n<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ac433d2 elementor-widget elementor-widget-wp-widget-text\" data-id=\"3ac433d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Government trials of AI meeting assistant &#8220;Humphrey&#8221; reveal potential for small businesses to slash admin costs by 50% while improving service delivery<\/strong><\/p>\n<p>The UK government&#8217;s ambitious rollout of artificial intelligence tools across 25 local councils offers valuable insights for Small and Medium Enterprises (<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a>) seeking to streamline operations and reduce administrative burden. The trial of <strong>&#8220;Humphrey,&#8221;<\/strong> an <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a> suite that includes the meeting assistant tool &#8220;Minute,&#8221; demonstrates how intelligent automation can transform traditionally paper-heavy processes.<\/p>\n<p><strong>What SMEs Can Learn from Council AI Trials<\/strong><\/p>\n<p>The government&#8217;s pilot program has revealed that <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a>-powered meeting assistance can save one hour of administrative work for every hour-long meeting. For <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a> where owners and managers often wear multiple hats, this represents a significant opportunity to reclaim valuable time for strategic business activities.<\/p>\n<p><strong>Key findings relevant to SME operations:<\/strong><\/p>\n<p>* 60 minutes of admin time saved per hour-long meeting<br \/>\n* Nearly 50% of officials identified note-taking as their least enjoyable task<br \/>\n* Streamlined processes enable focus on core service delivery<br \/>\n* Automated record-keeping reduces compliance burden<\/p>\n<p><strong>The Technology Behind the Transformation<\/strong><\/p>\n<p><strong>&#8220;Minute,&#8221;<\/strong> part of the broader <strong>&#8220;Humphrey&#8221;<\/strong> <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a> suite, uses generative artificial intelligence to automatically convert meeting discussions into structured notes. The system includes built-in tools for editing and correcting summaries, ensuring accuracy while maintaining efficiency gains.<\/p>\n<p>For <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a>, similar <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a> meeting tools are increasingly available through platforms like Otter.ai, Zoom AI Companion, and Microsoft Copilot, offering comparable functionality at business-appropriate price points.<\/p>\n<p><strong>Industry Applications for Small Businesses<\/strong><\/p>\n<p>The council trials focus on two key areas that mirror common <strong>SME<\/strong> challenges:<\/p>\n<p><strong>Planning and Project Management:<\/strong> Local councils are using <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a> to streamline planning approvals, helping meet the government&#8217;s target of 1.5 million new homes by 2030. <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a> in construction, property development, and professional services can apply similar <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a> tools to project documentation, client meetings, and regulatory compliance.<\/p>\n<p><strong>Service Delivery and Client Relations:<\/strong> Social care workers are using <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a> to document supervision meetings, allowing more time for direct client support. <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a> in consulting, healthcare, legal services, and customer support can leverage similar tools to improve client interaction quality while maintaining comprehensive records.<\/p>\n<p><strong>Financial Implications for SMEs<\/strong><\/p>\n<p>The government&#8217;s push for \u00a345 billion in productivity savings through digitization highlights the substantial financial impact of <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a> adoption. For <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a>, the math is equally compelling:<\/p>\n<p><strong>* Time Savings:<\/strong> At an average hourly rate of \u00a330-50 for administrative tasks, saving one hour per meeting translates to \u00a3150-250 per week for businesses with five weekly meetings<br \/>\n<strong>* Improved Service Quality:<\/strong> Freed from administrative tasks, staff can focus on revenue-generating activities and customer satisfaction<br \/>\n<strong>* Compliance Benefits:<\/strong> Automated record-keeping reduces risks associated with missing documentation or incomplete meeting records<\/p>\n<p><strong>Government Support and Resources<\/strong><\/p>\n<p><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a> and Digital Government Minister Feryal Clark emphasized that local authorities <em>have &#8220;been left to fend for themselves&#8221;<\/em> regarding AI adoption. This challenge mirrors the experience of many <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a>. However, the government&#8217;s new<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong> AI<\/strong><\/a> Knowledge Hub provides practical examples and best practices that small businesses can adapt.<\/p>\n<p>The hub includes case studies such as <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a> assistants for reporting issues like fly-tipping and graffiti, demonstrating how artificial intelligence can handle routine administrative tasks across various sectors.<\/p>\n<p><strong>Implementation Considerations for SMEs<\/strong><\/p>\n<p><strong>Security and Privacy:<\/strong> Government trials prioritize data protection and security protocols. <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a> should ensure any <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a> tools meet <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/ensurety-partner-page\/\" target=\"_blank\" rel=\"noopener\"><strong>GDPR<\/strong><\/a> requirements and industry-specific compliance standards.<\/p>\n<p><strong>Cost-Benefit Analysis:<\/strong> While the government&#8217;s \u00a35 billion annual technology spend across councils highlights the scale of digital transformation, <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a> can achieve similar benefits with proportionally smaller investments.<\/p>\n<p><strong>Staff Training and Adoption:<\/strong> The government&#8217;s finding that nearly half of official\u2019s dislike note-taking suggests strong user acceptance potential. <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a> should focus on tools that address genuine pain points for maximum adoption success.<\/p>\n<p><strong>Market Opportunities for SME Service Providers<\/strong><\/p>\n<p>The government&#8217;s digitization push creates opportunities for <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a> in the technology sector:<\/p>\n<p><strong>* AI Implementation Consultancy:<\/strong> Helping other businesses adopt meeting automation and administrative <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a> tools<br \/>\n<strong>* Training and Support Services:<\/strong> Bridging the digital skills gap identified in the government review<br \/>\n<strong>* Specialized Solutions:<\/strong> Developing industry-specific <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a> applications based on government trial learnings<\/p>\n<p><strong>Looking Ahead: The GOV.UK App Model<\/strong><\/p>\n<p>The upcoming <a href=\"https:\/\/www.gov.uk\/government\/news\" target=\"_blank\" rel=\"noopener\"><strong>GOV.UK App<\/strong><\/a>, designed to provide citizens with mobile access to public services, offers a blueprint for <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SME<\/strong><\/a> digital transformation. <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a> can apply similar principles by:<\/p>\n<p>* Centralizing customer interactions through digital platforms<br \/>\n* Improving data sharing between departments and systems<br \/>\n* Standardizing processes to reduce complexity and costs<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>The government&#8217;s <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a> trials demonstrate that intelligent automation isn&#8217;t just for large organizations. <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a> can leverage similar technologies to achieve significant productivity gains, improve service quality, and reduce administrative burden. With <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a> meeting tools becoming increasingly accessible and affordable, the question for Small Businesses isn&#8217;t whether to adopt these technologies, but how quickly they can implement them effectively.<\/p>\n<p>The key is starting with specific pain points\u2014like meeting documentation\u2014and expanding <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/12\/cyber-knowledge-key-point-information-ai\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a> adoption as comfort and capability grow. As the government&#8217;s \u00a345 billion productivity target shows, the potential returns justify the investment in digital transformation.<\/p>\n<p><strong>For SMEs ready to explore AI meeting tools, start with a free trial of platforms like Otter.ai or Microsoft Copilot to experience the time savings firsthand.<\/strong><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c16976 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"4c16976\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.gov.uk\/government\/news\/ai-experiments-see-humphrey-help-townhalls-cut-costs-and-improve-services\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a80c4b3 e-flex e-con-boxed e-con e-parent\" data-id=\"2a80c4b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5dd6e003 e-con-full e-flex e-con e-child\" data-id=\"5dd6e003\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-424ca300 elementor-widget elementor-widget-image\" data-id=\"424ca300\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&#038;offerid=572706.44&#038;subid=0&#038;type=4\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"144\" height=\"144\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Nord_logo_1.png\" class=\"attachment-2048x2048 size-2048x2048 wp-image-12867\" alt=\"NordVPN\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53db5c01 e-con-full e-flex e-con e-child\" data-id=\"53db5c01\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ea1b488 elementor-widget elementor-widget-wp-widget-text\" data-id=\"5ea1b488\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>What is a VPN &amp; Does my SME Need one?<\/strong> A <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/08\/26\/special-feature-vpn\/\" target=\"_blank\" rel=\"noopener\"><strong>VPN<\/strong><\/a> is a Virtual Private Network a method of securing your communications credentials. When it comes to Small and Medium-sized enterprises (<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a>), the choice of <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/08\/26\/special-feature-vpn\/\" target=\"_blank\" rel=\"noopener\"><strong>VPNs<\/strong><\/a> can significantly impact the security and efficiency of their operations.<\/p>\n<p>The\u00a0<b>NordVPN<\/b> service allows you to connect to 5600+ servers in 60+ countries. It secures your Internet data with military-grade encryption, ensures your web activity remains private and helps bypass geographic content restrictions online. \u00a0<strong><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.44&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\">Join\u00a0NordVPN\u00a0Today and\u00a0Save\u00a0up to\u00a073%\u00a0and Get 3 months\u00a0Extra Free<\/a> &#8211; Rude Not to \u2026!<\/strong><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ccc5b19 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"7ccc5b19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/nordvpn.com\/special\/?utm_medium=affiliate&#038;utm_term=&#038;utm_content=rv_nShY4wLA-emnpSewtfAm9zRdw1TNpcw&#038;utm_campaign=off15&#038;utm_source=aff8398\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-22678b88 e-con-full e-flex e-con e-parent\" data-id=\"22678b88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-366a1a85 e-con-full e-flex e-con e-child\" data-id=\"366a1a85\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22685371 elementor-widget elementor-widget-image\" data-id=\"22685371\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280-300x200.jpg\" class=\"attachment-medium size-medium wp-image-19834\" alt=\"CYBERInsights | Practical Small Business Cybersecurity\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-15b65532 e-con-full e-flex e-con e-child\" data-id=\"15b65532\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ca887ee elementor-widget elementor-widget-html\" data-id=\"5ca887ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c4d991c elementor-widget elementor-widget-wp-widget-text\" data-id=\"5c4d991c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><h4>UK Small Business Owner? Join SMECyber Free Now! &amp; Access the SME Cyber Forum &#8211; Read, Learn, Engage, Share &#8230;<\/h4>\n<p>The Latest <strong>SME<\/strong> Cybersecurity News, Threat Intelligence &amp; Analysis, Timely Scam Alerts, Best-practice Compliance, Mitigation &amp; Resources specifically curated for UK Based <strong>SMEs<\/strong> in a Single Weekly Email direct to your Inbox or Smart Device together with Unrestricted Free Access to our entire <strong>SME<\/strong> Cyber Knowledge &amp; Tutorial Library.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28e7da74 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"28e7da74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-22307dfd e-flex e-con-boxed e-con e-parent\" data-id=\"22307dfd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b043aa5 elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"2b043aa5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-AI-3-768x432.jpg\" alt=\"CI_Feature AI (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-Cloud-Security-1-1-768x432.jpg\" alt=\"CI_Feature Cloud Security (1)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-GDPR-1-1-768x432.jpg\" alt=\"_CI_Feature GDPR (1)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/CI_Feature-Identity-Theft-2-768x432.jpg\" alt=\"CI_Feature Identity Theft (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Attack-Mitigation-6-768x432.jpg\" alt=\"CI_Feature Attack Mitigation (6)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Phishing-3-768x432.jpg\" alt=\"CI_Feature Phishing (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-Blockchain-5-768x432.jpg\" alt=\"CI_Feature Blockchain (5)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/CI_Feature-MFA-2-768x432.jpg\" alt=\"CI_Feature MFA (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-ISO-27001-2-768x432.jpg\" alt=\"CI_Feature Cyber ISO 27001 (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-EU-CRA-2-768x432.jpg\" alt=\"CI_Feature Cyber EU CRA (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Report-Cybercrime-3-768x432.jpg\" alt=\"CI_Report Cybercrime (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"12 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-Compliance-3-768x432.jpg\" alt=\"CI_Feature Cyber Compliance (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"13 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Cyber-NIS2-2-768x432.jpg\" alt=\"CI_Feature Cyber NIS2 (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"14 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-MSPs-2-768x432.jpg\" alt=\"CI_Feature MSPs (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"15 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-SaaS-2-768x432.jpg\" alt=\"CI_Feature SaaS (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"16 of 16\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/CI_Feature-Email-Security-1-768x432.jpg\" alt=\"CI_Feature Email Security (1)\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: Stephen Craven, via Wikimedia Commons under CC BY-SA 2.0 Learn More \/&#8230; Learn&#8230;<\/p>\n","protected":false},"author":1,"featured_media":21865,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[544],"tags":[517],"ppma_author":[505],"class_list":["post-21864","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","tag-cyberawareness"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/AI-Image-Credit-Stephen-Craven-via-Wikimedia-Commons-under-CC-BY-SA-2.0.jpg",624,468,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/AI-Image-Credit-Stephen-Craven-via-Wikimedia-Commons-under-CC-BY-SA-2.0-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/AI-Image-Credit-Stephen-Craven-via-Wikimedia-Commons-under-CC-BY-SA-2.0-300x225.jpg",300,225,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/AI-Image-Credit-Stephen-Craven-via-Wikimedia-Commons-under-CC-BY-SA-2.0.jpg",624,468,false],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/AI-Image-Credit-Stephen-Craven-via-Wikimedia-Commons-under-CC-BY-SA-2.0.jpg",624,468,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/AI-Image-Credit-Stephen-Craven-via-Wikimedia-Commons-under-CC-BY-SA-2.0.jpg",624,468,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/AI-Image-Credit-Stephen-Craven-via-Wikimedia-Commons-under-CC-BY-SA-2.0.jpg",624,468,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/AI-Image-Credit-Stephen-Craven-via-Wikimedia-Commons-under-CC-BY-SA-2.0.jpg",624,468,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/AI-Image-Credit-Stephen-Craven-via-Wikimedia-Commons-under-CC-BY-SA-2.0-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/ai\/\" rel=\"category tag\">AI<\/a>","tag_info":"AI","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/21864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=21864"}],"version-history":[{"count":8,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/21864\/revisions"}],"predecessor-version":[{"id":22342,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/21864\/revisions\/22342"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/21865"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=21864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=21864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=21864"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=21864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}