{"id":2209,"date":"2024-01-22T11:55:37","date_gmt":"2024-01-22T11:55:37","guid":{"rendered":"https:\/\/cyberinsights.argusgpi.com\/?p=2209"},"modified":"2024-03-14T12:49:07","modified_gmt":"2024-03-14T11:49:07","slug":"daily-cyber-insights-for-monday-22-january-2024","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/01\/22\/daily-cyber-insights-for-monday-22-january-2024\/","title":{"rendered":"DAILY CYBER INSIGHTS: The Latest SME Cybersecurity\u00a0News &#038; Intel for Monday, 22 January"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2209\" class=\"elementor elementor-2209\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f744a0a e-flex e-con-boxed e-con e-parent\" data-id=\"3f744a0a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1524079e elementor-widget elementor-widget-html\" data-id=\"1524079e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-5781064184570704\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- CYBERInsights_Leaderboard_2024 -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-5781064184570704\"\r\n     data-ad-slot=\"3112489701\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-65dbaec5 e-flex e-con-boxed e-con e-parent\" data-id=\"65dbaec5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4a763c53 e-con-full e-flex e-con e-child\" data-id=\"4a763c53\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3be0b563 elementor-widget elementor-widget-image\" data-id=\"3be0b563\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/01\/rome-5074421_1280-300x200.jpg\" class=\"attachment-medium size-medium wp-image-2218\" alt=\"rome-5074421_1280\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/01\/rome-5074421_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/01\/rome-5074421_1280-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/01\/rome-5074421_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/01\/rome-5074421_1280.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5dae2a2d e-con-full e-flex e-con e-child\" data-id=\"5dae2a2d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6807697d elementor-widget elementor-widget-wp-widget-text\" data-id=\"6807697d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Monday, 22 January 2024<\/p>\n<p><strong>DAILY CYBER INSIGHTS: The Latest SME Cybersecurity\u00a0 News &amp; Analysis for Monday, 22 January 2024 <\/strong><br \/>\nWritten &amp; Curated By\u00a0<a href=\"https:\/\/www.google.com\/search?q=cybersecurity+journalist&amp;oq=Cybersec&amp;gs_lcrp=EgZjaHJvbWUqCQgAEEUYOxiABDIJCAAQRRg7GIAEMgYIARBFGDsyBwgCEAAYgAQyBggDEEUYQDIGCAQQRRg5MgcIBRAAGIAEMgcIBhAAGIAEMgcIBxAAGIAE0gEJMzc1MmowajE1qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser \u2013 SME Cybersecurity Journalist<\/a><br \/>\n<a href=\"https:\/\/www.iainfraser.net\/\" target=\"_blank\" rel=\"noopener\">IainFRASER.net\/CYBERInsights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=daily+cyber+insights&amp;oq=daily+cyber&amp;gs_lcrp=EgZjaHJvbWUqCAgCEEUYJxg7MgkIABBFGDkYgAQyBggBEEUYOzIICAIQRRgnGDsyBggDECMYJzIMCAQQABgUGIcCGIAEMgwIBRAAGBQYhwIYgAQyBwgGEAAYgAQyBwgHEAAYgAQyBwgIEAAYgAQyBwgJEAAYgATSAQk2NjUxajBqMTWoAgCwAgA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Daily Cyber Insights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=DAILY+CYBER+INSIGHTS%3A+The+Latest+SME+Cybersecurity+News+%26+Analysis+for+Wednesday%2C+22+January+2024&amp;sca_esv=600762144&amp;sxsrf=ACQVn08MfkiZoIdPBSZF8HJkjAbK_5CnMA%3A1706024939788&amp;ei=69-vZZ3jL474kdUPjKKtEA&amp;ved=0ahUKEwjdhI6U7vODAxUOfKQEHQxRCwIQ4dUDCBA&amp;uact=5&amp;oq=DAILY+CYBER+INSIGHTS%3A+The+Latest+SME+Cybersecurity+News+%26+Analysis+for+Wednesday%2C+22+January+2024&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiYURBSUxZIENZQkVSIElOU0lHSFRTOiBUaGUgTGF0ZXN0IFNNRSBDeWJlcnNlY3VyaXR5IE5ld3MgJiBBbmFseXNpcyBmb3IgV2VkbmVzZGF5LCAyMiBKYW51YXJ5IDIwMjRIAFAAWABwAHgAkAEAmAEAoAEAqgEAuAEDyAEA-AEB4gMEGAAgQQ&amp;sclient=gws-wiz-serp#ip=1\" target=\"_blank\" rel=\"noopener\">Google Indexed on 220124 at 10:55 CET<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e2b1b5 e-flex e-con-boxed e-con e-parent\" data-id=\"5e2b1b5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1bdaf3a1 elementor-widget elementor-widget-wp-widget-text\" data-id=\"1bdaf3a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Good Morning from Gibraltar \u2013 Today\u00b4s CYBERInsights:<\/strong><\/p>\n<p><strong>1. <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-ai-artificial-intelligence\/\" target=\"_blank\" rel=\"noopener\">ARTIFICIAL INTELLIGENCE<\/a>: Vatican has go to <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-ai-artificial-intelligence\/\" target=\"_blank\" rel=\"noopener\">AI<\/a> ethics expert.<\/strong> AP\u00a0has reported that The Vatican has a designated Artificial Intelligence Ethics Expert &#8211; <em>Paolo Benanti<\/em> an Italian priest, Theologian &amp; Academic. The 50 year old cleric is a member of the medieval Order of St. Francis. He is a lecturer at the Pontifical Gregorian University in Rome a higher education ecclesiastical school and is the senior advisor to Pope Francis on all issues of Artificial Intelligence &amp; Technology morals and ethics. <a href=\"https:\/\/follow.it\/geopoliticalmatters\" target=\"_blank\" rel=\"noopener\"><strong>Learn More \/&#8230;\u00a0<\/strong><\/a> #<em>CYBERInsights\u00a0 <\/em><em>#CYBERVoice #CyberJourno #CybersecurityJournalist #SMECybersecurityJournalist #SMECybersecurity<\/em><\/p>\n<p><strong>2. GARTNER INITIATIVE: GARTNER FOR CYBERSECURITY LEADERS &#8211;<\/strong> In 2022, 82% of data breaches were \u201ca result of employee behaviours that were insecure or inadvertent,\u201d making it clear that the human element is a prominent contributor. Gartner for CISOs (Chief Information Security Officers) helps you reframe the CISOs Role by aligning your security strategy to business objectives and build programs that balance protection with the needs of your organization. Manage human risk and build a security-conscious organization. <strong><a href=\"https:\/\/www.gartner.com\/en\/cybersecurity?utm_campaign=RM_GB_2024_ITLDR_C_NL2_JANUARY18_SECR_MR&amp;utm_medium=email&amp;utm_source=Eloqua&amp;cm_mmc=Eloqua-_-Email-_-LM_RM_GB_2024_ITLDR_C_NL2_JANUARY18_SECR_MR-_-0000\" target=\"_blank\" rel=\"noopener\">Learn More \/&#8230;<\/a><\/strong> #<em>CYBERInsights\u00a0 <\/em><em>#CYBERVoice #CyberJourno #CybersecurityJournalist #SMECybersecurityJournalist #SMECybersecurity<\/em><\/p>\n<p><strong>3. CYBERSECURITY AS A CAREER: WEF &#8211;<\/strong> Thinking of exploring a new career in Cybersecurity? The World Economic Forum (WEF) While the shortage of cybersecurity talent presents a significant challenge for organizations across the public and private sector, it also offers an opportunity for individuals to pursue a fulfilling and financially rewarding career. According to a 2019 job satisfaction survey, 78% of respondents already working in the industry would recommend a career in cybersecurity. <strong><a href=\"https:\/\/www.weforum.org\/agenda\/2024\/01\/changing-career-to-cybersecurity-here-are-the-programmes-you-should-know-about\/\" target=\"_blank\" rel=\"noopener\">Learn More \/&#8230;\u00a0<\/a><\/strong> #<em>CYBERInsights\u00a0 <\/em><em>#CYBERVoice #CyberJourno #CybersecurityJournalist #SMECybersecurityJournalist #SMECybersecurity<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e687698 e-flex e-con-boxed e-con e-parent\" data-id=\"1e687698\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-635ba55f elementor-widget elementor-widget-html\" data-id=\"635ba55f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-5781064184570704\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-format=\"autorelaxed\"\r\n     data-ad-client=\"ca-pub-5781064184570704\"\r\n     data-ad-slot=\"5417258845\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"","footnotes":""},"categories":[14],"tags":[419],"ppma_author":[415],"class_list":["post-2209","post","type-post","status-publish","format-standard","hentry","category-cyberinsights","tag-cyberinsights"],"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":"","covernews-featured":"","covernews-medium":""},"author_info":{"display_name":"Cybersecurity Journalist - Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" rel=\"category tag\">SMECYBERIINSIGHTS<\/a>","tag_info":"SMECYBERIINSIGHTS","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/2209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=2209"}],"version-history":[{"count":0,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/2209\/revisions"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=2209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=2209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=2209"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=2209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}