{"id":22502,"date":"2025-06-14T12:00:41","date_gmt":"2025-06-14T10:00:41","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=22502"},"modified":"2025-06-19T12:20:09","modified_gmt":"2025-06-19T10:20:09","slug":"marks-saga-continues","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2025\/06\/14\/marks-saga-continues\/","title":{"rendered":"REPORTAGE: M&#038;S Crisis &#8211; \u00a3700M Lost Yet Britain&#8217;s Retail Giant Remains Dangerously Exposed"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"22502\" class=\"elementor elementor-22502\">\n\t\t\t\t<div class=\"elementor-element elementor-element-106e45e1 e-flex e-con-boxed e-con e-parent\" data-id=\"106e45e1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-efc96f4 elementor-widget elementor-widget-html\" data-id=\"efc96f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7eed2510 e-con-full e-flex e-con e-child\" data-id=\"7eed2510\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-24d0bf8d elementor-widget__width-initial elementor-widget elementor-widget-image-carousel\" data-id=\"24d0bf8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;slides_to_show&quot;:&quot;6&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"CYBERPartners\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners1_NordVPN.png\" alt=\"Partners1_NordVPN\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners3_R3.png\" alt=\"Partners3_R3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners2_Zoho.png\" alt=\"Partners2_Zoho\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Plesk.png\" alt=\"Partners4_Plesk\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Ensurety.png\" alt=\"Partners4_Ensurety\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners7_Passware.png\" alt=\"Partners7_Passware\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/CIP-Logo.png\" alt=\"CIP Logo\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/Red_Button_Slider.png\" alt=\"Red_Button_Slider\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/FoxTech_Partner_Logo_Banner.png\" alt=\"FoxTech_Partner_Logo_Banner\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/04\/ogo2.png\" alt=\"ogo2\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-23a6fb15 e-con-full e-flex e-con e-parent\" data-id=\"23a6fb15\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4218c345 e-con-full e-flex e-con e-child\" data-id=\"4218c345\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-610ca80e elementor-widget elementor-widget-image\" data-id=\"610ca80e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/commons.wikimedia.org\/wiki\/User:Sebastiandoe5\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"624\" height=\"351\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Image-Credit-Sebastiandoe5.png\" class=\"attachment-large size-large wp-image-22503\" alt=\"Image Credit Sebastiandoe5\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Image-Credit-Sebastiandoe5.png 624w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Image-Credit-Sebastiandoe5-300x169.png 300w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Sebastiandoe5<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6d53ac25 e-con-full e-flex e-con e-child\" data-id=\"6d53ac25\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-702c011b elementor-widget elementor-widget-html\" data-id=\"702c011b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-904e1cc elementor-widget elementor-widget-wp-widget-text\" data-id=\"904e1cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Helping Keep Small Business CYBERSafe<br \/>\n<\/strong>M\u00e1laga: Saturday, 14 June 2025 at 12:00 CEST<\/p>\n<p><b>REPORTAGE: M&amp;S Crisis &#8211; \u00a3700M Lost Yet Britain&#8217;s Retail Giant Remains Dangerously Exposed<\/b><strong><br \/>\n<\/strong><b><\/b>By <a href=\"iain@iainfraser.net\">Iain Fraser\/<\/a>Reportage &amp; <a href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">Andy Jenkinson CIP<\/a><br \/>\n<a href=\"SMECyberInsights.co.uk\">SMECyberInsights.co.uk<\/a><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\"> &#8211;\u00a0<\/a><a href=\"https:\/\/www.google.com\/search?q=SME+Cybersecurity&amp;sca_esv=01731d022ec92237&amp;rlz=1C1FKPE_enES1123ES1124&amp;sxsrf=AHTn8zozW-9dbXRwHlu5zyHfc5aukU6yeQ%3A1747146305898&amp;ei=QVYjaILMNsyKkdUP1teCyQk&amp;ved=0ahUKEwjC8LuX06CNAxVMRaQEHdarIJkQ4dUDCBA&amp;uact=5&amp;oq=SME+Cybersecurity&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiEVNNRSBDeWJlcnNlY3VyaXR5MgoQIxiABBgnGIoFMgQQIxgnMgQQIxgnMgYQABgHGB4yCxAAGIAEGJECGIoFMggQABgHGAgYHjIIEAAYBxgIGB4yCBAAGAcYCBgeMggQABgHGAgYHjIIEAAYBxgIGB5Iwy9QAFj5JHAAeAGQAQCYAZ0BoAG2A6oBAzAuM7gBA8gBAPgBAZgCA6AC-wPCAgQQABgewgIGEAAYCBgewgIHEAAYgAQYDcICCBAAGAUYDRgemAMAkgcDMC4zoAf9GbIHAzAuM7gH-wPCBwUzLTIuMcgHPg&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">First for SME Cybersecurity<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=%C2%A3700M+Lost+Yet+Britain%E2%80%99s+Retail+Giant+Remains+Dangerously+Exposed&amp;sca_esv=df01bcb31997a21e&amp;sxsrf=AE3TifMqu6Q-kCykreUqe-Q1BxcGue7Qlg%3A1750328165749&amp;ei=ZeNTaJe9LbStkdUP_eb32A4&amp;ved=0ahUKEwjXg73EoP2NAxW0VqQEHX3zHesQ4dUDCBA&amp;uact=5&amp;oq=%C2%A3700M+Lost+Yet+Britain%E2%80%99s+Retail+Giant+Remains+Dangerously+Exposed&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiRMKjNzAwTSBMb3N0IFlldCBCcml0YWlu4oCZcyBSZXRhaWwgR2lhbnQgUmVtYWlucyBEYW5nZXJvdXNseSBFeHBvc2VkSIobUKYHWPcNcAF4AJABAJgBywKgAcsCqgEDMy0xuAEDyAEA-AEBmAIAoAIAmAMAiAYBkgcAoAeRAbIHALgHAMIHAMgHAA&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indeed on 140625 at 13:10 CET<\/a><em><br \/>\n#SMECyberInsights #SMECyberSecurity #SMECyberAwareness #CyberSafe #SME #SmallBusiness\u00a0<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d7168ff e-con-full e-flex e-con e-child\" data-id=\"4d7168ff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a266bd6 elementor-widget elementor-widget-wp-widget-text\" data-id=\"a266bd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Executive Summary<\/strong><\/p>\n<p>Seven weeks after the devastating cyber attack that crippled <a href=\"https:\/\/corporate.marksandspencer.com\/cyber-update\" target=\"_blank\" rel=\"noopener\">Marks &amp; Spencer<\/a>&#8216;s operations, Britain&#8217;s retail giant remains fundamentally insecure, leaving millions of customers exposed to ongoing cyber threats. Despite \u00a3300 million in direct operating losses and over \u00a3700 million wiped from market value, <a href=\"https:\/\/corporate.marksandspencer.com\/cyber-update\" target=\"_blank\" rel=\"noopener\">M&amp;S<\/a> continues to chase attribution shadows rather than addressing core security vulnerabilities that enabled the breach.<\/p>\n<p><strong>The Staggering Financial Carnage<\/strong><\/p>\n<p>The numbers tell a devastating story. The &#8220;highly sophisticated and targeted&#8221; cyberattack will cost <a href=\"https:\/\/corporate.marksandspencer.com\/cyber-update\" target=\"_blank\" rel=\"noopener\">Marks &amp; Spencer<\/a> about \u00a3300 million in lost operating profit, with disruption to online services likely until July. When combined with the \u00a3700 million market value destruction, total losses exceed \u00a31 billion &#8211; making this potentially the costliest retail cyber incident in UK history.<\/p>\n<p>The attack&#8217;s scope was comprehensive: stolen customer information could include basic contact details, dates of birth and online order histories, with payment information potentially compromised. <a href=\"https:\/\/corporate.marksandspencer.com\/cyber-update\" target=\"_blank\" rel=\"noopener\">M&amp;S<\/a> serves 32 million customers annually, meaning the breach&#8217;s impact reaches unprecedented scales.<\/p>\n<p><strong>The Uncomfortable Truth: Nothing Has Changed<\/strong><\/p>\n<p>Despite attribution, aka finger pointing, being placed on <a href=\"https:\/\/www.tcs.com\/\" target=\"_blank\" rel=\"noopener\">Tata Consultancy Services<\/a> and a rogue email, <a href=\"https:\/\/corporate.marksandspencer.com\/cyber-update\" target=\"_blank\" rel=\"noopener\">Marks and Spencer<\/a> continue to overlook and ignore all basic Internet security preferring to chase shadows. This does absolutely nothing for millions of <a href=\"https:\/\/corporate.marksandspencer.com\/cyber-update\" target=\"_blank\" rel=\"noopener\">Marks and Spencer<\/a> customers&#8217; security who will potentially be exposed for many years to come to cyber crime and fraud.<\/p>\n<p>Immaterial of any, and every narrative of how, and why <a href=\"https:\/\/corporate.marksandspencer.com\/cyber-update\" target=\"_blank\" rel=\"noopener\">Marks and Spencer<\/a>&#8216;s basic security negligence was exploited &#8211; why are <a href=\"https:\/\/corporate.marksandspencer.com\/cyber-update\" target=\"_blank\" rel=\"noopener\">Marks and Spencer<\/a> still woefully and wholly unacceptably exposed, insecure, and vulnerable and by default, forcing their customers to be? Although an uncomfortable question, until these issues are addressed and remediated, <a href=\"https:\/\/corporate.marksandspencer.com\/cyber-update\" target=\"_blank\" rel=\"noopener\">Marks and Spencer<\/a> and their millions of customers continue to be extremely exposed and extremely vulnerable.<\/p>\n<p>The fundamental issue remains: while <a href=\"https:\/\/corporate.marksandspencer.com\/cyber-update\" target=\"_blank\" rel=\"noopener\">M&amp;S<\/a> executives focus on blame attribution and damage control narratives; the underlying security architecture that enabled this breach remains largely unchanged. The <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/08\/special-feature-ransomware\/\" target=\"_blank\" rel=\"noopener\">Ransomware<\/a> attack by an unnamed criminal gang, although all avenues point to the \u201c<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2025\/05\/10\/notorious-hackers-behind-major-cyberattacks\/\" target=\"_blank\" rel=\"noopener\">Scattered Spider<\/a>\u201d hacker group exploited basic security oversights that, seven weeks later, appear to remain unaddressed.<\/p>\n<p><strong>Expert Analysis: The Path Forward<\/strong><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">Andy Jenkinson<\/a>, cybersecurity expert at <a href=\"https:\/\/www.linkedin.com\/company\/cybersec-innovation-partners\" target=\"_blank\" rel=\"noopener\">CIP<\/a> (Cybersec Innovation Partners), emphasizes that post-breach remediation requires a complete security transformation, not superficial patches. <em>&#8220;The M&amp;S incident demonstrates the catastrophic cost of treating cybersecurity as an afterthought rather than a foundational business requirement,&#8221;<\/em> Jenkinson notes. <em>&#8220;Seven weeks post-breach, the focus should be on comprehensive security architecture rebuilding, not finger-pointing exercises.&#8221;<\/em><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">Jenkinson<\/a>&#8216;s expertise highlights critical gaps in M&amp;S&#8217;s approach: <em>&#8220;Effective cyber resilience demands zero-trust architecture implementation, comprehensive employee security training beyond basic awareness, and proactive threat hunting capabilities. The fact that basic security oversight failures enabled this breach suggests these fundamentals were never properly established.&#8221;<\/em><\/p>\n<p><strong>Cyber Insurance: A \u00a3300M Question Mark<\/strong><\/p>\n<p>With direct losses exceeding \u00a3300 million, <a href=\"https:\/\/corporate.marksandspencer.com\/cyber-update\" target=\"_blank\" rel=\"noopener\">M&amp;S<\/a>&#8216;s cyber insurance coverage faces intense scrutiny. Industry analysts suggest that comprehensive cyber policies typically cover \u00a350-100 million for retailers of <a href=\"https:\/\/corporate.marksandspencer.com\/cyber-update\" target=\"_blank\" rel=\"noopener\">M&amp;S<\/a>&#8216;s scale, potentially leaving hundreds of millions in uninsured losses. The attribution blame game with <a href=\"https:\/\/www.tcs.com\/\" target=\"_blank\" rel=\"noopener\">Tata Consultancy Services<\/a> may be driven by <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/08\/cyber-knowledge-key-point-information-cyber-insurance\/\" target=\"_blank\" rel=\"noopener\">Cyber Insurance<\/a> requirements rather than genuine security improvement efforts.<\/p>\n<p><strong>Critical Customer Protection Measures<\/strong><\/p>\n<p>For <a href=\"https:\/\/corporate.marksandspencer.com\/cyber-update\" target=\"_blank\" rel=\"noopener\">M&amp;S<\/a> customers affected by this breach, immediate protective actions are essential:<\/p>\n<p><strong>Immediate Actions:<\/strong><\/p>\n<p>* Change all passwords associated with M&amp;S accounts and any sites using similar credentials<br \/>\n* Enable two-factor authentication on all financial and retail accounts<br \/>\n* Monitor bank and credit card statements weekly for unauthorized transactions<br \/>\n* Consider credit monitoring services given the scale of data compromised<\/p>\n<p><strong>Long-term Vigilance:<\/strong><\/p>\n<p>* Remain alert to sophisticated phishing attempts using your compromised personal data<br \/>\n* Be sceptical of unsolicited communications claiming to be from M&amp;S or financial institutions<br \/>\n* Regularly review credit reports for unauthorized accounts or inquiries<br \/>\n* Consider identity theft protection services for ongoing monitoring<\/p>\n<p><strong>Financial Protection:<\/strong><\/p>\n<p>* Contact your bank to discuss transaction monitoring enhancements<br \/>\n* Review and understand your bank&#8217;s fraud protection policies<br \/>\n* Document any suspicious activity immediately with timestamps and screenshots<\/p>\n<p><strong>The Wider Implications<\/strong><\/p>\n<p>This incident represents more than corporate embarrassment &#8211; it&#8217;s a fundamental failure of duty of care to customers. With hackers also hitting Co-op and Harrods in Britain, retailers worldwide are racing to boost security, yet <a href=\"https:\/\/corporate.marksandspencer.com\/cyber-update\" target=\"_blank\" rel=\"noopener\">M&amp;S<\/a> appears to be lagging behind this urgent industry response.<\/p>\n<p>The extended timeline of impact &#8211; with disruption expected until July &#8211; suggests either inadequate incident response capabilities or more extensive compromise than publicly acknowledged.<\/p>\n<p><strong>Conclusion: Accountability Deficit<\/strong><\/p>\n<p>Seven weeks after one of Britain&#8217;s costliest retail cyber attacks, <a href=\"https:\/\/corporate.marksandspencer.com\/cyber-update\" target=\"_blank\" rel=\"noopener\">M&amp;S<\/a> customers deserve better than blame games and damage control narratives. The uncomfortable reality is that basic security failures enabled this breach, and those fundamental vulnerabilities appear to remain unaddressed.<\/p>\n<p>Until <a href=\"https:\/\/corporate.marksandspencer.com\/cyber-update\" target=\"_blank\" rel=\"noopener\">M&amp;S<\/a> demonstrates genuine commitment to comprehensive security transformation rather than attribution exercises, millions of customers remain unnecessarily exposed to ongoing cyber threats. The \u00a3700 million market value destruction should serve as a wake-up call &#8211; customers and investors are losing patience with cybersecurity negligence.<\/p>\n<p>The question remains: How many more weeks will pass before <a href=\"https:\/\/corporate.marksandspencer.com\/cyber-update\" target=\"_blank\" rel=\"noopener\">M&amp;S<\/a> prioritizes customer security over corporate damage control?<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c91ccd6 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"4c91ccd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Join SME Cyber Today!  \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-69fcc097 e-con-full e-flex e-con e-parent\" data-id=\"69fcc097\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1b2086d1 e-con-full e-flex e-con e-child\" data-id=\"1b2086d1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4206e235 elementor-widget elementor-widget-image\" data-id=\"4206e235\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280-300x200.jpg\" class=\"attachment-medium size-medium wp-image-19834\" alt=\"CYBERInsights | Practical Small Business Cybersecurity\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4ad2ba73 e-con-full e-flex e-con e-child\" data-id=\"4ad2ba73\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bc2e774 elementor-widget elementor-widget-html\" data-id=\"bc2e774\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d81a17 elementor-widget elementor-widget-wp-widget-text\" data-id=\"7d81a17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><h4>UK Small Business Owner? Join SMECyber Free Now! &amp; Access the SME Cyber Forum &#8211; Read, Learn, Engage, Share &#8230;<\/h4>\n<p>The Latest <strong>SME<\/strong> Cybersecurity News, Threat Intelligence &amp; Analysis, Timely Scam Alerts, Best-practice Compliance, Mitigation &amp; Resources specifically curated for UK Based <strong>SMEs<\/strong> in a Single Weekly Email direct to your Inbox or Smart Device together with Unrestricted Free Access to our entire <strong>SME<\/strong> Cyber Knowledge &amp; Tutorial Library.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f81bc90 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1f81bc90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b798a55 e-flex e-con-boxed e-con e-parent\" data-id=\"5b798a55\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-277ec3c6 e-con-full e-flex e-con e-child\" data-id=\"277ec3c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e49524d elementor-widget elementor-widget-image\" data-id=\"6e49524d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"200\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/cybersec_innovation_partners_ltd_logo.jpg\" class=\"attachment-large size-large wp-image-12128\" alt=\"Cybersec Innovation Partners\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/cybersec_innovation_partners_ltd_logo.jpg 200w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/cybersec_innovation_partners_ltd_logo-150x150.jpg 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6065fa8 e-con-full e-flex e-con e-child\" data-id=\"6065fa8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d6ebd71 elementor-widget elementor-widget-wp-widget-text\" data-id=\"6d6ebd71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong><span lang=\"en-GB\">About Andy Jenkinson<\/span><\/strong><\/p>\n<p><strong><span lang=\"en-GB\">Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech &amp; Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset &amp; DNS Vulnerabilities.<\/span><\/strong><\/p>\n<p>Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years\u2019 experience as a hands-on lateral thinking CEO, coach, and leader.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55ef39e7 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"55ef39e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">LEARN MORE \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-31440539 e-flex e-con-boxed e-con e-parent\" data-id=\"31440539\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5feddc45 elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"5feddc45\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-AI--768x432.jpg\" alt=\"CI_Feature AI\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Attack-Mitigation-10-768x432.jpg\" alt=\"CI_Feature Attack Mitigation (10)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Identity-Theft-4-768x432.jpg\" alt=\"CI_Feature Identity Theft (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Cloud-Security-3-768x432.jpg\" alt=\"CI_Feature Cloud Security (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Communications-2-768x432.jpg\" alt=\"CI_Feature Communications (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Cyber-Compliance-8-768x432.jpg\" alt=\"CI_Feature Cyber Compliance (8)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Cyber-Insurance-7-768x432.jpg\" alt=\"CI_Feature Cyber Insurance (7)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Copy-of-CI_Feature-Scam-Protection-1-768x432.jpg\" alt=\"Data Recovery: Protecting Business Continuity in a High-Risk Cyber Landscape \u2013 Cyber KPI\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-DDoS-4-768x432.jpg\" alt=\"CI_Feature DDoS (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Email-Security-3-768x432.jpg\" alt=\"CI_Feature Email Security (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-MSPs-6-768x432.jpg\" alt=\"CI_Feature MSPs (6)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"12 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Pen-Testing-768x432.jpg\" alt=\"CI_Feature Pen Testing\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"13 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Phishing-5-768x432.jpg\" alt=\"CI_Feature Phishing (5)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"14 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Ransomware-7-768x432.jpg\" alt=\"CI_Feature Ransomware (7)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"15 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-SaaS-4-768x432.jpg\" alt=\"CI_Feature SaaS (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"16 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Scam-Protection-3-768x432.jpg\" alt=\"CI_Feature Scam Protection (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"17 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Smart-Security-4-768x432.jpg\" alt=\"CI_Feature Smart Security (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"18 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Cyber-Training-4-768x432.jpg\" alt=\"CI_Feature Cyber Training (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"19 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-The-VPN-3-768x432.jpg\" alt=\"CI_Feature The VPN (3)\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: Sebastiandoe5 Join SME Cyber Today! \/&#8230; Image Credit: IfOnlyCommunications Learn More \/&#8230; LEARN&#8230;<\/p>\n","protected":false},"author":1,"featured_media":22503,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[594],"tags":[652,595],"ppma_author":[505],"class_list":["post-22502","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-reportage","tag-ms","tag-reportage"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Image-Credit-Sebastiandoe5.png",624,351,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Image-Credit-Sebastiandoe5-150x150.png",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Image-Credit-Sebastiandoe5-300x169.png",300,169,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Image-Credit-Sebastiandoe5.png",624,351,false],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Image-Credit-Sebastiandoe5.png",624,351,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Image-Credit-Sebastiandoe5.png",624,351,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Image-Credit-Sebastiandoe5.png",624,351,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Image-Credit-Sebastiandoe5.png",624,351,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Image-Credit-Sebastiandoe5-540x340.png",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/reportage\/\" rel=\"category tag\">REPORTAGE<\/a>","tag_info":"REPORTAGE","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/22502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=22502"}],"version-history":[{"count":11,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/22502\/revisions"}],"predecessor-version":[{"id":22737,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/22502\/revisions\/22737"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/22503"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=22502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=22502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=22502"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=22502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}