{"id":22819,"date":"2025-08-09T12:00:42","date_gmt":"2025-08-09T10:00:42","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=22819"},"modified":"2025-08-08T14:35:11","modified_gmt":"2025-08-08T12:35:11","slug":"cybercrime-corporate-fraud","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2025\/08\/09\/cybercrime-corporate-fraud\/","title":{"rendered":"Reportage: How Cybercrime Became the Perfect Cover for Corporate Financial Fraud in 2025"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"22819\" class=\"elementor elementor-22819\">\n\t\t\t\t<div class=\"elementor-element elementor-element-267b7036 e-flex e-con-boxed e-con e-parent\" data-id=\"267b7036\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-701aa33 elementor-widget elementor-widget-html\" data-id=\"701aa33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-44e21bbd e-con-full e-flex e-con e-child\" data-id=\"44e21bbd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-480b39d9 elementor-widget__width-initial elementor-widget elementor-widget-image-carousel\" data-id=\"480b39d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;slides_to_show&quot;:&quot;6&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"CYBERPartners\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners1_NordVPN.png\" alt=\"Partners1_NordVPN\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners3_R3.png\" alt=\"Partners3_R3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners2_Zoho.png\" alt=\"Partners2_Zoho\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Plesk.png\" alt=\"Partners4_Plesk\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Ensurety.png\" alt=\"Partners4_Ensurety\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners7_Passware.png\" alt=\"Partners7_Passware\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/02\/CIP-Logo.png\" alt=\"CIP Logo\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/Red_Button_Slider.png\" alt=\"Red_Button_Slider\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/FoxTech_Partner_Logo_Banner.png\" alt=\"FoxTech_Partner_Logo_Banner\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/04\/ogo2.png\" alt=\"ogo2\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6547e07f e-con-full e-flex e-con e-parent\" data-id=\"6547e07f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6bd25561 e-con-full e-flex e-con e-child\" data-id=\"6bd25561\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-49f74253 elementor-widget elementor-widget-image\" data-id=\"49f74253\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"327\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Fat-Cats-Image-Credit-Designed-By-FreePik-1024x523.jpg\" class=\"attachment-large size-large wp-image-22821\" alt=\"Fat Cats - Image Credit Designed By FreePik\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Fat-Cats-Image-Credit-Designed-By-FreePik-1024x523.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Fat-Cats-Image-Credit-Designed-By-FreePik-300x153.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Fat-Cats-Image-Credit-Designed-By-FreePik-768x392.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Fat-Cats-Image-Credit-Designed-By-FreePik.jpg 1430w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"> Image Credit Designed By FreePik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4447363b e-con-full e-flex e-con e-child\" data-id=\"4447363b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1cca6c15 elementor-widget elementor-widget-html\" data-id=\"1cca6c15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18235adb elementor-widget elementor-widget-wp-widget-text\" data-id=\"18235adb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Helping Keep Small Business CYBERSafe<br \/>\n<\/strong>M\u00e1laga: Saturday, 21 June 2025 at 12:00 CEST<\/p>\n<p><strong>Reportage: How Cybercrime Became the Perfect Cover for Corporate Financial Fraud in 2025<br \/>\n<\/strong>By <a href=\"http:\/\/iain@iainfraser.net\" target=\"_blank\" rel=\"noopener\">Iain Fraser<\/a> with Insights from <a href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">Andy Jenkinson CIP<br \/>\n<\/a><a href=\"http:\/\/SMECyberInsights.co.uk\" target=\"_blank\" rel=\"noopener\">SMECyberInsights.co.uk<\/a> <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">&#8211;\u00a0<\/a><a href=\"https:\/\/www.google.com\/search?q=SME+Cybersecurity&amp;sca_esv=01731d022ec92237&amp;rlz=1C1FKPE_enES1123ES1124&amp;sxsrf=AHTn8zozW-9dbXRwHlu5zyHfc5aukU6yeQ%3A1747146305898&amp;ei=QVYjaILMNsyKkdUP1teCyQk&amp;ved=0ahUKEwjC8LuX06CNAxVMRaQEHdarIJkQ4dUDCBA&amp;uact=5&amp;oq=SME+Cybersecurity&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiEVNNRSBDeWJlcnNlY3VyaXR5MgoQIxiABBgnGIoFMgQQIxgnMgQQIxgnMgYQABgHGB4yCxAAGIAEGJECGIoFMggQABgHGAgYHjIIEAAYBxgIGB4yCBAAGAcYCBgeMggQABgHGAgYHjIIEAAYBxgIGB5Iwy9QAFj5JHAAeAGQAQCYAZ0BoAG2A6oBAzAuM7gBA8gBAPgBAZgCA6AC-wPCAgQQABgewgIGEAAYCBgewgIHEAAYgAQYDcICCBAAGAUYDRgemAMAkgcDMC4zoAf9GbIHAzAuM7gH-wPCBwUzLTIuMcgHPg&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">First for SME Cybersecurity<br \/>\n<\/a>Published in Collaboration with:\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">CIP<br \/>\n<\/a><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2025\/05\/20\/consumer-fraud-2025\/SMECyberInsights.co.uk\" target=\"_blank\" rel=\"noopener\">SMECyberInsights.co.uk<\/a>\u00a0&#8211; <a href=\"https:\/\/www.google.com\/search?q=SME+Cybersecurity&amp;sca_esv=01731d022ec92237&amp;rlz=1C1FKPE_enES1123ES1124&amp;sxsrf=AHTn8zozW-9dbXRwHlu5zyHfc5aukU6yeQ%3A1747146305898&amp;ei=QVYjaILMNsyKkdUP1teCyQk&amp;ved=0ahUKEwjC8LuX06CNAxVMRaQEHdarIJkQ4dUDCBA&amp;uact=5&amp;oq=SME+Cybersecurity&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiEVNNRSBDeWJlcnNlY3VyaXR5MgoQIxiABBgnGIoFMgQQIxgnMgQQIxgnMgYQABgHGB4yCxAAGIAEGJECGIoFMggQABgHGAgYHjIIEAAYBxgIGB4yCBAAGAcYCBgeMggQABgHGAgYHjIIEAAYBxgIGB5Iwy9QAFj5JHAAeAGQAQCYAZ0BoAG2A6oBAzAuM7gBA8gBAPgBAZgCA6AC-wPCAgQQABgewgIGEAAYCBgewgIHEAAYgAQYDcICCBAAGAUYDRgemAMAkgcDMC4zoAf9GbIHAzAuM7gH-wPCBwUzLTIuMcgHPg&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">First for SME Cybersecurity<br \/>\n<\/a><em>#SMECyberInsights #SMECyberSecurity #SMECyberAwareness #CyberSafe #SME #SmallBusiness #BigCyber #FatCats #Corruption\u00a0<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6df33a4f e-con-full e-flex e-con e-child\" data-id=\"6df33a4f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4464cd34 elementor-widget elementor-widget-wp-widget-text\" data-id=\"4464cd34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>What Is Corporate Cybercrime?<\/strong><\/p>\n<p><em>Industry experts reveal how &#8220;sophisticated cyber attacks&#8221; are masking insider trading, market manipulation, and billions in corporate fraud<\/em><\/p>\n<p>Corporate cybercrime cover-up refers to the strategic use of cyber security incidents to mask financial crimes including insider trading, market manipulation, and money laundering. According to cybersecurity expert Andy Jenkinson, CEO of Cybersec Innovation Partners, this practice has become increasingly sophisticated and widespread across major corporations.<\/p>\n<p><strong>Key indicators of cybercrime cover-ups include:<\/strong><\/p>\n<p>* Suspiciously timed stock trades before &#8220;unexpected&#8221; cyber incidents<br \/>\n* Basic security failures blamed on &#8220;nation-state actors&#8221;<br \/>\n* Convenient data breaches that wipe billions off company valuations<br \/>\n* Default passwords and unpatched systems in &#8220;sophisticated&#8221; attacks<br \/>\n* Regulatory agencies failing to investigate financial correlations<\/p>\n<p>Andy Jenkinson&#8217;s analysis, backed by decades of cybersecurity leadership experience, exposes how the cybersecurity narrative has been weaponized to protect corporate criminals while genuine security concerns are ignored.<\/p>\n<p><strong>How Do Companies Use Cyber Attacks to Hide Financial Crimes?<\/strong><\/p>\n<p>The forensic evidence reveals a consistent pattern across industries. Companies execute the following playbook:<\/p>\n<p><strong>1. Market Manipulation Through Strategic Breaches<\/strong> Market manipulation via strategically timed data breaches, with conveniently positioned short positions ahead of &#8220;unexpected&#8221; cyber incidents, systematically wiping billions off valuations.<\/p>\n<p><strong>2. Basic Security Failures Disguised as Sophisticated Attacks<\/strong> Organizations claiming to be victims of &#8220;sophisticated nation-state actors&#8221; frequently show fundamental security negligence: basic patches left unapplied for months, default passwords on critical systems, and security controls disabled &#8220;for operational efficiency.&#8221;<\/p>\n<p><strong>3. The Financial Correlation<\/strong> The disconnect between claimed sophistication and observed basic failures raises serious questions. Forensic analysis often reveals suspicious trading activity that preceded the incidents by days or weeks.<\/p>\n<p><strong>What Are the Warning Signs of Corporate Cybercrime Cover-Ups?<\/strong><\/p>\n<p>According to Jenkinson&#8217;s research and Cybersec Innovation Partners&#8217; analysis, executives deploy a consistent defensive playbook:<\/p>\n<p><strong>Common Warning Signs:<\/strong><\/p>\n<p>* Immediate blame on &#8220;sophisticated attackers&#8221; or &#8220;advanced persistent threats&#8221;<br \/>\n* Claims of &#8220;nation-state actors&#8221; for basic security failures<br \/>\n* Massive cybersecurity budget increases to firms that failed to prevent breaches<br \/>\n* Suspicious stock trading activity before incident disclosure<br \/>\n* Refusal to provide detailed forensic analysis<br \/>\n* Classification of evidence under &#8220;national security&#8221; concerns<\/p>\n<p><strong>The Linguistic Strategy:<\/strong> This defensive rhetoric serves multiple purposes: deflecting accountability, justifying budget increases, and creating plausible deniability for pre-incident trading activity.<\/p>\n<p>The cybersecurity industry&#8217;s own research, including work by firms like Cybersec Innovation Partners, increasingly shows that many high-profile breaches could have been prevented with basic security hygiene. Yet the &#8220;sophisticated threat actor&#8221; narrative persists, protecting both reputations and potentially criminal behavior.<\/p>\n<p><strong>Why Don&#8217;t Regulators Stop Corporate Cybercrime Cover-Ups?<\/strong><\/p>\n<p><strong>Regulatory Capture and Institutional Failure:<\/strong> The regulatory framework designed to prevent cybercrime cover-ups appears deliberately inadequate. Key problems include:<\/p>\n<p><strong>* Toothless Enforcement:<\/strong> Agencies issue fines that amount to rounding errors for trillion-dollar corporations<br \/>\n<strong>* Institutional Hypocrisy:<\/strong> Regulatory bodies fail to meet basic security standards themselves<br \/>\n<strong>* Protected Interests:<\/strong> Oversight agencies often protect institutional interests over public accountability<br \/>\n<strong>* Classification Abuse:<\/strong> Intelligence bodies hide domestic corporate criminality behind &#8220;national security&#8221; classifications<\/p>\n<p><strong>The Result:<\/strong> Every security failure can be attributed to external forces while internal bad actors operate with effective impunity.<\/p>\n<p><strong>How Do Corporate Insiders Profit from Cybercrime Cover-Ups?<\/strong><\/p>\n<p><strong>The Inside Job Epidemic:<\/strong> When external attribution is assumed by default, internal malfeasance becomes nearly undetectable. Common insider methods include:<\/p>\n<p><strong>Executive Level:<\/strong><\/p>\n<p>* C-suite executives position themselves financially before vulnerability &#8220;discoveries&#8221; go public<br \/>\n* Advance knowledge of security incidents enables strategic short-selling<br \/>\n* Stock options exercised before planned &#8220;cyber incidents&#8221;<\/p>\n<p><strong>Technical Level:<\/strong><\/p>\n<p>* IT administrators create backdoors while maintaining plausible deniability<br \/>\n* Security teams deliberately weaken controls while documenting objections for legal protection<br \/>\n* Privileged access used to facilitate external &#8220;attacks&#8221;<\/p>\n<p><strong>Systematic Failure:<\/strong> The industry&#8217;s certification and compliance frameworks provide security theatre while systematically failing to prevent deliberate internal compromise.<\/p>\n<p><strong>The Profiteering Protection Racket<\/strong><\/p>\n<p>Jenkinson&#8217;s most damning observation may be that the cybersecurity industry itself has become complicit in this system. Major vendors have financial incentives to maintain the threat landscape that justifies their existence. Consulting firms profit from both initial &#8220;security assessments&#8221; and inevitable &#8220;incident response&#8221; services when their recommendations fail.<\/p>\n<p>This creates a perfect ecosystem where:<\/p>\n<p>* Security failures generate more revenue than security successes<br \/>\n* External threats are always assumed over internal malfeasance<br \/>\n* Complexity is weaponized to obscure simple criminal activity<br \/>\n* Regulatory capture ensures minimal meaningful oversight<\/p>\n<p>The result, as firms like CIP have documented through their analysis, is that cybersecurity has become a vehicle for financial manipulation rather than protection against it.<\/p>\n<p><strong>Breaking the Cycle<\/strong><\/p>\n<p>Jenkinson&#8217;s conclusion is stark but necessary: the sector isn&#8217;t being kept honest because dishonesty benefits too many powerful interests. Until we acknowledge that cybersecurity incidents often serve as untraceable tools of financial manipulation, real security will remain elusive.<\/p>\n<p>His call for accountability includes:<\/p>\n<p>* Independent forensic analysis free from vendor influence<br \/>\n* Criminal prosecution of executives who profit from &#8220;predictable&#8221; cyber incidents<br \/>\n* Regulatory bodies with both technical competence and enforcement authority<br \/>\n* Transparency requirements that pierce the &#8220;sophisticated attacker&#8221; narrative<br \/>\n* Financial audits correlating trading activity with cybersecurity incident timelines<\/p>\n<p>The cybersecurity industry possesses the technical capability to secure our digital infrastructure. What it lacks, according to Jenkinson&#8217;s analysis, is the institutional integrity to admit when incidents represent internal corruption disguised as cyber warfare rather than sophisticated external attacks.<\/p>\n<p><strong>The Uncomfortable Truth<\/strong><\/p>\n<p>The evidence Jenkinson and organizations like Cybersec Innovation Partners present is uncomfortable but compelling. If cybersecurity has indeed become a shield for strategic profiteering rather than a defence against genuine threats, then our entire approach to digital security needs fundamental reform.<\/p>\n<p>The question isn&#8217;t whether we have sophisticated enough tools to defend against cyber threats \u2014 we do. The question is whether we have the institutional courage to use those tools to expose cybercrime when it originates from within the organizations claiming to be victims.<\/p>\n<p>Until we confront this possibility, cybercrime will continue serving as one of the most effective tools of global financial manipulation \u2014 not despite our cybersecurity industry, but potentially because of how that industry has evolved to protect institutional interests over public security.<\/p>\n<p><em>The analysis presented builds on insights from Andy Jenkinson, CEO of Cybersec Innovation Partners, and reflects broader industry observations about the intersection of cybersecurity and financial crime.<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5548ad69 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"5548ad69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Join SME Cyber! \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26b7a028 e-con-full e-flex e-con e-parent\" data-id=\"26b7a028\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4337df79 e-con-full e-flex e-con e-child\" data-id=\"4337df79\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-784b5a33 elementor-widget elementor-widget-image\" data-id=\"784b5a33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280-300x200.jpg\" class=\"attachment-medium size-medium wp-image-19834\" alt=\"CYBERInsights | Practical Small Business Cybersecurity\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/robot-7768527_1280.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-821aef1 e-con-full e-flex e-con e-child\" data-id=\"821aef1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3962f366 elementor-widget elementor-widget-html\" data-id=\"3962f366\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2819f27d elementor-widget elementor-widget-wp-widget-text\" data-id=\"2819f27d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><h4>UK Small Business Owner? Join SMECyber Free Now! &amp; Access the SME Cyber Forum &#8211; Read, Learn, Engage, Share &#8230;<\/h4>\n<p>The Latest <strong>SME<\/strong> Cybersecurity News, Threat Intelligence &amp; Analysis, Timely Scam Alerts, Best-practice Compliance, Mitigation &amp; Resources specifically curated for UK Based <strong>SMEs<\/strong> in a Single Weekly Email direct to your Inbox or Smart Device together with Unrestricted Free Access to our entire <strong>SME<\/strong> Cyber Knowledge &amp; Tutorial Library.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55c82b2b elementor-align-center elementor-widget elementor-widget-button\" data-id=\"55c82b2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2859fdf7 e-flex e-con-boxed e-con e-parent\" data-id=\"2859fdf7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2e796704 e-con-full e-flex e-con e-child\" data-id=\"2e796704\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ecd5549 elementor-widget elementor-widget-image\" data-id=\"3ecd5549\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"200\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/cybersec_innovation_partners_ltd_logo.jpg\" class=\"attachment-large size-large wp-image-12128\" alt=\"Cybersec Innovation Partners\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/cybersec_innovation_partners_ltd_logo.jpg 200w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/cybersec_innovation_partners_ltd_logo-150x150.jpg 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f92fb0 e-con-full e-flex e-con e-child\" data-id=\"4f92fb0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-590e64d4 elementor-widget elementor-widget-wp-widget-text\" data-id=\"590e64d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong><span lang=\"en-GB\">About Andy Jenkinson<\/span><\/strong><\/p>\n<p><strong><span lang=\"en-GB\">Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech &amp; Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset &amp; DNS Vulnerabilities.<\/span><\/strong><\/p>\n<p>Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years\u2019 experience as a hands-on lateral thinking CEO, coach, and leader.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10615b43 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"10615b43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">LEARN MORE \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4820353 e-flex e-con-boxed e-con e-parent\" data-id=\"4820353\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-47f49240 elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"47f49240\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-AI--768x432.jpg\" alt=\"CI_Feature AI\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Attack-Mitigation-10-768x432.jpg\" alt=\"CI_Feature Attack Mitigation (10)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Identity-Theft-4-768x432.jpg\" alt=\"CI_Feature Identity Theft (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Cloud-Security-3-768x432.jpg\" alt=\"CI_Feature Cloud Security (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Communications-2-768x432.jpg\" alt=\"CI_Feature Communications (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Cyber-Compliance-8-768x432.jpg\" alt=\"CI_Feature Cyber Compliance (8)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Cyber-Insurance-7-768x432.jpg\" alt=\"CI_Feature Cyber Insurance (7)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Copy-of-CI_Feature-Scam-Protection-1-768x432.jpg\" alt=\"Data Recovery: Protecting Business Continuity in a High-Risk Cyber Landscape \u2013 Cyber KPI\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-DDoS-4-768x432.jpg\" alt=\"CI_Feature DDoS (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Email-Security-3-768x432.jpg\" alt=\"CI_Feature Email Security (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-MSPs-6-768x432.jpg\" alt=\"CI_Feature MSPs (6)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"12 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Pen-Testing-768x432.jpg\" alt=\"CI_Feature Pen Testing\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"13 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Phishing-5-768x432.jpg\" alt=\"CI_Feature Phishing (5)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"14 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Ransomware-7-768x432.jpg\" alt=\"CI_Feature Ransomware (7)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"15 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-SaaS-4-768x432.jpg\" alt=\"CI_Feature SaaS (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"16 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Scam-Protection-3-768x432.jpg\" alt=\"CI_Feature Scam Protection (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"17 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Smart-Security-4-768x432.jpg\" alt=\"CI_Feature Smart Security (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"18 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Cyber-Training-4-768x432.jpg\" alt=\"CI_Feature Cyber Training (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"19 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-The-VPN-3-768x432.jpg\" alt=\"CI_Feature The VPN (3)\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit Designed By FreePik Join SME Cyber! \/&#8230; Image Credit: IfOnlyCommunications Learn More \/&#8230;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":22821,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[594],"tags":[595],"ppma_author":[505],"class_list":["post-22819","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-reportage","tag-reportage"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Fat-Cats-Image-Credit-Designed-By-FreePik.jpg",1430,730,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Fat-Cats-Image-Credit-Designed-By-FreePik-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Fat-Cats-Image-Credit-Designed-By-FreePik-300x153.jpg",300,153,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Fat-Cats-Image-Credit-Designed-By-FreePik-768x392.jpg",640,327,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Fat-Cats-Image-Credit-Designed-By-FreePik-1024x523.jpg",640,327,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Fat-Cats-Image-Credit-Designed-By-FreePik.jpg",1430,730,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Fat-Cats-Image-Credit-Designed-By-FreePik.jpg",1430,730,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Fat-Cats-Image-Credit-Designed-By-FreePik-1024x523.jpg",1024,523,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/06\/Fat-Cats-Image-Credit-Designed-By-FreePik-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/reportage\/\" rel=\"category tag\">REPORTAGE<\/a>","tag_info":"REPORTAGE","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/22819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=22819"}],"version-history":[{"count":4,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/22819\/revisions"}],"predecessor-version":[{"id":22824,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/22819\/revisions\/22824"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/22821"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=22819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=22819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=22819"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=22819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}