{"id":2462,"date":"2024-01-30T09:32:17","date_gmt":"2024-01-30T09:32:17","guid":{"rendered":"https:\/\/cyberinsights.argusgpi.com\/?p=2462"},"modified":"2024-03-14T13:05:06","modified_gmt":"2024-03-14T12:05:06","slug":"daily-cyber-insights-for-300124","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/01\/30\/daily-cyber-insights-for-300124\/","title":{"rendered":"DAILY CYBER INSIGHTS: The Latest SME Cybersecurity\u00a0News &#038; Intel for Tuesday, 30 January 2024"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2462\" class=\"elementor elementor-2462\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d90c96a e-flex e-con-boxed e-con e-parent\" data-id=\"5d90c96a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-14739b26 elementor-widget elementor-widget-html\" data-id=\"14739b26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-5781064184570704\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- CYBERInsights_Leaderboard_2024 -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-5781064184570704\"\r\n     data-ad-slot=\"3112489701\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ab4d957 e-flex e-con-boxed e-con e-parent\" data-id=\"ab4d957\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3d3dc8a3 e-con-full e-flex e-con e-child\" data-id=\"3d3dc8a3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d611d28 elementor-widget elementor-widget-image\" data-id=\"3d611d28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"169\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/01\/network-2402637_1280-300x169.jpg\" class=\"attachment-medium size-medium wp-image-2465\" alt=\"Daily Cyber Insights, SME Cybersecurity, Cybersecurity Journalist\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/01\/network-2402637_1280-300x169.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/01\/network-2402637_1280-1024x576.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/01\/network-2402637_1280-768x432.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/01\/network-2402637_1280.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c4b283 e-con-full e-flex e-con e-child\" data-id=\"5c4b283\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-29abcf66 elementor-widget elementor-widget-wp-widget-text\" data-id=\"29abcf66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Tuesday, 30 January 2024<\/p>\n<p><strong>DAILY CYBER INSIGHTS: The Latest SME Cybersecurity\u00a0 News &amp; Analysis for Tuesday, 30 January 2024<\/strong><br \/>\nWritten &amp; Curated By\u00a0<a href=\"https:\/\/www.google.com\/search?q=cybersecurity+journalist&amp;oq=Cybersec&amp;gs_lcrp=EgZjaHJvbWUqCQgAEEUYOxiABDIJCAAQRRg7GIAEMgYIARBFGDsyBwgCEAAYgAQyBggDEEUYQDIGCAQQRRg5MgcIBRAAGIAEMgcIBhAAGIAEMgcIBxAAGIAE0gEJMzc1MmowajE1qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser \u2013 SME Cybersecurity Journalist<\/a><br \/>\n<a href=\"https:\/\/www.iainfraser.net\/\" target=\"_blank\" rel=\"noopener\">IainFRASER.net\/CYBERInsights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=daily+cyber+insights&amp;oq=daily+cyber&amp;gs_lcrp=EgZjaHJvbWUqCAgCEEUYJxg7MgkIABBFGDkYgAQyBggBEEUYOzIICAIQRRgnGDsyBggDECMYJzIMCAQQABgUGIcCGIAEMgwIBRAAGBQYhwIYgAQyBwgGEAAYgAQyBwgHEAAYgAQyBwgIEAAYgAQyBwgJEAAYgATSAQk2NjUxajBqMTWoAgCwAgA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Daily Cyber Insights<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-74da05fb e-flex e-con-boxed e-con e-parent\" data-id=\"74da05fb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-434a4514 elementor-widget elementor-widget-wp-widget-text\" data-id=\"434a4514\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Good Morning from Gibraltar \u2013 Today\u00b4s CYBERInsights including:<\/strong> Latest Cyber Threat Intel, My 2024 Top 10<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-a-vpn\/\" target=\"_blank\" rel=\"noopener\"><strong> VPN<\/strong><\/a> providers, Strengthening authentication, <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-a-ddos-attack\/\" target=\"_blank\" rel=\"noopener\"><strong>DDoS<\/strong><\/a> How would your<strong> SME<\/strong> fare? &amp; deploying Clickshare. <em>#CYBERInsights #CYBERVoice #CyberJourno #CybersecurityJournalist #SMECybersecurityJournalist #SMECybersecurity\u00a0 \u00a0<\/em><strong>Learn More \u2013\u00a0<\/strong><a href=\"https:\/\/follow.it\/cybersecurity-journalist-iain-fraser-cybersecurity-journalist-and-commentator\" target=\"_blank\" rel=\"noopener\">Register Free to receive Today\u00b4s Full Stories, Intelligence &amp; Risk Analysis sent direct to your inbox or Smart device.<\/a><\/p>\n<p><strong>1. CYBER THREAT INTEL: CISCO &#8211;<\/strong> Learn which Cybersecurity threats you\u2019re most at risk for in new <strong>DNS<\/strong> threat trend report.<\/p>\n<p><strong>2. <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-a-vpn\/\" target=\"_blank\" rel=\"noopener\">VPN<\/a>: My Top 5 VPN<\/strong> (Virtual Private Network) Providers 2024 &#8211; Does your SME need one? <strong>Also Read:<\/strong> <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-a-vpn\/\" target=\"_blank\" rel=\"noopener\">What is a VPN<\/a>?<\/p>\n<p><strong>3. BEST PRACTICE:<\/strong> Best practices to strengthen authentication and prevent <strong>MFA<\/strong> bypass attacks.<\/p>\n<p><strong>4. <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-a-ddos-attack\/\" target=\"_blank\" rel=\"noopener\">DDoS<\/a> ATTACKS:<\/strong> Are your<strong> SME\u00b4s<\/strong> Cybersecurity protocols sufficient to withstand a sustained <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-a-ddos-attack\/\" target=\"_blank\" rel=\"noopener\"><strong>DDoS<\/strong><\/a> (Distributed Denial of Service)<\/p>\n<p><strong>5. CLICKSHARE:<\/strong> The complete guide to deploying Barco\u00b4s ClickShare in your enterprise &#8211; Everything you need to know<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-71a138f e-flex e-con-boxed e-con e-parent\" data-id=\"71a138f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d8d7fc3 elementor-widget elementor-widget-image\" data-id=\"4d8d7fc3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/clk.tradedoubler.com\/click?p=346903&#038;a=3090733\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"970\" height=\"250\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/01\/970-X-250-Product-3.png\" class=\"attachment-1536x1536 size-1536x1536 wp-image-2397\" alt=\"970-X-250-Product-3\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/01\/970-X-250-Product-3.png 970w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/01\/970-X-250-Product-3-300x77.png 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/01\/970-X-250-Product-3-768x198.png 768w\" sizes=\"auto, (max-width: 970px) 100vw, 970px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-41e85941 e-flex e-con-boxed e-con e-parent\" data-id=\"41e85941\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-706d1aa elementor-widget elementor-widget-wp-widget-text\" data-id=\"706d1aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>CYBER VOICE\/PR WIRE<\/strong><\/p>\n<p><strong>GARTNER: Roll out the AI Opportunity Radar to your executive team.\u00a0\u00a0<a href=\"https:\/\/www.gartner.com\/en\/information-technology\/insights\/it-symposium-keynote?utm_campaign=RM_GB_2024_ITAI_C_BB3_SYMTAKEAWAYSAI_RS&amp;utm_medium=email&amp;utm_source=Eloqua&amp;cm_mmc=Eloqua-_-Email-_-LM_RM_GB_2024_ITAI_C_BB3_SYMTAKEAWAYSAI_RS-_-0000\" target=\"_blank\" rel=\"noopener\">Learn More \/\u2026<\/a><\/strong><\/p>\n<p><strong>VEEAM:<\/strong> Cybersecurity Best Practices and Hybrid Cloud Resilience. <strong><a href=\"https:\/\/go.veeam.com\/wp-cyber-resilient-data-recovery-strategy?st=drip&amp;utm_source=drip&amp;utm_medium=email&amp;utm_campaign=pln_coreprod&amp;ccode=pln_coreprod&amp;mkt_tok=ODcwLUxCRy0zMTIAAAGQv-zTxO0iIgjbzzOfUcympJDeB8x1qzL00WKKGi9els_NcnZcFOcB3Xawvo3c5zxPbYiei7Dwl1KisM3btM1TNqEUGDsOQGywOwouyuxMWUKMVvUSz1kj\" target=\"_blank\" rel=\"noopener\">Learn More \/&#8230;<\/a><\/strong><\/p>\n<p><strong>SME RESOURCES:<\/strong> Why Choose Datadog? Full-Stack Observability. <a href=\"https:\/\/www.datadoghq.com\/dg\/monitor\/personalized-demo-request\/?utm_source=Nurture&amp;utm_medium=Nurture&amp;utm_campaign=Nurture-202305NewContentDownloads3d_ab&amp;mkt_tok=ODc1LVVWWS02ODUAAAGQ0U2SyBsbJU8A6GvvW9BOMiJLhYbS2tifEPJgWqzsFYWM8N0r11HCntSYKb3IAEDuqWpYW22nWKtEumbrJ-8gZA-0g3u2BVXd5gKG6DjByAQ2jefTZM-5o4fu0A\" target=\"_blank\" rel=\"noopener\"><strong>Learn More \/&#8230;<\/strong><\/a><\/p>\n<p><strong>SPLUNK:<\/strong> Learn best practices for practical observability in this must-read report. <a href=\"https:\/\/www.splunk.com\/en_us\/form\/a-cios-guide-to-observability.html?fbclid=IwAR2p2iMbfxcyQ7spXmbpSBeJe6g8I46TTCxu9udSeJsxOjAe2wjqhP_mrKo\" target=\"_blank\" rel=\"noopener\"><strong>Learn More \/&#8230;<\/strong><\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[14],"tags":[419],"ppma_author":[415],"class_list":["post-2462","post","type-post","status-publish","format-standard","hentry","category-cyberinsights","tag-cyberinsights"],"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":"","covernews-featured":"","covernews-medium":""},"author_info":{"display_name":"Cybersecurity Journalist - Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" rel=\"category tag\">SMECYBERIINSIGHTS<\/a>","tag_info":"SMECYBERIINSIGHTS","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/2462","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=2462"}],"version-history":[{"count":0,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/2462\/revisions"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=2462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=2462"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=2462"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=2462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}