{"id":26744,"date":"2026-02-27T07:00:06","date_gmt":"2026-02-27T06:00:06","guid":{"rendered":"https:\/\/smecyberinsights.co.uk\/?p=26744"},"modified":"2026-03-02T10:46:46","modified_gmt":"2026-03-02T09:46:46","slug":"digital-tranformation-in-uk-2026","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/02\/27\/digital-tranformation-in-uk-2026\/","title":{"rendered":"Digital Transformation in the UK in 2026: How SMEs Can Modernise Fast Without Increasing Cyber Risk"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26744\" class=\"elementor elementor-26744\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-41df3ff5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"41df3ff5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b5f28d\" data-id=\"1b5f28d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5ba780c elementor-widget elementor-widget-image\" data-id=\"5ba780c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/elementor\/thumbs\/7774_Securus_Working_Auto_Banner-rf8bryc4djy6c75t28muqkdhh8m8odty7fzxues2rs.png\" title=\"+7774_Securus_Working_Auto_Banner\" alt=\"SECURUS Communications\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-110ff47a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"110ff47a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-1f2aa581\" data-id=\"1f2aa581\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5ba03b20 elementor-widget elementor-widget-image\" data-id=\"5ba03b20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/rawpixel.com\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-300x200.jpg\" class=\"attachment-medium size-medium wp-image-26745\" alt=\"Digital Transformation in the UK in 2026: How SMEs Can Modernise Fast Without Increasing Cyber Risk\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-1536x1024.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: RawPixel via FreePik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-6a0a4e4b\" data-id=\"6a0a4e4b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ad8db88 elementor-widget elementor-widget-wp-widget-text\" data-id=\"4ad8db88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar:\u00a0 Friday, 27 February 2026 \u2013 07:00 CET<\/p>\n<p><strong>Digital Transformation in the UK in 2026: How SMEs Can Modernise Fast Without Increasing Cyber Risk<br \/>\n<\/strong>By: <a href=\"https:\/\/www.linkedin.com\/in\/iainfraserjournalist\/\" target=\"_blank\" rel=\"noopener\">Iain Fraser<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+journalist&amp;client=firefox-b-d&amp;sca_esv=604417a22f933246&amp;biw=1920&amp;bih=937&amp;sxsrf=ADLYWII9GQo-CShq2VQjmub9bZo3edd4sw%3A1732797372997&amp;ei=vGNIZ_W2PLGgkdUP2Z6JsQc&amp;ved=0ahUKEwj1hIqfhf-JAxUxUKQEHVlPInY4ChDh1QMIDw&amp;uact=5&amp;oq=sme+cybersecurity+journalist&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiHHNtZSBjeWJlcnNlY3VyaXR5IGpvdXJuYWxpc3QyBBAjGCcyCBAAGIAEGKIEMggQABiABBiiBDIIEAAYgAQYogRI4g5QgQhY1AtwAXgBkAEAmAGwAaAB8QSqAQMwLjS4AQPIAQD4AQGYAgOgAtYCwgIHECMYsAMYJ8ICChAAGLADGNYEGEfCAgcQIxiwAhgnmAMAiAYBkAYKkgcDMS4yoAekHQ&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Cybersecurity Journalist<br \/>\n<\/a>Published in Collaboration with <a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">SECURUS Communications<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=Digital+Transformation+in+the+UK+in+2026%3A+How+SMEs+Can+Modernise+Fast+Without+Increasing+Cyber+Risk&amp;rlz=1C1AJCO_enES1193ES1194&amp;oq=Digital+Transformation+in+the+UK+in+2026%3A+How+SMEs+Can+Modernise+Fast+Without+Increasing+Cyber+Risk&amp;gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIGCAEQRRg8MgYIAhBFGDzSAQkyMTY1ajBqMTWoAgiwAgHxBXpq2Ovw89UI&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Google Indexed on: 270226 at 08:55 CET<\/a><br \/>\n<a href=\"https:\/\/SMECyberInsights.co.uk\" target=\"_blank\" rel=\"noopener\">SMECyberInsights.co.uk<\/a> | <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;rlz=1C1FKPE_enES1123ES1124&amp;oq=&amp;gs_lcrp=EgZjaHJvbWUqCQgAECMYJxjqAjIJCAAQIxgnGOoCMg8IARAjGCcY6gIYgAQYigUyCQgCECMYJxjqAjIJCAMQIxgnGOoCMg8IBBAuGCcYrwEYxwEY6gIyCQgFECMYJxjqAjIJCAYQIxgnGOoCMg8IBxAjGCcY6gIYgAQYigXSAQkyMTI2ajBqMTWoAgiwAgHxBS3gPpZWnp6m&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">First for SME Cybersecurity News<br \/>\n<\/a><em>#SMECyberInsights #SMECybersecurity #SMECyberInsights #SME #CyberSafe #CyberSecurity #Phishing #Ransomware #CloudSecurity #SupplyChainSecurity #RiskManagement<\/em><\/p>\n<p><span data-mce-type=\"bookmark\" style=\"width: 0px;overflow: hidden;line-height: 0\" class=\"mce_SELRES_start\">\ufeff<\/span><span data-mce-type=\"bookmark\" style=\"width: 0px;overflow: hidden;line-height: 0\" class=\"mce_SELRES_start\">\ufeff<\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-364ea705 elementor-widget elementor-widget-wp-widget-text\" data-id=\"364ea705\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Digital Transformation in the UK in 2026: How SMEs Can Modernise Fast Without Increasing Cyber Risk<\/strong><\/p>\n<p>Digital transformation is no longer a \u201cbig enterprise\u201d story. In 2026, UK SMEs are modernising operations through cloud platforms, outsourced IT, automation, and data-led decision making. That shift improves speed and service; however, it also changes your attack surface, which is the total number of ways criminals can access your systems.<\/p>\n<p>This is why sme cybersecurity belongs in the transformation plan, not bolted on afterwards. If you digitise customer journeys, payments, remote working, and supplier access, you also digitise the risks.<\/p>\n<p><strong>Why this matters now for UK SMEs<\/strong><\/p>\n<p>Two forces are colliding. First, UK small business cyber threats are growing, especially credential theft, phishing, and ransomware. Second, SMEs are adopting more connected tools, from Microsoft 365 and CRM systems to online booking, e-commerce, and finance automation. As a result, one compromised account can ripple across email, file storage, invoicing, and customer data.<\/p>\n<p><strong><em>Modernising systems increases connectivity, integrations, and admin access. That is why sme cybersecurity must be part of transformation planning. Prioritise MFA, named accounts, least privilege, tested backups, and supplier controls. These steps reduce UK small business cyber threats like phishing, account takeover, and ransomware, without heavy spend.<\/em><\/strong><\/p>\n<p>Professional advisers are increasingly pulled into this too. Accountants and lawyers handle sensitive documents and deadlines; vCISOs and IT partners are expected to evidence controls and support incident response. Meanwhile, UK GDPR security measures still apply when personal data is processed, even if you outsource the technology.<\/p>\n<p><strong>Core terms and what they mean in plain English<\/strong><\/p>\n<p>Digital transformation means improving how you operate using technology, data, and process redesign. It is not just \u201cmoving to the cloud\u201d.<\/p>\n<p><strong>* Cloud services:<\/strong>\u00a0software and storage accessed over the internet, such as Microsoft 365; the supplier manages infrastructure, you still manage access and configuration.<\/p>\n<p><strong>* Attack surface:<\/strong>\u00a0all the entry points into your business systems, including supplier portals and admin accounts.<\/p>\n<p><strong>* Zero trust:<\/strong>\u00a0a security approach that assumes no user or device should be trusted automatically; access is verified each time based on identity and risk.<\/p>\n<p><strong>* Ransomware:<\/strong>\u00a0malicious software that encrypts files and demands payment; prevention relies heavily on access control, patching, and backups.<\/p>\n<p>These definitions matter because many transformation programmes increase access and integrations. If access control is weak, your new efficiency becomes an attacker\u2019s shortcut.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-777197 elementor-widget elementor-widget-image\" data-id=\"777197\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"2048\" height=\"1365\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-2048x1365.jpg\" class=\"attachment-2048x2048 size-2048x2048 wp-image-26745\" alt=\"Digital Transformation in the UK in 2026: How SMEs Can Modernise Fast Without Increasing Cyber Risk\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-2048x1365.jpg 2048w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-1536x1024.jpg 1536w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73ae1573 elementor-widget elementor-widget-wp-widget-text\" data-id=\"73ae1573\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Practical guidance that fits SME constraints<\/strong><\/p>\n<p>Start with controls that reduce risk quickly and support Cyber Essentials outcomes.<\/p>\n<p><strong>High-impact steps to implement this quarter<\/strong><\/p>\n<p><strong>* Map your critical services:<\/strong>\u00a0email, finance, customer database, website, and remote access; identify who has admin rights.<\/p>\n<p><strong>* Turn on MFA (multi-factor authentication):<\/strong>\u00a0for email, cloud admin, finance, payroll, and supplier portals. MFA is a second check that makes stolen passwords far less useful.<\/p>\n<p><strong>* Fix shared accounts:<\/strong>\u00a0replace shared logins with named accounts; remove ex-staff access within 24 hours.<\/p>\n<p><strong>* Harden your suppliers:<\/strong>\u00a0require Cyber Essentials where practical; at minimum, require MFA, named accounts, and breach notification terms in contracts.<\/p>\n<p><strong>* Backups you can restore:<\/strong>\u00a0test restores monthly; keep one offline or immutable copy for ransomware prevention.<\/p>\n<p><strong>* Logging and alerts:<\/strong>\u00a0enable alerts for suspicious sign-ins, mailbox forwarding rules, and new admin creation.<\/p>\n<p><strong>A realistic SME scenario<\/strong><\/p>\n<p>A growing UK services firm implements a new CRM and links it to email and invoicing. An attacker phishes one user, creates an email forwarding rule, then uses the CRM data to craft believable payment-change requests. The technology \u201cworks\u201d; the controls around identity and approvals fail.<\/p>\n<p><strong>Evidence and authority you can rely on<\/strong><\/p>\n<p>The NCSC\u2019s SME guidance focuses on basics that still stop most attacks: secure configuration, access control, patching, and backups. Cyber Essentials and Cyber Essentials Plus provide a practical baseline many UK supply chains now expect. For compliance for SMEs, the ICO\u2019s UK GDPR guidance is clear in principle: you must implement appropriate technical and organisational measures, including controlling access to personal data and being able to detect and respond to incidents.<\/p>\n<p><strong>Quick checklist for owners and advisers<\/strong><\/p>\n<p>* MFA enabled for email, finance, payroll, cloud admin, CRM<br \/>\n* Named accounts only; admin rights minimised<br \/>\n* Backup restores tested; offline or immutable copy in place<br \/>\n* Supplier access reviewed; contracts include security expectations<br \/>\n* Alerting enabled for risky sign-ins and forwarding rules<br \/>\n* Incident response contacts agreed, including IT, insurer, legal<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c9b93ec elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c9b93ec\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-14f9494f\" data-id=\"14f9494f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-119fbb32 elementor-widget elementor-widget-image\" data-id=\"119fbb32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"251\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/11\/Securus_Working_300x250-300x251.png\" class=\"attachment-medium size-medium wp-image-25726\" alt=\"SECURUS Communications\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/11\/Securus_Working_300x250-300x251.png 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/11\/Securus_Working_300x250.png 527w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-207f9ccf\" data-id=\"207f9ccf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2b36e108 elementor-widget elementor-widget-wp-widget-text\" data-id=\"2b36e108\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>SECURUS Communications Ltd<\/strong><\/p>\n<p><strong><a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">Securus<\/a> <\/strong>is a managed communications Operator, providing next-generation network infrastructure and value added services to Managed Hosting providers and the &#8216;cloud generation&#8217;\u200b of enterprises. <strong><a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">Securus<\/a> <\/strong>priority is to offer communication services that represent excellent value for money and are backed by exceptional levels of support.<\/p>\n<p><strong>Contact Securus<\/strong><br \/>\nSecurus Communications Ltd<br \/>\nStation Road, Landmark house, Hook, England RG27 9HA, GB<br \/>\nT: Enquiries:\u00a0<a id=\"ember907\" class=\"link-without-visited-state ember-view\" href=\"tel:03451 283457\" target=\"_blank\" rel=\"noopener noreferrer\" data-artdeco-is-focused=\"true\"><span class=\"link-without-visited-state\" dir=\"ltr\" aria-hidden=\"true\">03451 283457<\/span><\/a>\u00a0| Service Desk: <a href=\"tel:03451 283458\">03451 283458<\/a><br \/>\nSecurus on <a href=\"https:\/\/www.linkedin.com\/company\/securus-communications-ltd\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a> | Securus on <a href=\"https:\/\/x.com\/SecurusComms\">&#8220;X&#8221;<\/a> | <a href=\"https:\/\/www.securuscomms.com\" target=\"_blank\" rel=\"noopener\">https:\/\/securuscomms.com<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-12500f5e e-flex e-con-boxed e-con e-parent\" data-id=\"12500f5e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-24ea1fc7 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elespare-section-title-elespare-left elementor-widget elementor-widget-post-grid\" data-id=\"24ea1fc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;columns&quot;:&quot;3&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;}\" data-widget_type=\"post-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elespare-widget-title-section title-style-2 elespare-left\">\n\t\t\t\t<h2 class=\"elespare-widget-title\">\n\t\t\t\t\t<span class=\"elespare-section-title-before\"><\/span>\n\t\t\t\t\t<span class=\"elespare-section-title\">Latest  Posts from SECURUS Communications<\/span>\n\t\t\t\t\t<span class=\"elespare-section-title-after\"><\/span>\n\t\t\t\t<\/h2>\n\t\t\t<\/div>    <div class=\"elespare-grid-wrap grid-layout has-background  elespare-has-equal-height\">\n\n      <div class=\"elespare-posts-wrap  elementor-grid grid-style-1  elespare-image-zoom elespare-light \">\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/21\/ai-powered-fraud-in-2026\/\" aria-label=\"AI-Powered Fraud Is Rising: What Ping\u2019s Keyless Deal Signals for UK SME Login Security\u00a0\">\n        <img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"AI-Powered Fraud Is Rising: What Ping\u2019s Keyless Deal Signals for UK SME Login Security\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/ai\/\" aria-label=\"View all posts in AI category\">\n                      \n                        AI\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/21\/ai-powered-fraud-in-2026\/\"> <span>AI-Powered Fraud Is Rising: What Ping\u2019s Keyless Deal Signals for UK SME Login Security\u00a0<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 21, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/15\/ai-aids-compliance\/\" aria-label=\"AI &amp; Compliance for UK SMEs (2025): Cut GDPR Risk, Speed Audits &amp; Win Customer Trust\u00a0\">\n        <img loading=\"lazy\" width=\"300\" height=\"210\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed-300x210.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"AI &amp; Compliance for UK SMEs (2025): Cut GDPR Risk, Speed Audits &amp; Win Customer Trust\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed-300x210.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed-1024x717.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed-768x538.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed.jpg 1291w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/compliance\/\" aria-label=\"View all posts in COMPLIANCE category\">\n                      \n                        COMPLIANCE\n                      <\/a>\n                  <\/li><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" aria-label=\"View all posts in SMECYBERIINSIGHTS category\">\n                      \n                        SMECYBERIINSIGHTS\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/15\/ai-aids-compliance\/\"> <span>AI &amp; Compliance for UK SMEs (2025): Cut GDPR Risk, Speed Audits &amp; Win Customer Trust\u00a0<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 15, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/12\/sme-cyber-threats-rise\/\" aria-label=\"AI Cyber Threats Surge for UK SMEs: Inside the New Safety Platform, Stark Stats and Defence Steps\u00a0\">\n        <img loading=\"lazy\" width=\"300\" height=\"204\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-300x204.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"AI Cyber Threats Surge for UK SMEs: Inside the New Safety Platform, Stark Stats and Defence Steps\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-300x204.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-1024x695.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-768x521.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-1536x1043.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-2048x1390.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" aria-label=\"View all posts in SME CYBER\/THREAT INTEL category\">\n                      \n                        SME CYBER\/THREAT INTEL\n                      <\/a>\n                  <\/li><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" aria-label=\"View all posts in SMECYBERIINSIGHTS category\">\n                      \n                        SMECYBERIINSIGHTS\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/12\/sme-cyber-threats-rise\/\"> <span>AI Cyber Threats Surge for UK SMEs: Inside the New Safety Platform, Stark Stats and Defence Steps\u00a0<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 12, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/09\/sme-cyber-threats-2026\/\" aria-label=\"UK SME Cyber Threats 2026: The Straight-Talking Guide to Phishing, Ransomware &amp; Fraud\u00a0\">\n        <img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/css-collage-concept-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"UK SME Cyber Threats 2026: The Straight-Talking Guide to Phishing, Ransomware &amp; Fraud\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/css-collage-concept-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/css-collage-concept-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/css-collage-concept-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/css-collage-concept.jpg 1252w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" aria-label=\"View all posts in SME CYBER\/THREAT INTEL category\">\n                      \n                        SME CYBER\/THREAT INTEL\n                      <\/a>\n                  <\/li><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" aria-label=\"View all posts in SMECYBERIINSIGHTS category\">\n                      \n                        SMECYBERIINSIGHTS\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/09\/sme-cyber-threats-2026\/\"> <span>UK SME Cyber Threats 2026: The Straight-Talking Guide to Phishing, Ransomware &amp; Fraud\u00a0<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 9, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/06\/lastpass-heavily-fined-by-ico\/\" aria-label=\"Password Manager Fined After Major Data Breach: What UK SMEs Must Learn from the LastPass Case\">\n        <img loading=\"lazy\" width=\"300\" height=\"194\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/subscribe-3534409_1280-300x194.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Password Manager Fined After Major Data Breach: What UK SMEs Must Learn from the LastPass Case\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/subscribe-3534409_1280-300x194.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/subscribe-3534409_1280-1024x661.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/subscribe-3534409_1280-768x496.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/subscribe-3534409_1280.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/data-protection\/\" aria-label=\"View all posts in DATA PROTECTION category\">\n                      \n                        DATA PROTECTION\n                      <\/a>\n                  <\/li><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/managed-security\/\" aria-label=\"View all posts in MANAGED SECURITY category\">\n                      \n                        MANAGED SECURITY\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/06\/lastpass-heavily-fined-by-ico\/\"> <span>Password Manager Fined After Major Data Breach: What UK SMEs Must Learn from the LastPass Case<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 6, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2025\/12\/19\/fake-booking-scam\/\" aria-label=\"Malwarebytes Warns Seasonal Travellers of RAT Infection from Fake Booking.com Scam Sites\">\n        <img loading=\"lazy\" width=\"300\" height=\"170\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/rat-walking-sewage_compressed-300x170.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Malwarebytes Warns Seasonal Travellers of RAT Infection from Fake Booking.com Scam Sites\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/rat-walking-sewage_compressed-300x170.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/rat-walking-sewage_compressed-1024x580.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/rat-walking-sewage_compressed-768x435.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/rat-walking-sewage_compressed-1536x870.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/rat-walking-sewage_compressed-2048x1161.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/managed-security\/\" aria-label=\"View all posts in MANAGED SECURITY category\">\n                      \n                        MANAGED SECURITY\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2025\/12\/19\/fake-booking-scam\/\"> <span>Malwarebytes Warns Seasonal Travellers of RAT Infection from Fake Booking.com Scam Sites<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2025\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              December 19, 2025\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n              <\/div>\n    <\/div>\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: RawPixel via FreePik Latest Posts from SECURUS Communications AI AI-Powered Fraud Is Rising:&#8230;<\/p>\n","protected":false},"author":1,"featured_media":26745,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[835],"tags":[836],"ppma_author":[505],"class_list":["post-26744","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-transformation","tag-digital-transformation"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-scaled.jpg",2560,1706,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-300x200.jpg",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-768x512.jpg",640,427,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-1024x683.jpg",640,427,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-1536x1024.jpg",1536,1024,true],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-2048x1365.jpg",2048,1365,true],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-1024x683.jpg",1024,683,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/futuristic-smart-city-with-5g-global-network-technology_compressed-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/digital-transformation\/\" rel=\"category tag\">DIGITAL TRANSFORMATION<\/a>","tag_info":"DIGITAL TRANSFORMATION","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/26744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=26744"}],"version-history":[{"count":7,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/26744\/revisions"}],"predecessor-version":[{"id":26844,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/26744\/revisions\/26844"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/26745"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=26744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=26744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=26744"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=26744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}