{"id":27005,"date":"2026-03-19T07:00:36","date_gmt":"2026-03-19T06:00:36","guid":{"rendered":"https:\/\/smecyberinsights.co.uk\/?p=27005"},"modified":"2026-03-31T12:37:53","modified_gmt":"2026-03-31T10:37:53","slug":"authentication-perception-v-reality","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/03\/19\/authentication-perception-v-reality\/","title":{"rendered":"Perception vs Reality in Authentication: What UK SMEs Must Fix Now"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27005\" class=\"elementor elementor-27005\">\n\t\t\t\t<div class=\"elementor-element elementor-element-19e0fcd8 e-flex e-con-boxed e-con e-parent\" data-id=\"19e0fcd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1eaca7 elementor-widget__width-initial elementor-widget elementor-widget-image-carousel\" data-id=\"1eaca7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;slides_to_show&quot;:&quot;6&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"CYBERPartners\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 8\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners1_NordVPN.png\" alt=\"Partners1_NordVPN\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 8\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners3_R3.png\" alt=\"Partners3_R3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 8\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners2_Zoho.png\" alt=\"Partners2_Zoho\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 8\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Plesk.png\" alt=\"Partners4_Plesk\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 8\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners7_Passware.png\" alt=\"Partners7_Passware\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 8\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/Red_Button_Slider.png\" alt=\"Red_Button_Slider\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 8\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/04\/ogo2.png\" alt=\"ogo2\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 8\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/Securus_Working_300x250-e1765538235404.png\" alt=\"Detection. Connection. Protection: Why Securus Belongs at the Core of Every Modern SME Security Strategy\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7774bbb2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7774bbb2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3bf04283\" data-id=\"3bf04283\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4dc718ab elementor-widget elementor-widget-image\" data-id=\"4dc718ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/elementor\/thumbs\/7774_Securus_Working_Auto_Banner-rf8bryc4djy6c75t28muqkdhh8m8odty7fzxues2rs.png\" title=\"+7774_Securus_Working_Auto_Banner\" alt=\"SECURUS Communications\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4977b4b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4977b4b8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-cae82b4\" data-id=\"cae82b4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3aee759a elementor-widget elementor-widget-image\" data-id=\"3aee759a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.freepik.com\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-300x200.jpg\" class=\"attachment-medium size-medium wp-image-27006\" alt=\"Perception vs Reality in Authentication: What UK SMEs Must Fix Now - Analysis of Yubico\u2019s 2025 authentication report.\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-1536x1024.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-77cf6944\" data-id=\"77cf6944\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-675c3244 elementor-widget elementor-widget-wp-widget-text\" data-id=\"675c3244\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar:\u00a0 Thursday, 19 March 2026 \u2013 07:00 CET<\/p>\n<p><strong>Perception vs Reality in Authentication: What UK SMEs Must Fix Now &#8211; Analysis of Yubico\u2019s 2025 authentication report.<br \/>\n<\/strong>By: <a href=\"https:\/\/www.linkedin.com\/in\/iainfraserjournalist\/\" target=\"_blank\" rel=\"noopener\">Iain Fraser<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+journalist&amp;client=firefox-b-d&amp;sca_esv=604417a22f933246&amp;biw=1920&amp;bih=937&amp;sxsrf=ADLYWII9GQo-CShq2VQjmub9bZo3edd4sw%3A1732797372997&amp;ei=vGNIZ_W2PLGgkdUP2Z6JsQc&amp;ved=0ahUKEwj1hIqfhf-JAxUxUKQEHVlPInY4ChDh1QMIDw&amp;uact=5&amp;oq=sme+cybersecurity+journalist&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiHHNtZSBjeWJlcnNlY3VyaXR5IGpvdXJuYWxpc3QyBBAjGCcyCBAAGIAEGKIEMggQABiABBiiBDIIEAAYgAQYogRI4g5QgQhY1AtwAXgBkAEAmAGwAaAB8QSqAQMwLjS4AQPIAQD4AQGYAgOgAtYCwgIHECMYsAMYJ8ICChAAGLADGNYEGEfCAgcQIxiwAhgnmAMAiAYBkAYKkgcDMS4yoAekHQ&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Cybersecurity Journalist<br \/>\n<\/a>Published in Collaboration with <a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">SECURUS Communications<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=Perception+vs+Reality+in+Authentication%3A+What+UK+SMEs+Must+Fix+Now+%E2%80%93+Analysis+of+Yubico%E2%80%99s+2025+authentication+report.&amp;rlz=1C1AJCO_enES1193ES1194&amp;oq=Perception+vs+Reality+in+Authentication%3A+What+UK+SMEs+Must+Fix+Now+%E2%80%93+Analysis+of+Yubico%E2%80%99s+2025+authentication+report.&amp;gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIGCAEQRRg80gEJMjI4NmowajE1qAIIsAIB8QWW8xS94_rvhPEFlvMUveP674Q&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Google Indexed on: 190326 at 09:56 CET<\/a><br \/>\n<a href=\"https:\/\/SMECyberInsights.co.uk\" target=\"_blank\" rel=\"noopener\">SMECyberInsights.co.uk<\/a> | <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;rlz=1C1FKPE_enES1123ES1124&amp;oq=&amp;gs_lcrp=EgZjaHJvbWUqCQgAECMYJxjqAjIJCAAQIxgnGOoCMg8IARAjGCcY6gIYgAQYigUyCQgCECMYJxjqAjIJCAMQIxgnGOoCMg8IBBAuGCcYrwEYxwEY6gIyCQgFECMYJxjqAjIJCAYQIxgnGOoCMg8IBxAjGCcY6gIYgAQYigXSAQkyMTI2ajBqMTWoAgiwAgHxBS3gPpZWnp6m&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">First for SME Cybersecurity News<br \/>\n<\/a><em>#SMECyberInsights #SMECybersecurity #SMECyberInsights #SME #CyberSafe #CyberSecurity #Cybersecurity\u00a0<\/em><\/p>\n<p><span data-mce-type=\"bookmark\" style=\"width: 0px;overflow: hidden;line-height: 0\" class=\"mce_SELRES_start\">\ufeff<\/span><span data-mce-type=\"bookmark\" style=\"width: 0px;overflow: hidden;line-height: 0\" class=\"mce_SELRES_start\">\ufeff<\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acec796 elementor-widget elementor-widget-wp-widget-text\" data-id=\"acec796\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Perception vs Reality in Authentication: What UK SMEs Must Fix Now &#8211; Analysis of Yubico\u2019s 2025 authentication report.<\/strong><\/p>\n<p>Authentication is the front door to your business systems; and UK small business cyber threats increasingly start by picking that lock. Phishing (fraudulent messages designed to trick someone into handing over passwords or codes) and account takeover feed ransomware, invoice fraud, and data breaches. The uncomfortable truth is that many organisations feel \u201ccovered\u201d because they have passwords and \u201csome MFA\u201d; but attacker techniques and user habits have moved on.<\/p>\n<p>Yubico\u2019s 2025 Global State of Authentication survey highlights a perception gap; a notable share of respondents still believe a simple username and password is the most secure way to protect an account. That belief is exactly what modern phishing kits exploit at scale.<\/p>\n<p><strong>Insight and definitions: the terms that drive the real risk<\/strong><\/p>\n<p>Authentication is how a system proves a user is who they claim to be. The main methods are:<\/p>\n<p><strong>* Password:<\/strong>\u00a0something you know. Easy to reuse, guess, steal, or phish.<\/p>\n<p><strong>* MFA (multi-factor authentication):<\/strong>\u00a0using two or more factors; for example a password plus a code or an app approval. MFA reduces risk; but not all MFA is equal.<\/p>\n<p><strong>* Phishing-resistant MFA:<\/strong>\u00a0methods that cannot be tricked by lookalike login pages. A common example is\u00a0<strong>FIDO2 security keys<\/strong> (a physical key that proves presence and binds the login to the real website). NCSC describes stronger and weaker MFA types and why phishing resistance matters.<\/p>\n<p><strong>Why \u201cperception vs reality\u201d bites SMEs:<\/strong><\/p>\n<p>Many SMEs rely on Microsoft 365, Google Workspace, Xero, QuickBooks, and remote access via outsourced IT. One compromised mailbox can reset other accounts, intercept invoices, and approve payments. Shared admin accounts and \u201ctemporary\u201d exceptions for directors are also common; and attackers love exceptions.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f28d73 elementor-widget elementor-widget-image\" data-id=\"6f28d73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"2048\" height=\"1365\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-2048x1365.jpg\" class=\"attachment-2048x2048 size-2048x2048 wp-image-27006\" alt=\"Perception vs Reality in Authentication: What UK SMEs Must Fix Now - Analysis of Yubico\u2019s 2025 authentication report.\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-2048x1365.jpg 2048w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-1536x1024.jpg 1536w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25fab9c9 elementor-widget elementor-widget-wp-widget-text\" data-id=\"25fab9c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Actionable guidance: high-impact steps you can do this month<\/strong><\/p>\n<p>Start with the systems that, if compromised, would stop trading: email, finance, and admin access.<\/p>\n<p><strong>1) Upgrade MFA where it counts<\/strong><\/p>\n<p>* Turn on MFA everywhere; then prioritise <strong>phishing-resistant MFA<\/strong>\u00a0for admins, finance users, and anyone approving payments.<\/p>\n<p>* Avoid SMS codes where possible; they are better than nothing, but not the strongest option. Follow NCSC\u2019s recommended MFA types. (Source: NCSC links above)<\/p>\n<p><strong>2) Fix the \u201cshared admin\u201d problem<\/strong><\/p>\n<p>* Give each admin their own named account; use least privilege (only the access they need).<\/p>\n<p>* Keep one emergency \u201cbreak glass\u201d admin; lock it down with a strong recovery process and monitoring.<\/p>\n<p><strong>3) Reduce password risk quickly<\/strong><\/p>\n<p>* Use a reputable <strong>password manager<\/strong>\u00a0(a secure vault that creates and stores unique passwords).<\/p>\n<p>* Block known weak passwords; and stop password reuse across business tools.<\/p>\n<p><strong>4) Align to UK expectations without over-engineering<\/strong><\/p>\n<p>* Map actions to <strong>Cyber Essentials controls<\/strong>; especially access control and secure configuration. This also helps with supplier due diligence.<\/p>\n<p>* Treat authentication as part of \u201cappropriate security\u201d; UK GDPR expects appropriate technical and organisational measures, and poor access controls regularly feature in breach lessons.<\/p>\n<p><strong>A realistic SME attack scenario (what \u201cgood enough\u201d looks like until it is not)<\/strong><\/p>\n<p>A director receives a \u201cSharePoint document\u201d email. They sign in and approve an MFA prompt, assuming it is routine. The attacker immediately creates an inbox rule to hide bank details emails, resets the finance system password using the mailbox, and swaps supplier payment details. No malware required; just weak authentication choices and a busy day.<\/p>\n<p><strong>Quick checklist: 10-minute board-level test<\/strong><\/p>\n<p>* Do all email and finance accounts have MFA enabled?<br \/>\n* Do admins and finance users have phishing-resistant MFA?<br \/>\n* Are there any shared admin logins?<br \/>\n* Can staff spot and report suspicious MFA prompts?<br \/>\n* Is there a documented recovery process for lost phones and keys?<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6f919d1e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6f919d1e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-3b39524b\" data-id=\"3b39524b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44051957 elementor-widget elementor-widget-image\" data-id=\"44051957\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"251\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/11\/Securus_Working_300x250-300x251.png\" class=\"attachment-medium size-medium wp-image-25726\" alt=\"SECURUS Communications\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/11\/Securus_Working_300x250-300x251.png 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/11\/Securus_Working_300x250.png 527w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-45b4a4cc\" data-id=\"45b4a4cc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3446a6ee elementor-widget elementor-widget-wp-widget-text\" data-id=\"3446a6ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>SECURUS Communications Ltd<\/strong><\/p>\n<p><strong><a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">Securus<\/a> <\/strong>is a managed communications Operator, providing next-generation network infrastructure and value added services to Managed Hosting providers and the &#8216;cloud generation&#8217;\u200b of enterprises. <strong><a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">Securus<\/a> <\/strong>priority is to offer communication services that represent excellent value for money and are backed by exceptional levels of support.<\/p>\n<p><strong>Contact Securus<\/strong><br \/>\nSecurus Communications Ltd<br \/>\nStation Road, Landmark house, Hook, England RG27 9HA, GB<br \/>\nT: Enquiries:\u00a0<a id=\"ember907\" class=\"link-without-visited-state ember-view\" href=\"tel:03451 283457\" target=\"_blank\" rel=\"noopener noreferrer\" data-artdeco-is-focused=\"true\"><span class=\"link-without-visited-state\" dir=\"ltr\" aria-hidden=\"true\">03451 283457<\/span><\/a>\u00a0| Service Desk: <a href=\"tel:03451 283458\">03451 283458<\/a><br \/>\nSecurus on <a href=\"https:\/\/www.linkedin.com\/company\/securus-communications-ltd\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a> | Securus on <a href=\"https:\/\/x.com\/SecurusComms\">&#8220;X&#8221;<\/a> | <a href=\"https:\/\/www.securuscomms.com\" target=\"_blank\" rel=\"noopener\">https:\/\/securuscomms.com<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-61c814d8 e-flex e-con-boxed e-con e-parent\" data-id=\"61c814d8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-128995df elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elespare-section-title-elespare-left elementor-widget elementor-widget-post-grid\" data-id=\"128995df\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;columns&quot;:&quot;3&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;}\" data-widget_type=\"post-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elespare-widget-title-section title-style-2 elespare-left\">\n\t\t\t\t<h2 class=\"elespare-widget-title\">\n\t\t\t\t\t<span class=\"elespare-section-title-before\"><\/span>\n\t\t\t\t\t<span class=\"elespare-section-title\">Latest  Posts from SECURUS Communications<\/span>\n\t\t\t\t\t<span class=\"elespare-section-title-after\"><\/span>\n\t\t\t\t<\/h2>\n\t\t\t<\/div>    <div class=\"elespare-grid-wrap grid-layout has-background  elespare-has-equal-height\">\n\n      <div class=\"elespare-posts-wrap  elementor-grid grid-style-1  elespare-image-zoom elespare-light \">\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/21\/ai-powered-fraud-in-2026\/\" aria-label=\"AI-Powered Fraud Is Rising: What Ping\u2019s Keyless Deal Signals for UK SME Login Security\u00a0\">\n        <img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"AI-Powered Fraud Is Rising: What Ping\u2019s Keyless Deal Signals for UK SME Login Security\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/ai\/\" aria-label=\"View all posts in AI category\">\n                      \n                        AI\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/21\/ai-powered-fraud-in-2026\/\"> <span>AI-Powered Fraud Is Rising: What Ping\u2019s Keyless Deal Signals for UK SME Login Security\u00a0<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 21, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/15\/ai-aids-compliance\/\" aria-label=\"AI &amp; Compliance for UK SMEs (2025): Cut GDPR Risk, Speed Audits &amp; Win Customer Trust\u00a0\">\n        <img loading=\"lazy\" width=\"300\" height=\"210\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed-300x210.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"AI &amp; Compliance for UK SMEs (2025): Cut GDPR Risk, Speed Audits &amp; Win Customer Trust\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed-300x210.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed-1024x717.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed-768x538.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed.jpg 1291w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/compliance\/\" aria-label=\"View all posts in COMPLIANCE category\">\n                      \n                        COMPLIANCE\n                      <\/a>\n                  <\/li><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" aria-label=\"View all posts in SMECYBERIINSIGHTS category\">\n                      \n                        SMECYBERIINSIGHTS\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/15\/ai-aids-compliance\/\"> <span>AI &amp; Compliance for UK SMEs (2025): Cut GDPR Risk, Speed Audits &amp; Win Customer Trust\u00a0<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 15, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/12\/sme-cyber-threats-rise\/\" aria-label=\"AI Cyber Threats Surge for UK SMEs: Inside the New Safety Platform, Stark Stats and Defence Steps\u00a0\">\n        <img loading=\"lazy\" width=\"300\" height=\"204\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-300x204.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"AI Cyber Threats Surge for UK SMEs: Inside the New Safety Platform, Stark Stats and Defence Steps\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-300x204.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-1024x695.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-768x521.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-1536x1043.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-2048x1390.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" aria-label=\"View all posts in SME CYBER\/THREAT INTEL category\">\n                      \n                        SME CYBER\/THREAT INTEL\n                      <\/a>\n                  <\/li><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" aria-label=\"View all posts in SMECYBERIINSIGHTS category\">\n                      \n                        SMECYBERIINSIGHTS\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/12\/sme-cyber-threats-rise\/\"> <span>AI Cyber Threats Surge for UK SMEs: Inside the New Safety Platform, Stark Stats and Defence Steps\u00a0<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 12, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/09\/sme-cyber-threats-2026\/\" aria-label=\"UK SME Cyber Threats 2026: The Straight-Talking Guide to Phishing, Ransomware &amp; Fraud\u00a0\">\n        <img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/css-collage-concept-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"UK SME Cyber Threats 2026: The Straight-Talking Guide to Phishing, Ransomware &amp; Fraud\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/css-collage-concept-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/css-collage-concept-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/css-collage-concept-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/css-collage-concept.jpg 1252w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" aria-label=\"View all posts in SME CYBER\/THREAT INTEL category\">\n                      \n                        SME CYBER\/THREAT INTEL\n                      <\/a>\n                  <\/li><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" aria-label=\"View all posts in SMECYBERIINSIGHTS category\">\n                      \n                        SMECYBERIINSIGHTS\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/09\/sme-cyber-threats-2026\/\"> <span>UK SME Cyber Threats 2026: The Straight-Talking Guide to Phishing, Ransomware &amp; Fraud\u00a0<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 9, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/06\/lastpass-heavily-fined-by-ico\/\" aria-label=\"Password Manager Fined After Major Data Breach: What UK SMEs Must Learn from the LastPass Case\">\n        <img loading=\"lazy\" width=\"300\" height=\"194\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/subscribe-3534409_1280-300x194.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Password Manager Fined After Major Data Breach: What UK SMEs Must Learn from the LastPass Case\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/subscribe-3534409_1280-300x194.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/subscribe-3534409_1280-1024x661.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/subscribe-3534409_1280-768x496.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/subscribe-3534409_1280.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/data-protection\/\" aria-label=\"View all posts in DATA PROTECTION category\">\n                      \n                        DATA PROTECTION\n                      <\/a>\n                  <\/li><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/managed-security\/\" aria-label=\"View all posts in MANAGED SECURITY category\">\n                      \n                        MANAGED SECURITY\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/06\/lastpass-heavily-fined-by-ico\/\"> <span>Password Manager Fined After Major Data Breach: What UK SMEs Must Learn from the LastPass Case<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 6, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2025\/12\/19\/fake-booking-scam\/\" aria-label=\"Malwarebytes Warns Seasonal Travellers of RAT Infection from Fake Booking.com Scam Sites\">\n        <img loading=\"lazy\" width=\"300\" height=\"170\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/rat-walking-sewage_compressed-300x170.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Malwarebytes Warns Seasonal Travellers of RAT Infection from Fake Booking.com Scam Sites\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/rat-walking-sewage_compressed-300x170.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/rat-walking-sewage_compressed-1024x580.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/rat-walking-sewage_compressed-768x435.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/rat-walking-sewage_compressed-1536x870.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/rat-walking-sewage_compressed-2048x1161.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/managed-security\/\" aria-label=\"View all posts in MANAGED SECURITY category\">\n                      \n                        MANAGED SECURITY\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2025\/12\/19\/fake-booking-scam\/\"> <span>Malwarebytes Warns Seasonal Travellers of RAT Infection from Fake Booking.com Scam Sites<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2025\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              December 19, 2025\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n              <\/div>\n    <\/div>\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: Freepik Latest Posts from SECURUS Communications AI AI-Powered Fraud Is Rising: What Ping\u2019s&#8230;<\/p>\n","protected":false},"author":1,"featured_media":27006,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[854],"tags":[853],"ppma_author":[505],"class_list":["post-27005","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-authentication","tag-authentication"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-scaled.jpg",2560,1706,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-300x200.jpg",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-768x512.jpg",640,427,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-1024x683.jpg",640,427,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-1536x1024.jpg",1536,1024,true],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-2048x1365.jpg",2048,1365,true],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-1024x683.jpg",1024,683,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/03\/face-recognition-personal-identification-collage_compressed-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/authentication\/\" rel=\"category tag\">AUTHENTICATION<\/a>","tag_info":"AUTHENTICATION","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/27005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=27005"}],"version-history":[{"count":8,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/27005\/revisions"}],"predecessor-version":[{"id":27479,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/27005\/revisions\/27479"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/27006"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=27005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=27005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=27005"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=27005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}