{"id":27952,"date":"2026-05-05T07:00:30","date_gmt":"2026-05-05T05:00:30","guid":{"rendered":"https:\/\/smecyberinsights.co.uk\/?p=27952"},"modified":"2026-05-06T11:29:58","modified_gmt":"2026-05-06T09:29:58","slug":"machine-identity-threat-risk","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/05\/05\/machine-identity-threat-risk\/","title":{"rendered":"SME Cybersecurity: Why Machine Identities Are a Growing Risk for UK Small Businesses in 2026"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27952\" class=\"elementor elementor-27952\">\n\t\t\t\t<div class=\"elementor-element elementor-element-427955d5 e-flex e-con-boxed e-con e-parent\" data-id=\"427955d5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4590d6bb elementor-widget__width-initial elementor-widget elementor-widget-image-carousel\" data-id=\"4590d6bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;slides_to_show&quot;:&quot;6&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"CYBERPartners\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners1_NordVPN.png\" alt=\"Partners1_NordVPN\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners3_R3.png\" alt=\"Partners3_R3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners2_Zoho.png\" alt=\"Partners2_Zoho\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Plesk.png\" alt=\"Partners4_Plesk\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/Red_Button_Slider.png\" alt=\"Red_Button_Slider\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/04\/ogo2.png\" alt=\"ogo2\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/Securus_Working_300x250-e1765538235404.png\" alt=\"Detection. Connection. Protection: Why Securus Belongs at the Core of Every Modern SME Security Strategy\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-52da5ff6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"52da5ff6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-16fab7d1\" data-id=\"16fab7d1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-733ba2d3 elementor-widget elementor-widget-image\" data-id=\"733ba2d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/elementor\/thumbs\/7774_Securus_Working_Auto_Banner-rf8bryc4djy6c75t28muqkdhh8m8odty7fzxues2rs.png\" title=\"+7774_Securus_Working_Auto_Banner\" alt=\"SECURUS Communications\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5736da2f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5736da2f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-7143c2db\" data-id=\"7143c2db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-255c62c5 elementor-widget elementor-widget-image\" data-id=\"255c62c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.freepik.com\/author\/rawpixel-com\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-300x200.jpg\" class=\"attachment-medium size-medium wp-image-27953\" alt=\"SME Cybersecurity: Why Machine Identities Are a Growing Risk for UK Small Businesses in 2026\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-768x513.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-1536x1025.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-2048x1367.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: RawPixel via Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-2d1834c4\" data-id=\"2d1834c4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50263e4c elementor-widget elementor-widget-wp-widget-text\" data-id=\"50263e4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar:\u00a0 Tuesday, 05 May 2026 \u2013 07:00 CET<\/p>\n<p style=\"margin: 0cm\"><strong>SME Cybersecurity: Why Machine Identities Are a Growing Risk for UK Small Businesses in 2026<br \/>\n<\/strong>By: <a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=iain+%2B+cybersecurity&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+journalist&amp;client=firefox-b-d&amp;sca_esv=604417a22f933246&amp;biw=1920&amp;bih=937&amp;sxsrf=ADLYWII9GQo-CShq2VQjmub9bZo3edd4sw%3A1732797372997&amp;ei=vGNIZ_W2PLGgkdUP2Z6JsQc&amp;ved=0ahUKEwj1hIqfhf-JAxUxUKQEHVlPInY4ChDh1QMIDw&amp;uact=5&amp;oq=sme+cybersecurity+journalist&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiHHNtZSBjeWJlcnNlY3VyaXR5IGpvdXJuYWxpc3QyBBAjGCcyCBAAGIAEGKIEMggQABiABBiiBDIIEAAYgAQYogRI4g5QgQhY1AtwAXgBkAEAmAGwAaAB8QSqAQMwLjS4AQPIAQD4AQGYAgOgAtYCwgIHECMYsAMYJ8ICChAAGLADGNYEGEfCAgcQIxiwAhgnmAMAiAYBkAYKkgcDMS4yoAekHQ&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Cybersecurity Journalist<br \/>\n<\/a>Published in Collaboration with:<br \/>\n<a href=\"https:\/\/www.linkedin.com\/company\/securus-communications-ltd\" target=\"_blank\" rel=\"noopener\">Securus Technology Group<br \/>\n<\/a><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2025\/05\/20\/consumer-fraud-2025\/SMECyberInsights.co.uk\" target=\"_blank\" rel=\"noopener\">SMECyberInsights.co.uk<\/a>\u00a0&#8211; <a href=\"https:\/\/www.google.com\/search?q=SME+Cybersecurity&amp;sca_esv=01731d022ec92237&amp;rlz=1C1FKPE_enES1123ES1124&amp;sxsrf=AHTn8zozW-9dbXRwHlu5zyHfc5aukU6yeQ%3A1747146305898&amp;ei=QVYjaILMNsyKkdUP1teCyQk&amp;ved=0ahUKEwjC8LuX06CNAxVMRaQEHdarIJkQ4dUDCBA&amp;uact=5&amp;oq=SME+Cybersecurity&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiEVNNRSBDeWJlcnNlY3VyaXR5MgoQIxiABBgnGIoFMgQQIxgnMgQQIxgnMgYQABgHGB4yCxAAGIAEGJECGIoFMggQABgHGAgYHjIIEAAYBxgIGB4yCBAAGAcYCBgeMggQABgHGAgYHjIIEAAYBxgIGB5Iwy9QAFj5JHAAeAGQAQCYAZ0BoAG2A6oBAzAuM7gBA8gBAPgBAZgCA6AC-wPCAgQQABgewgIGEAAYCBgewgIHEAAYgAQYDcICCBAAGAUYDRgemAMAkgcDMC4zoAf9GbIHAzAuM7gH-wPCBwUzLTIuMcgHPg&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">First for SME Cybersecurity<br \/>\n<\/a>Google Indexed PZero on: <a href=\"https:\/\/www.google.com\/search?q=Why+Machine+Identities+Are+a+Growing+Risk+for+UK+Small+Businesses+in+2026&amp;sca_esv=c084c40794af8967&amp;rlz=1C1AJCO_enES1193ES1194&amp;sxsrf=ANbL-n4mBjfRAGqtd3aKG06GA1OrC9Iqiw%3A1778059680779&amp;ei=oAn7adGyLvHW7M8PnpPRQQ&amp;biw=1280&amp;bih=551&amp;ved=0ahUKEwjRgqW9rKSUAxVxK_sDHZ5JNAgQ4dUDCBE&amp;uact=5&amp;oq=Why+Machine+Identities+Are+a+Growing+Risk+for+UK+Small+Businesses+in+2026&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiSVdoeSBNYWNoaW5lIElkZW50aXRpZXMgQXJlIGEgR3Jvd2luZyBSaXNrIGZvciBVSyBTbWFsbCBCdXNpbmVzc2VzIGluIDIwMjZIgA9QAFiCAXAAeACQAQCYAZkBoAH3A6oBAzAuNLgBA8gBAPgBAZgCAKACAJgDAJIHAKAHiQiyBwC4BwDCBwDIBwCACAE&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">050526 at 09:12 CET<\/a><br \/>\n<em>#SMECyberInsights #SMECybersecurity #SMECyberInsights #SME #CyberSafe #CyberSecurity #Cybersecurity #CyberEssentials <\/em><em>#CyberResilience #Identity<\/em><\/p>\n<p><span data-mce-type=\"bookmark\" style=\"width: 0px;overflow: hidden;line-height: 0\" class=\"mce_SELRES_start\">\ufeff<\/span><span data-mce-type=\"bookmark\" style=\"width: 0px;overflow: hidden;line-height: 0\" class=\"mce_SELRES_start\">\ufeff<\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17daef1a elementor-widget elementor-widget-wp-widget-text\" data-id=\"17daef1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>SME Cybersecurity: Why Machine Identities Now Matter to UK SMEs<\/strong><\/p>\n<p>A leaked API key can be just as damaging as a stolen employee password, and many UK SMEs do not realise how many machine identities already exist inside their business. That matters in 2026 because small firms now rely heavily on cloud software, automation tools, managed service providers, payment platforms, and connected devices. Each one may use a non-human credential to authenticate quietly in the background.<\/p>\n<p>The latest Obsidian report highlights a hard truth: machine identities have multiplied faster than most organisations can track them. In plain English, a machine identity is a digital credential used by systems rather than people. That includes API keys, service accounts, tokens, certificates, scripts, bots, cloud workloads, and software integrations. If those credentials are exposed, over-permissioned, or forgotten, attackers can use them to move through systems without triggering the same suspicion as a compromised staff login.<\/p>\n<p>This is not just a large-enterprise issue. The UK Government&#8217;s <a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2025\/cyber-security-breaches-survey-2025\" target=\"_blank\" rel=\"noopener\">Cyber Security Breaches Survey 2025<\/a> found that <strong>43% of businesses<\/strong> identified a cyber security breach or attack in the previous 12 months. SMEs increasingly use SaaS platforms and outsourced IT, which means cyber security for small businesses now includes managing machine-to-machine trust, not just staff accounts.<\/p>\n<p><strong>What Are Machine Identities and Why Should SMEs Care?<\/strong><\/p>\n<p>Machine identities are the credentials that let systems talk to each other securely. For example, your website may connect to a payment gateway with an API key, your backup tool may use a service account to reach Microsoft 365, and your cloud server may rely on certificates to prove it is trusted.<\/p>\n<p>For SMEs, the risk is practical rather than theoretical:<\/p>\n<p>* a hard-coded API key in a website plugin can expose customer data<br \/>\n* a forgotten service account can retain admin rights for years<br \/>\n* a supplier integration can create hidden supply chain cyber risk<br \/>\n* an expired certificate can bring down systems and disrupt trading<\/p>\n<p>However, the bigger issue is visibility. Many small firms know who their employees are, but not which scripts, connectors, or apps have access to finance systems, shared drives, or client records.<\/p>\n<p><strong>Knowledge Section<\/strong><\/p>\n<p><strong>What is a machine identity in simple terms?<\/strong><\/p>\n<p>A machine identity is a digital credential used by software, systems, or devices rather than a human user. Common examples include API keys, certificates, tokens, and service accounts. They allow systems to authenticate and exchange data securely, but they also create risk if they are unmanaged.<\/p>\n<p><strong>Why do machine identities matter for SMEs?<\/strong><\/p>\n<p>They matter because SMEs rely on cloud apps, website integrations, backups, payment systems, and outsourced IT. Each connection may use a machine identity. If one is exposed or over-permissioned, attackers may access systems quietly, steal data, or disrupt operations without using a staff account.<\/p>\n<p><strong>How can an SME manage machine identity risk without a large budget?<\/strong><\/p>\n<p>Start with visibility and ownership. Create a spreadsheet inventory, remove unused accounts, rotate secrets regularly, and reduce permissions. Align these steps with Cyber Essentials controls and ICO security expectations. Even a simple monthly review can materially improve cyber security for small businesses.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c9c3297 elementor-widget elementor-widget-image\" data-id=\"5c9c3297\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"2048\" height=\"1367\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-2048x1367.jpg\" class=\"attachment-2048x2048 size-2048x2048 wp-image-27953\" alt=\"SME Cybersecurity: Why Machine Identities Are a Growing Risk for UK Small Businesses in 2026\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-2048x1367.jpg 2048w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-768x513.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-1536x1025.jpg 1536w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e266ccc elementor-widget elementor-widget-wp-widget-text\" data-id=\"5e266ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Which Machine Identity Risks Create the Biggest Problems?<\/strong><\/p>\n<p>The most common machine identity risks for UK small business cyber threats are usually avoidable:<\/p>\n<p><strong>1. Over-privileged service accounts<\/strong><br \/>\nAccounts have more access than they need, which increases the blast radius if compromised.<\/p>\n<p><strong>2. Unrotated API keys and tokens<\/strong><br \/>\nOld credentials remain active for months or years.<\/p>\n<p><strong>3. Poor ownership<\/strong><br \/>\nNo one knows who is responsible for a certificate, automation script, or third-party connector.<\/p>\n<p><strong>4. Credentials stored insecurely<\/strong><br \/>\nSecrets sit in spreadsheets, code repositories, shared inboxes, or chat threads.<\/p>\n<p><strong>5. Lack of monitoring<\/strong><br \/>\nSuspicious machine behaviour is missed because the focus stays on human logins.<\/p>\n<p>In practice, these issues overlap with <a href=\"https:\/\/www.ncsc.gov.uk\/section\/information-for\/small-medium-sized-organisations\" target=\"_blank\" rel=\"noopener\">NCSC guidance for small and medium organisations<\/a>, especially around access control, secure configuration, and reducing unnecessary exposure.<\/p>\n<p><strong>What Practical Steps Improve SME Cyber Resilience?<\/strong><\/p>\n<p>Most SMEs do not need an expensive machine identity platform to make progress. Start with the highest-value basics:<\/p>\n<p><strong>1. Build a simple inventory<\/strong><br \/>\nList API keys, certificates, service accounts, cloud roles, and third-party integrations. Record owner, purpose, access level, and expiry date.<\/p>\n<p><strong>2. Remove shared or unknown credentials<\/strong><br \/>\nIf nobody owns it, review it urgently. If it is not needed, disable it.<\/p>\n<p><strong>3. Rotate secrets on a schedule<\/strong><br \/>\nChange API keys, tokens, and certificates regularly, especially after staff or supplier changes.<\/p>\n<p><strong>4. Apply least privilege<\/strong><br \/>\nGive each service account only the permissions it needs. This aligns well with <a href=\"https:\/\/www.ncsc.gov.uk\/cyberessentials\/overview\" target=\"_blank\" rel=\"noopener\">Cyber Essentials<\/a> access control principles.<\/p>\n<p><strong>5. Protect sensitive systems with MFA and segmentation<\/strong><br \/>\nMFA will not apply to every machine identity, but it still protects admin portals and cloud consoles used to create them.<\/p>\n<p><strong>6. Review data protection impact<\/strong><br \/>\nIf a machine identity can access personal data, the <a href=\"https:\/\/ico.org.uk\/for-organisations\/uk-gdpr-guidance-and-resources\/security\/\" target=\"_blank\" rel=\"noopener\">ICO security guidance<\/a> and wider <a href=\"https:\/\/ico.org.uk\/for-organisations\/uk-gdpr-guidance-and-resources\/\" target=\"_blank\" rel=\"noopener\">UK GDPR<\/a> obligations matter directly.<\/p>\n<p>The goal is not perfection. It is control. Good SME cyber resilience comes from knowing what exists, reducing unnecessary access, and responding quickly when something changes.<\/p>\n<p>Machine identities are now part of everyday SME Cybersecurity. If your business uses cloud platforms, software integrations, or outsourced IT, you already depend on them. The sensible next step is a focused review of service accounts, API keys, and certificates against <a href=\"https:\/\/www.ncsc.gov.uk\/\" target=\"_blank\" rel=\"noopener\">NCSC<\/a>, <a href=\"https:\/\/www.ncsc.gov.uk\/cyberessentials\/overview\" target=\"_blank\" rel=\"noopener\">Cyber Essentials<\/a>, and <a href=\"https:\/\/ico.org.uk\/\" target=\"_blank\" rel=\"noopener\">ICO<\/a> expectations.<\/p>\n<p><strong>Action: <\/strong>Run a one-hour machine identity audit this week; identify your top ten service accounts or API keys and confirm who owns each one.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3159e388 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3159e388\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-10ce03fc\" data-id=\"10ce03fc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b7e6d3c elementor-widget elementor-widget-image\" data-id=\"5b7e6d3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"251\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/11\/Securus_Working_300x250-300x251.png\" class=\"attachment-medium size-medium wp-image-25726\" alt=\"SECURUS Communications\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/11\/Securus_Working_300x250-300x251.png 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/11\/Securus_Working_300x250.png 527w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-798c4d8d\" data-id=\"798c4d8d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3841c0e5 elementor-widget elementor-widget-wp-widget-text\" data-id=\"3841c0e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>SECURUS Communications Ltd<\/strong><\/p>\n<p><strong><a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">Securus<\/a> <\/strong>is a managed communications Operator, providing next-generation network infrastructure and value added services to Managed Hosting providers and the &#8216;cloud generation&#8217;\u200b of enterprises. <strong><a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">Securus<\/a> <\/strong>priority is to offer communication services that represent excellent value for money and are backed by exceptional levels of support.<\/p>\n<p><strong>Contact Securus<\/strong><br \/>\nSecurus Communications Ltd<br \/>\nStation Road, Landmark house, Hook, England RG27 9HA, GB<br \/>\nT: Enquiries:\u00a0<a id=\"ember907\" class=\"link-without-visited-state ember-view\" href=\"tel:03451 283457\" target=\"_blank\" rel=\"noopener noreferrer\" data-artdeco-is-focused=\"true\"><span class=\"link-without-visited-state\" dir=\"ltr\" aria-hidden=\"true\">03451 283457<\/span><\/a>\u00a0| Service Desk: <a href=\"tel:03451 283458\">03451 283458<\/a><br \/>\nSecurus on <a href=\"https:\/\/www.linkedin.com\/company\/securus-communications-ltd\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a> | Securus on <a href=\"https:\/\/x.com\/SecurusComms\">&#8220;X&#8221;<\/a> | <a href=\"https:\/\/www.securuscomms.com\" target=\"_blank\" rel=\"noopener\">https:\/\/securuscomms.com<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-6790fc2e e-flex e-con-boxed e-con e-parent\" data-id=\"6790fc2e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4150ae46 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elespare-section-title-elespare-left elementor-widget elementor-widget-post-grid\" data-id=\"4150ae46\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;columns&quot;:&quot;3&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;}\" data-widget_type=\"post-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elespare-widget-title-section title-style-2 elespare-left\">\n\t\t\t\t<h2 class=\"elespare-widget-title\">\n\t\t\t\t\t<span class=\"elespare-section-title-before\"><\/span>\n\t\t\t\t\t<span class=\"elespare-section-title\">Latest  Posts from SECURUS Communications<\/span>\n\t\t\t\t\t<span class=\"elespare-section-title-after\"><\/span>\n\t\t\t\t<\/h2>\n\t\t\t<\/div>    <div class=\"elespare-grid-wrap grid-layout has-background  elespare-has-equal-height\">\n\n      <div class=\"elespare-posts-wrap  elementor-grid grid-style-1  elespare-image-zoom elespare-light \">\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/21\/ai-powered-fraud-in-2026\/\" aria-label=\"AI-Powered Fraud Is Rising: What Ping\u2019s Keyless Deal Signals for UK SME Login Security\u00a0\">\n        <img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"AI-Powered Fraud Is Rising: What Ping\u2019s Keyless Deal Signals for UK SME Login Security\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/ai\/\" aria-label=\"View all posts in AI category\">\n                      \n                        AI\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/21\/ai-powered-fraud-in-2026\/\"> <span>AI-Powered Fraud Is Rising: What Ping\u2019s Keyless Deal Signals for UK SME Login Security\u00a0<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 21, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/15\/ai-aids-compliance\/\" aria-label=\"AI &amp; Compliance for UK SMEs (2025): Cut GDPR Risk, Speed Audits &amp; Win Customer Trust\u00a0\">\n        <img loading=\"lazy\" width=\"300\" height=\"210\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed-300x210.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"AI &amp; Compliance for UK SMEs (2025): Cut GDPR Risk, Speed Audits &amp; Win Customer Trust\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed-300x210.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed-1024x717.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed-768x538.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed.jpg 1291w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/compliance\/\" aria-label=\"View all posts in COMPLIANCE category\">\n                      \n                        COMPLIANCE\n                      <\/a>\n                  <\/li><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" aria-label=\"View all posts in SMECYBERIINSIGHTS category\">\n                      \n                        SMECYBERIINSIGHTS\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/15\/ai-aids-compliance\/\"> <span>AI &amp; Compliance for UK SMEs (2025): Cut GDPR Risk, Speed Audits &amp; Win Customer Trust\u00a0<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 15, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/12\/sme-cyber-threats-rise\/\" aria-label=\"AI Cyber Threats Surge for UK SMEs: Inside the New Safety Platform, Stark Stats and Defence Steps\u00a0\">\n        <img loading=\"lazy\" width=\"300\" height=\"204\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-300x204.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"AI Cyber Threats Surge for UK SMEs: Inside the New Safety Platform, Stark Stats and Defence Steps\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-300x204.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-1024x695.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-768x521.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-1536x1043.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-2048x1390.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" aria-label=\"View all posts in SME CYBER\/THREAT INTEL category\">\n                      \n                        SME CYBER\/THREAT INTEL\n                      <\/a>\n                  <\/li><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" aria-label=\"View all posts in SMECYBERIINSIGHTS category\">\n                      \n                        SMECYBERIINSIGHTS\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/12\/sme-cyber-threats-rise\/\"> <span>AI Cyber Threats Surge for UK SMEs: Inside the New Safety Platform, Stark Stats and Defence Steps\u00a0<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 12, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n              <\/div>\n    <\/div>\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: RawPixel via Freepik Latest Posts from SECURUS Communications AI AI-Powered Fraud Is Rising:&#8230;<\/p>\n","protected":false},"author":1,"featured_media":27953,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[857],"tags":[871],"ppma_author":[505],"class_list":["post-27952","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity-fraud","tag-identity"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-scaled.jpg",2560,1709,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-300x200.jpg",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-768x513.jpg",640,428,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-1024x683.jpg",640,427,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-1536x1025.jpg",1536,1025,true],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-2048x1367.jpg",2048,1367,true],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-1024x683.jpg",1024,683,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/contactless-cashless-payment-by-smartphone-grocery-store_compressed-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/identity-fraud\/\" rel=\"category tag\">IDENTITY FRAUD<\/a>","tag_info":"IDENTITY FRAUD","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/27952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=27952"}],"version-history":[{"count":7,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/27952\/revisions"}],"predecessor-version":[{"id":28286,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/27952\/revisions\/28286"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/27953"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=27952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=27952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=27952"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=27952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}