{"id":27964,"date":"2026-05-07T07:00:56","date_gmt":"2026-05-07T05:00:56","guid":{"rendered":"https:\/\/smecyberinsights.co.uk\/?p=27964"},"modified":"2026-05-08T10:46:39","modified_gmt":"2026-05-08T08:46:39","slug":"protect-your-sme-deepfake-onslaught","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/05\/07\/protect-your-sme-deepfake-onslaught\/","title":{"rendered":"SME Cybersecurity: Why UK SMEs Must Prepare Now for Deepfake Fraud and Impersonation Attacks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27964\" class=\"elementor elementor-27964\">\n\t\t\t\t<div class=\"elementor-element elementor-element-578e4058 e-flex e-con-boxed e-con e-parent\" data-id=\"578e4058\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3172f88e elementor-widget__width-initial elementor-widget elementor-widget-image-carousel\" data-id=\"3172f88e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;slides_to_show&quot;:&quot;6&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"CYBERPartners\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners1_NordVPN.png\" alt=\"Partners1_NordVPN\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners3_R3.png\" alt=\"Partners3_R3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners2_Zoho.png\" alt=\"Partners2_Zoho\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Plesk.png\" alt=\"Partners4_Plesk\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/Red_Button_Slider.png\" alt=\"Red_Button_Slider\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/04\/ogo2.png\" alt=\"ogo2\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/Securus_Working_300x250-e1765538235404.png\" alt=\"Detection. Connection. Protection: Why Securus Belongs at the Core of Every Modern SME Security Strategy\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-74a9b98c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"74a9b98c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-39e0a47c\" data-id=\"39e0a47c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3337a058 elementor-widget elementor-widget-image\" data-id=\"3337a058\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/elementor\/thumbs\/7774_Securus_Working_Auto_Banner-rf8bryc4djy6c75t28muqkdhh8m8odty7fzxues2rs.png\" title=\"+7774_Securus_Working_Auto_Banner\" alt=\"SECURUS Communications\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5b1ed68e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5b1ed68e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-6d3adb6f\" data-id=\"6d3adb6f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-104eed7d elementor-widget elementor-widget-image\" data-id=\"104eed7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.freepik.com\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"240\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-300x240.jpg\" class=\"attachment-medium size-medium wp-image-27965\" alt=\"SME Cybersecurity: Why UK SMEs Must Prepare Now for Deepfake Fraud and Impersonation Attacks\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-300x240.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-1024x819.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-768x614.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-1536x1229.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-2048x1638.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-6ce40dcf\" data-id=\"6ce40dcf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50725719 elementor-widget elementor-widget-wp-widget-text\" data-id=\"50725719\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar:\u00a0 Thursday, 07 April 2026 \u2013 07:00 CET<\/p>\n<p><strong>SME Cybersecurity: Why UK SMEs Must Prepare Now for Deepfake Fraud and Impersonation Attacks<br \/>\n<\/strong>By: <a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=iain+%2B+cybersecurity&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+journalist&amp;client=firefox-b-d&amp;sca_esv=604417a22f933246&amp;biw=1920&amp;bih=937&amp;sxsrf=ADLYWII9GQo-CShq2VQjmub9bZo3edd4sw%3A1732797372997&amp;ei=vGNIZ_W2PLGgkdUP2Z6JsQc&amp;ved=0ahUKEwj1hIqfhf-JAxUxUKQEHVlPInY4ChDh1QMIDw&amp;uact=5&amp;oq=sme+cybersecurity+journalist&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiHHNtZSBjeWJlcnNlY3VyaXR5IGpvdXJuYWxpc3QyBBAjGCcyCBAAGIAEGKIEMggQABiABBiiBDIIEAAYgAQYogRI4g5QgQhY1AtwAXgBkAEAmAGwAaAB8QSqAQMwLjS4AQPIAQD4AQGYAgOgAtYCwgIHECMYsAMYJ8ICChAAGLADGNYEGEfCAgcQIxiwAhgnmAMAiAYBkAYKkgcDMS4yoAekHQ&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Cybersecurity Journalist<br \/>\n<\/a>Published in Collaboration with:<br \/>\n<a href=\"https:\/\/www.linkedin.com\/company\/securus-communications-ltd\" target=\"_blank\" rel=\"noopener\">Securus Technology Group<br \/>\n<\/a><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2025\/05\/20\/consumer-fraud-2025\/SMECyberInsights.co.uk\" target=\"_blank\" rel=\"noopener\">SMECyberInsights.co.uk<\/a>\u00a0&#8211; <a href=\"https:\/\/www.google.com\/search?q=SME+Cybersecurity&amp;sca_esv=01731d022ec92237&amp;rlz=1C1FKPE_enES1123ES1124&amp;sxsrf=AHTn8zozW-9dbXRwHlu5zyHfc5aukU6yeQ%3A1747146305898&amp;ei=QVYjaILMNsyKkdUP1teCyQk&amp;ved=0ahUKEwjC8LuX06CNAxVMRaQEHdarIJkQ4dUDCBA&amp;uact=5&amp;oq=SME+Cybersecurity&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiEVNNRSBDeWJlcnNlY3VyaXR5MgoQIxiABBgnGIoFMgQQIxgnMgQQIxgnMgYQABgHGB4yCxAAGIAEGJECGIoFMggQABgHGAgYHjIIEAAYBxgIGB4yCBAAGAcYCBgeMggQABgHGAgYHjIIEAAYBxgIGB5Iwy9QAFj5JHAAeAGQAQCYAZ0BoAG2A6oBAzAuM7gBA8gBAPgBAZgCA6AC-wPCAgQQABgewgIGEAAYCBgewgIHEAAYgAQYDcICCBAAGAUYDRgemAMAkgcDMC4zoAf9GbIHAzAuM7gH-wPCBwUzLTIuMcgHPg&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">First for SME Cybersecurity<br \/>\n<\/a>Google Indexed PZero on: <a href=\"https:\/\/www.google.com\/search?q=Why+UK+SMEs+Must+Prepare+Now+for+Deepfake+Fraud+and+Impersonation+Attacks&amp;sca_esv=3037e92767d15074&amp;rlz=1C1AJCO_enES1193ES1194&amp;sxsrf=ANbL-n6972T73OLfxN4tGLWnWbaRYPXVzg%3A1778229880034&amp;ei=eKL9ae3lAZutkdUP1tuDuAY&amp;biw=1280&amp;bih=551&amp;ved=0ahUKEwjtgdDCpqmUAxWbVqQEHdbtAGcQ4dUDCBE&amp;uact=5&amp;oq=Why+UK+SMEs+Must+Prepare+Now+for+Deepfake+Fraud+and+Impersonation+Attacks&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiSVdoeSBVSyBTTUVzIE11c3QgUHJlcGFyZSBOb3cgZm9yIERlZXBmYWtlIEZyYXVkIGFuZCBJbXBlcnNvbmF0aW9uIEF0dGFja3NIkQZQAFgAcAB4AJABAJgBhgGgAYYBqgEDMC4xuAEDyAEA-AEBmAIAoAIAmAMAkgcAoAdbsgcAuAcAwgcAyAcAgAgB&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">070526 at 08:50 CET<\/a><br \/>\n<em>#SMECyberInsights #SMECybersecurity #SMECyberInsights #SME #CyberSafe #CyberSecurity #Cybersecurity #CyberEssentials #<\/em><em>DeepfakeFraud #CyberResilience<\/em><\/p>\n<p><span data-mce-type=\"bookmark\" style=\"width: 0px;overflow: hidden;line-height: 0\" class=\"mce_SELRES_start\">\ufeff<\/span><span data-mce-type=\"bookmark\" style=\"width: 0px;overflow: hidden;line-height: 0\" class=\"mce_SELRES_start\">\ufeff<\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a7d3851 elementor-widget elementor-widget-wp-widget-text\" data-id=\"3a7d3851\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>SME Cybersecurity: Why Deepfake Attacks Are Becoming a Real SME Risk<\/strong><\/p>\n<p>A convincing fake voice message from your managing director could now be enough to trigger a payment, reset an account, or release sensitive data. That is why deepfakes have moved from novelty to business risk. For UK SMEs, the danger is not only technical sophistication; it is speed, trust, and the fact that smaller firms often rely on informal approvals when people are busy.<\/p>\n<p>A deepfake is AI-generated content that imitates a real person\u2019s voice, face, or manner of speaking. In a business setting, that usually means a fake voicemail, cloned voice note, altered video, or spoofed live call designed to impersonate a director, colleague, supplier, or client. The attack goal is simple: get someone to act before they stop to verify.<\/p>\n<p>This threat sits inside a wider pattern of UK small business cyber threats. The <a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2025\/cyber-security-breaches-survey-2025\" target=\"_blank\" rel=\"noopener\">UK Cyber Security Breaches Survey 2025<\/a> found that <strong>43% of businesses<\/strong> identified a cyber security breach or attack in the last 12 months, with phishing remaining the most common attack type. Deepfakes build on the same principle, but they make impersonation more believable and harder to dismiss.<\/p>\n<p><strong>What Do Deepfakes Mean in Practice for SMEs?<\/strong><\/p>\n<p>For SMEs, deepfake risk is less about Hollywood-style fake videos and more about social engineering with sharper teeth. A finance manager may receive a voice note that sounds exactly like the owner asking for an urgent transfer. A junior staff member may get a video call from someone who appears to be an external IT provider asking them to approve access. A customer service team may be pressured into resetting credentials after hearing a familiar senior voice.<\/p>\n<p>The commercial impact can be serious:<\/p>\n<p>* fraudulent payments<br \/>\n* business email compromise combined with voice spoofing<br \/>\n* disclosure of personal or commercially sensitive data<br \/>\n* reputational damage if clients are deceived<br \/>\n* confusion during cyber incident response<\/p>\n<p>SMEs are particularly exposed when approval chains are informal, staff know each other well, and speed is valued over process. Trust is a strength in small firms. It is also what attackers try to exploit.<\/p>\n<p><strong>Knowledge Section<\/strong><\/p>\n<p><strong>What is a deepfake in a business context?<\/strong><\/p>\n<p>A deepfake in a business context is AI-generated audio or video designed to imitate a real person, usually to trick staff into taking action. For SMEs, that often means fake payment requests, credential resets, or urgent instructions that appear to come from a trusted director or supplier.<\/p>\n<p><strong>Are deepfakes really a risk for small businesses?<\/strong><\/p>\n<p>Yes. SMEs are attractive targets because decisions are often made quickly and with fewer formal checks. Attackers do not need perfect fake videos. A convincing cloned voice or realistic message can be enough to trigger fraud, data disclosure, or a wider cyber incident.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24b8b80 elementor-widget elementor-widget-image\" data-id=\"24b8b80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"2048\" height=\"1638\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-2048x1638.jpg\" class=\"attachment-2048x2048 size-2048x2048 wp-image-27965\" alt=\"SME Cybersecurity: Why UK SMEs Must Prepare Now for Deepfake Fraud and Impersonation Attacks\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-2048x1638.jpg 2048w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-300x240.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-1024x819.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-768x614.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-1536x1229.jpg 1536w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6039252f elementor-widget elementor-widget-wp-widget-text\" data-id=\"6039252f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>What is the most effective first step for SMEs?<\/strong><\/p>\n<p>The most effective first step is a simple verification policy. Any request involving money, access, or sensitive data should be confirmed using a second channel and a trusted contact method. That single process can significantly improve SME cyber resilience against impersonation attacks.<\/p>\n<p><strong>How Can UK SMEs Defend Against Deepfake Fraud Without a Big Budget?<\/strong><\/p>\n<p>The best defence is process, not panic. Most deepfake attacks fail when businesses slow down critical decisions and verify requests through a second channel.<\/p>\n<p>Prioritise these sme cyber security best practices:<\/p>\n<p><strong>1. Create a callback rule for sensitive requests<\/strong><br \/>\nIf someone asks for a payment change, password reset, bank detail amendment, or urgent data release, verify it using a known phone number or separate channel.<\/p>\n<p><strong>2. Define approval controls for finance and HR<\/strong><br \/>\nNo single voice note, Teams message, or email should authorise payroll changes or bank transfers on its own.<\/p>\n<p><strong>3. Train staff on modern impersonation risk<\/strong><br \/>\nUse short awareness sessions that explain how cloned voices and fake video requests work. This is now part of phishing protection for SMEs.<\/p>\n<p><strong>4. Harden accounts with <\/strong><a href=\"https:\/\/www.ncsc.gov.uk\/guidance\/setting-two-factor-authentication-2fa\" target=\"_blank\" rel=\"noopener\"><strong>multi-factor authentication (MFA)<\/strong><\/a><br \/>\nMFA will not stop a fake voice call, but it helps prevent the account takeover that often supports a wider impersonation attack.<\/p>\n<p><strong>5. Review access and device security<\/strong><br \/>\nApply <a href=\"https:\/\/www.ncsc.gov.uk\/cyberessentials\/overview\" target=\"_blank\" rel=\"noopener\">Cyber Essentials<\/a> controls around secure configuration, access control, and malware protection. Good endpoint security for small business devices makes follow-on compromise less likely.<\/p>\n<p><strong>6. Protect personal data properly<\/strong><br \/>\nIf deepfake fraud leads to personal data exposure, <a href=\"https:\/\/ico.org.uk\/for-organisations\/uk-gdpr-guidance-and-resources\/security\/\" target=\"_blank\" rel=\"noopener\">ICO security guidance<\/a> and <a href=\"https:\/\/ico.org.uk\/for-organisations\/report-a-breach\/personal-data-breach\/\" target=\"_blank\" rel=\"noopener\">personal data breach obligations<\/a> may apply under <a href=\"https:\/\/ico.org.uk\/for-organisations\/uk-gdpr-guidance-and-resources\/\" target=\"_blank\" rel=\"noopener\">UK GDPR<\/a>.<\/p>\n<p>The <a href=\"https:\/\/www.ncsc.gov.uk\/section\/information-for\/small-medium-sized-organisations\" target=\"_blank\" rel=\"noopener\">NCSC guidance for small and medium organisations<\/a> remains highly relevant here. Deepfakes may be new in form, but the underlying controls are familiar: verify identity, reduce unnecessary access, and make high-risk actions harder to rush.<\/p>\n<p><strong>Important Conclusions<\/strong><\/p>\n<p>Deepfakes are not a future problem for large enterprises only. They are already becoming part of everyday SME Cybersecurity because they exploit trust, urgency, and weak verification. UK SMEs do not need expensive AI detection tools to improve resilience. They need clear approval rules, staff awareness, and reliable verification steps.<\/p>\n<p><strong>Action:<\/strong> Run a 20-minute team exercise this week; choose one payment request, one password reset, and one supplier change scenario, then decide how your business would verify each one safely.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5e8223cb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5e8223cb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-1916ba38\" data-id=\"1916ba38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4c0cbdae elementor-widget elementor-widget-image\" data-id=\"4c0cbdae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"251\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/11\/Securus_Working_300x250-300x251.png\" class=\"attachment-medium size-medium wp-image-25726\" alt=\"SECURUS Communications\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/11\/Securus_Working_300x250-300x251.png 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/11\/Securus_Working_300x250.png 527w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-54bb61ca\" data-id=\"54bb61ca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6417e95f elementor-widget elementor-widget-wp-widget-text\" data-id=\"6417e95f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>SECURUS Communications Ltd<\/strong><\/p>\n<p><strong><a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">Securus<\/a> <\/strong>is a managed communications Operator, providing next-generation network infrastructure and value added services to Managed Hosting providers and the &#8216;cloud generation&#8217;\u200b of enterprises. <strong><a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">Securus<\/a> <\/strong>priority is to offer communication services that represent excellent value for money and are backed by exceptional levels of support.<\/p>\n<p><strong>Contact Securus<\/strong><br \/>\nSecurus Communications Ltd<br \/>\nStation Road, Landmark house, Hook, England RG27 9HA, GB<br \/>\nT: Enquiries:\u00a0<a id=\"ember907\" class=\"link-without-visited-state ember-view\" href=\"tel:03451 283457\" target=\"_blank\" rel=\"noopener noreferrer\" data-artdeco-is-focused=\"true\"><span class=\"link-without-visited-state\" dir=\"ltr\" aria-hidden=\"true\">03451 283457<\/span><\/a>\u00a0| Service Desk: <a href=\"tel:03451 283458\">03451 283458<\/a><br \/>\nSecurus on <a href=\"https:\/\/www.linkedin.com\/company\/securus-communications-ltd\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a> | Securus on <a href=\"https:\/\/x.com\/SecurusComms\">&#8220;X&#8221;<\/a> | <a href=\"https:\/\/www.securuscomms.com\" target=\"_blank\" rel=\"noopener\">https:\/\/securuscomms.com<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-6fba6eb9 e-flex e-con-boxed e-con e-parent\" data-id=\"6fba6eb9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-545a3d2c elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elespare-section-title-elespare-left elementor-widget elementor-widget-post-grid\" data-id=\"545a3d2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;columns&quot;:&quot;3&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;}\" data-widget_type=\"post-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elespare-widget-title-section title-style-2 elespare-left\">\n\t\t\t\t<h2 class=\"elespare-widget-title\">\n\t\t\t\t\t<span class=\"elespare-section-title-before\"><\/span>\n\t\t\t\t\t<span class=\"elespare-section-title\">Latest  Posts from SECURUS Communications<\/span>\n\t\t\t\t\t<span class=\"elespare-section-title-after\"><\/span>\n\t\t\t\t<\/h2>\n\t\t\t<\/div>    <div class=\"elespare-grid-wrap grid-layout has-background  elespare-has-equal-height\">\n\n      <div class=\"elespare-posts-wrap  elementor-grid grid-style-1  elespare-image-zoom elespare-light \">\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/21\/ai-powered-fraud-in-2026\/\" aria-label=\"AI-Powered Fraud Is Rising: What Ping\u2019s Keyless Deal Signals for UK SME Login Security\u00a0\">\n        <img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"AI-Powered Fraud Is Rising: What Ping\u2019s Keyless Deal Signals for UK SME Login Security\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/fraud-8509836_1280.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/ai\/\" aria-label=\"View all posts in AI category\">\n                      \n                        AI\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/21\/ai-powered-fraud-in-2026\/\"> <span>AI-Powered Fraud Is Rising: What Ping\u2019s Keyless Deal Signals for UK SME Login Security\u00a0<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 21, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/15\/ai-aids-compliance\/\" aria-label=\"AI &amp; Compliance for UK SMEs (2025): Cut GDPR Risk, Speed Audits &amp; Win Customer Trust\u00a0\">\n        <img loading=\"lazy\" width=\"300\" height=\"210\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed-300x210.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"AI &amp; Compliance for UK SMEs (2025): Cut GDPR Risk, Speed Audits &amp; Win Customer Trust\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed-300x210.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed-1024x717.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed-768x538.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/ai-powered-cybersecurity-biometric-authentication_compressed.jpg 1291w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/compliance\/\" aria-label=\"View all posts in COMPLIANCE category\">\n                      \n                        COMPLIANCE\n                      <\/a>\n                  <\/li><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" aria-label=\"View all posts in SMECYBERIINSIGHTS category\">\n                      \n                        SMECYBERIINSIGHTS\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/15\/ai-aids-compliance\/\"> <span>AI &amp; Compliance for UK SMEs (2025): Cut GDPR Risk, Speed Audits &amp; Win Customer Trust\u00a0<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 15, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n                    <div class=\"elespare-posts-grid-post-items\">\n\n              <div class=\"elespare-img-wrapper\">\n                \n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/12\/sme-cyber-threats-rise\/\" aria-label=\"AI Cyber Threats Surge for UK SMEs: Inside the New Safety Platform, Stark Stats and Defence Steps\u00a0\">\n        <img loading=\"lazy\" width=\"300\" height=\"204\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-300x204.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"AI Cyber Threats Surge for UK SMEs: Inside the New Safety Platform, Stark Stats and Defence Steps\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-300x204.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-1024x695.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-768x521.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-1536x1043.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/01\/risk-gamble-opportunity-swot-weakness-unsure-concept_compressed-2048x1390.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>      <\/a>\n\n    \n                <ul class='elespare-cat-links solid'><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" aria-label=\"View all posts in SME CYBER\/THREAT INTEL category\">\n                      \n                        SME CYBER\/THREAT INTEL\n                      <\/a>\n                  <\/li><li class=\"elespare-meta-category\">\n                      <a class=\"elespare-categories\" href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" aria-label=\"View all posts in SMECYBERIINSIGHTS category\">\n                      \n                        SMECYBERIINSIGHTS\n                      <\/a>\n                  <\/li><\/ul>              <\/div>\n              <div class=\"elespare-content-wrapper\">\n                                \n    <h3 class=\"elespare-post-title\">\n      <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/01\/12\/sme-cyber-threats-rise\/\"> <span>AI Cyber Threats Surge for UK SMEs: Inside the New Safety Platform, Stark Stats and Defence Steps\u00a0<\/span><\/a>\n    <\/h3>\n          <div class=\"elespare-metadata\">\n                  <span class=\"post-author\">\n            <a href=\"\">\n                              <i class=\"demo-icon elespare-icons-user-circle-regular\" aria-hidden=\"true\"><\/i>\n                                        <\/a>\n          <\/span>\n                          <span class=\"elespare-posts-full-post-author\">\n            <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/\">\n              <i class=\"demo-icon elespare-icons-clock-regular\" aria-hidden=\"true\"><\/i>\n              January 12, 2026\n            <\/a>\n          <\/span>\n                          <span class=\"comment_count\">\n            <i class=\"demo-icon elespare-icons-comment-empty\"><\/i>\n            0          <\/span>\n              <\/div>\n\n              <\/div>\n            <\/div>\n              <\/div>\n    <\/div>\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: Freepik Latest Posts from SECURUS Communications AI AI-Powered Fraud Is Rising: What Ping\u2019s&#8230;<\/p>\n","protected":false},"author":1,"featured_media":27965,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[849],"tags":[850],"ppma_author":[505],"class_list":["post-27964","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-deepfake","tag-deepfake"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-scaled.jpg",2560,2048,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-300x240.jpg",300,240,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-768x614.jpg",640,512,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-1024x819.jpg",640,512,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-1536x1229.jpg",1536,1229,true],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-2048x1638.jpg",2048,1638,true],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-1024x819.jpg",1024,819,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/04\/facial-recognition-collage-concept_compressed-1-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/deepfake\/\" rel=\"category tag\">DEEPFAKE<\/a>","tag_info":"DEEPFAKE","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/27964","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=27964"}],"version-history":[{"count":7,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/27964\/revisions"}],"predecessor-version":[{"id":28292,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/27964\/revisions\/28292"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/27965"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=27964"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=27964"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=27964"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=27964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}