{"id":28326,"date":"2026-05-15T07:00:29","date_gmt":"2026-05-15T05:00:29","guid":{"rendered":"https:\/\/smecyberinsights.co.uk\/?p=28326"},"modified":"2026-05-14T13:03:26","modified_gmt":"2026-05-14T11:03:26","slug":"real-cost-of-cheap-msp","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/05\/15\/real-cost-of-cheap-msp\/","title":{"rendered":"SME Cybersecurity and the Real Cost of a Cheap MSP: 6 Risks Business Owners Should Not Ignore"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"28326\" class=\"elementor elementor-28326\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bc9c5da e-flex e-con-boxed e-con e-parent\" data-id=\"bc9c5da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ea1536 elementor-widget__width-initial elementor-widget elementor-widget-image-carousel\" data-id=\"8ea1536\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;slides_to_show&quot;:&quot;6&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"CYBERPartners\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners1_NordVPN.png\" alt=\"Partners1_NordVPN\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners3_R3.png\" alt=\"Partners3_R3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners2_Zoho.png\" alt=\"Partners2_Zoho\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Plesk.png\" alt=\"Partners4_Plesk\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/Red_Button_Slider.png\" alt=\"Red_Button_Slider\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/04\/ogo2.png\" alt=\"ogo2\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/Securus_Working_300x250-e1765538235404.png\" alt=\"Detection. Connection. Protection: Why Securus Belongs at the Core of Every Modern SME Security Strategy\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7a65d8ca elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7a65d8ca\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4d920b5f\" data-id=\"4d920b5f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e4c7a3a elementor-widget elementor-widget-image\" data-id=\"1e4c7a3a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/securuscomms.com\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/elementor\/thumbs\/7774_Securus_Working_Auto_Banner-rf8bryc4djy6c75t28muqkdhh8m8odty7fzxues2rs.png\" title=\"+7774_Securus_Working_Auto_Banner\" alt=\"SECURUS Communications\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-773699b2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"773699b2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-23cad262\" data-id=\"23cad262\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-347ab4e2 elementor-widget elementor-widget-image\" data-id=\"347ab4e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.magnific.com\/author\/pch-vector\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP-300x200.jpg\" class=\"attachment-medium size-medium wp-image-28327\" alt=\"SME Cybersecurity and the Real Cost of a Cheap MSP: 6 Risks Business Owners Should Not Ignore\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP.jpg 1379w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: PCH Vector via Magnific<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-68722fe6\" data-id=\"68722fe6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-103c7be6 elementor-widget elementor-widget-wp-widget-text\" data-id=\"103c7be6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar:\u00a0 Friday,\u00a0 15 May 2026 \u2013 07:00 CET<\/p>\n<p><strong>SME Cybersecurity and the Real Cost of a Cheap MSP: 6 Risks Business Owners Should Not Ignore<br \/>\n<\/strong>By: <a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=iain+%2B+cybersecurity&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+journalist&amp;client=firefox-b-d&amp;sca_esv=604417a22f933246&amp;biw=1920&amp;bih=937&amp;sxsrf=ADLYWII9GQo-CShq2VQjmub9bZo3edd4sw%3A1732797372997&amp;ei=vGNIZ_W2PLGgkdUP2Z6JsQc&amp;ved=0ahUKEwj1hIqfhf-JAxUxUKQEHVlPInY4ChDh1QMIDw&amp;uact=5&amp;oq=sme+cybersecurity+journalist&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiHHNtZSBjeWJlcnNlY3VyaXR5IGpvdXJuYWxpc3QyBBAjGCcyCBAAGIAEGKIEMggQABiABBiiBDIIEAAYgAQYogRI4g5QgQhY1AtwAXgBkAEAmAGwAaAB8QSqAQMwLjS4AQPIAQD4AQGYAgOgAtYCwgIHECMYsAMYJ8ICChAAGLADGNYEGEfCAgcQIxiwAhgnmAMAiAYBkAYKkgcDMS4yoAekHQ&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Cybersecurity Journalist<br \/>\n<\/a>Published in Collaboration with: <a href=\"https:\/\/foxtechcyber.com\/\" target=\"_blank\" rel=\"noopener\">FoxTech Cyber<\/a><a href=\"https:\/\/www.linkedin.com\/company\/securus-communications-ltd\" target=\"_blank\" rel=\"noopener\"><br \/>\n<\/a><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2025\/05\/20\/consumer-fraud-2025\/SMECyberInsights.co.uk\" target=\"_blank\" rel=\"noopener\">SMECyberInsights.co.uk<\/a>\u00a0&#8211; <a href=\"https:\/\/www.google.com\/search?q=SME+Cybersecurity&amp;sca_esv=01731d022ec92237&amp;rlz=1C1FKPE_enES1123ES1124&amp;sxsrf=AHTn8zozW-9dbXRwHlu5zyHfc5aukU6yeQ%3A1747146305898&amp;ei=QVYjaILMNsyKkdUP1teCyQk&amp;ved=0ahUKEwjC8LuX06CNAxVMRaQEHdarIJkQ4dUDCBA&amp;uact=5&amp;oq=SME+Cybersecurity&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiEVNNRSBDeWJlcnNlY3VyaXR5MgoQIxiABBgnGIoFMgQQIxgnMgQQIxgnMgYQABgHGB4yCxAAGIAEGJECGIoFMggQABgHGAgYHjIIEAAYBxgIGB4yCBAAGAcYCBgeMggQABgHGAgYHjIIEAAYBxgIGB5Iwy9QAFj5JHAAeAGQAQCYAZ0BoAG2A6oBAzAuM7gBA8gBAPgBAZgCA6AC-wPCAgQQABgewgIGEAAYCBgewgIHEAAYgAQYDcICCBAAGAUYDRgemAMAkgcDMC4zoAf9GbIHAzAuM7gH-wPCBwUzLTIuMcgHPg&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">First for SME Cybersecurity<br \/>\n<\/a>Google Indexed on: xxxxx at xxxx<em><br \/>\n#SMECyberInsights #SME #CyberSafe #CyberSecurity #Cybersecurity#NCSC #CyberEssentials #CyberResilience #ManagedServices #CyberResilience<br \/>\n<\/em><\/p>\n<p><span data-mce-type=\"bookmark\" style=\"width: 0px;overflow: hidden;line-height: 0\" class=\"mce_SELRES_start\">\ufeff<\/span><span data-mce-type=\"bookmark\" style=\"width: 0px;overflow: hidden;line-height: 0\" class=\"mce_SELRES_start\">\ufeff<\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4919f608 elementor-widget elementor-widget-wp-widget-text\" data-id=\"4919f608\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>SME Cybersecurity: Why a Cheap MSP Can Cost More Than It Saves<\/strong><\/p>\n<p>Choosing a low-cost managed service provider can feel like sensible SME budgeting. On paper, the numbers look tidy. In practice, the risk often shows up elsewhere; slower incident response, weak Cybersecurity controls, poor visibility, and expensive disruption when something goes wrong. That is why <strong>FoxTech Cyber\u2019s blog post, \u201cThe 6 Hidden Costs of a Cheap MSP,\u201d<\/strong> is such a useful prompt for UK SMEs. It tackles a common buying mistake with welcome clarity and practical relevance.<\/p>\n<p>FoxTech makes the central point well: \u201c<strong>The cheapest MSP often ends up being the most expensive<\/strong>.\u201d That is not just a clever line. It reflects a pattern many SMEs know too late, after a prolonged outage, a compliance gap, or an avoidable security incident exposes the true cost of under-supported IT.<\/p>\n<p><strong>What does a \u201ccheap MSP\u201d usually mean in practice?<\/strong><\/p>\n<p>A low-cost MSP is not automatically a bad provider. Price alone does not determine quality. However, when costs are cut too far, services are often stripped back in ways that matter operationally and commercially.<\/p>\n<p>As FoxTech Cyber explains, \u201c<strong>what looks affordable on paper often comes with hidden trade-offs<\/strong>.\u201d For SMEs, those trade-offs can include:<\/p>\n<p>* slower response times<br \/>\n* reactive rather than proactive support<br \/>\n* limited security monitoring<br \/>\n* weak documentation<br \/>\n* unclear accountability<br \/>\n* extra charges for services assumed to be included<\/p>\n<p>These issues hit smaller businesses hard because many rely heavily on one external IT partner. If that provider lacks capability, the SME inherits the risk.<\/p>\n<p><strong>What are the six hidden costs SMEs should pay attention to?<\/strong><\/p>\n<p>FoxTech Cyber breaks the issue into six practical cost areas. While the article is framed around managed services, the underlying lesson is broader: low upfront pricing can quietly increase operational and Cybersecurity exposure.<\/p>\n<p><strong>1. Downtime costs more than the monthly saving<\/strong><\/p>\n<p>A cheap MSP may save money on contract price but lose it many times over in disruption. If a file server fails, email goes down, or remote users cannot connect, the direct cost is lost productivity. The indirect cost is frustrated customers and delayed revenue.<\/p>\n<p><strong>2. Weak Cybersecurity creates expensive exposure<\/strong><\/p>\n<p>This is the point SME leaders should sit with. If low-cost support means poor patching, limited monitoring, weak endpoint protection, or inconsistent backup checks, the business is more exposed to phishing, ransomware, and business email compromise.<\/p>\n<p><strong>3. Compliance gaps become a management problem<\/strong><\/p>\n<p>Under<strong> <a href=\"https:\/\/ico.org.uk\/for-organisations\/uk-gdpr-guidance-and-resources\/security\" target=\"_blank\" rel=\"noopener\">ICO guidance on security<\/a><\/strong>, organisations must implement appropriate technical and organisational measures to protect personal data. A provider that cannot evidence basic controls creates legal and reputational risk, not just IT inconvenience.<\/p>\n<p><strong>4. Hidden extras distort the real price<\/strong><\/p>\n<p>One of the oldest tricks in the managed services playbook is making the base fee look low, then billing separately for essentials. That can include project work, onboarding, after-hours support, security tooling, or backup recovery.<\/p>\n<p><strong>5. Strategic advice is often missing<\/strong><\/p>\n<p>Many SMEs do not need jargon. They need someone to say, clearly, what to fix first. A weak MSP may maintain systems but fail to improve resilience, support <strong>Cyber Essentials<\/strong> alignment, or reduce supply chain cyber risk.<\/p>\n<p><strong>6. Poor support drains internal time<\/strong><\/p>\n<p>When service quality is inconsistent, staff end up chasing tickets, repeating issues, and firefighting problems that should have been prevented. For time-poor SME leaders, that management drag is a hidden cost in itself.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2347145 elementor-widget elementor-widget-image\" data-id=\"2347145\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"1379\" height=\"919\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP.jpg\" class=\"attachment-2048x2048 size-2048x2048 wp-image-28327\" alt=\"SME Cybersecurity and the Real Cost of a Cheap MSP: 6 Risks Business Owners Should Not Ignore\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP.jpg 1379w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP-768x512.jpg 768w\" sizes=\"auto, (max-width: 1379px) 100vw, 1379px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37ef777b elementor-widget elementor-widget-wp-widget-text\" data-id=\"37ef777b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>How should SMEs assess an MSP more effectively?<\/strong><\/p>\n<p>The FoxTech post is valuable because it pushes the conversation beyond headline price. In practice, SMEs should ask:<\/p>\n<p><strong>1. What Cybersecurity controls are included by default?<\/strong><br \/>\nConfirm MFA support, patching, endpoint protection, backup testing, and logging.<\/p>\n<p><strong>2. What are the response and resolution commitments?<\/strong><br \/>\nA vague SLA is usually a warning sign.<\/p>\n<p><strong>3. Can the provider support Cyber Essentials requirements?<\/strong><br \/>\nUse <strong><a href=\"https:\/\/www.ncsc.gov.uk\/cyberessentials\/overview\" target=\"_blank\" rel=\"noopener\">Cyber Essentials<\/a> <\/strong>as a practical benchmark for basic controls.<\/p>\n<p><strong>4. What is excluded from the monthly fee?<\/strong><br \/>\nAsk for a plain-English breakdown.<\/p>\n<p><strong>5. How do they handle incidents and escalations?<\/strong><br \/>\nIf there is no clear process, assume confusion during a live event.<\/p>\n<p>The <strong>UK Government\u2019s Cyber Security Breaches Survey 2025<\/strong> found that <strong>43% of businesses<\/strong> identified a breach or attack in the last 12 months. For SMEs using outsourced IT, provider quality is not a procurement detail; it is a resilience issue.<\/p>\n<p><strong>What is the main takeaway?<\/strong><\/p>\n<p>FoxTech Cyber deserves credit for surfacing a message that many SMEs need to hear. Buying on price alone can weaken service quality, increase cyber risk, and create costs that only become visible during disruption. A good MSP is not just a supplier; it is a control point in your Cybersecurity posture.<\/p>\n<p>Before renewing or signing an MSP contract, review what security controls, response commitments, and recovery services are truly included; not just what the headline price suggests.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-ecea973 e-con-full e-flex e-con e-parent\" data-id=\"ecea973\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ff21e11 e-con-full e-flex e-con e-child\" data-id=\"ff21e11\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-812c551 elementor-widget elementor-widget-image\" data-id=\"812c551\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"225\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg\" class=\"attachment-medium size-medium wp-image-5079\" alt=\"Image Credit: IfOnlyCommunications | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-1024x768.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-768x576.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-df4f174 e-con-full e-flex e-con e-child\" data-id=\"df4f174\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d41dfa9 elementor-widget elementor-widget-wp-widget-text\" data-id=\"d41dfa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>For further guidance, Cybersecurity Best Practice Advice to help keep your SME Cybersafe<\/strong> head over to <strong><a href=\"https:\/\/cyberinsights.iainfraser.net\" target=\"_blank\" rel=\"noopener\">SMECyber<\/a><\/strong>\u00a0 or Join <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\"><strong>SMECyber<\/strong><\/a> Free Now! &amp; Access my <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/forum\/sign-up\/\" target=\"_blank\" rel=\"noopener\"><strong>SME Cyber Forum<\/strong><\/a> &#8211; Read, Learn, Engage, Share &#8230;<\/p>\n<p>The Latest <strong>SME<\/strong> Cybersecurity News, Threat Intelligence &amp; Analysis, Timely Scam Alerts, Best-practice Compliance, Mitigation &amp; Free to use Resources specifically curated for UK Based <strong>SMEs<\/strong> in a Single Weekly Email direct to your Inbox or Smart Device together with Unrestricted Free Access to our entire <strong>SME<\/strong> Cyber Knowledge &amp; Tutorial Library. <span style=\"font-style: italic\">#SMECyberInsights #SMECyberSecurity #SMECyberAttack #SMECyberAwareness\u00a0 #Compliance #DDoS #Fraud #Ransomware #ScamAlert #SME #SmallBusiness #SmallBusinessOwner #SMEThreatIntel <\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ec89fd2 e-flex e-con-boxed e-con e-parent\" data-id=\"ec89fd2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df88521 elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"df88521\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-AI--768x432.jpg\" alt=\"CI_Feature AI\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Attack-Mitigation-10-768x432.jpg\" alt=\"CI_Feature Attack Mitigation (10)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Identity-Theft-4-768x432.jpg\" alt=\"CI_Feature Identity Theft (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Cloud-Security-3-768x432.jpg\" alt=\"CI_Feature Cloud Security (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Communications-2-768x432.jpg\" alt=\"CI_Feature Communications (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Cyber-Compliance-8-768x432.jpg\" alt=\"CI_Feature Cyber Compliance (8)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Cyber-Insurance-7-768x432.jpg\" alt=\"CI_Feature Cyber Insurance (7)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Copy-of-CI_Feature-Scam-Protection-1-768x432.jpg\" alt=\"Data Recovery: Protecting Business Continuity in a High-Risk Cyber Landscape \u2013 Cyber KPI\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-DDoS-4-768x432.jpg\" alt=\"CI_Feature DDoS (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Email-Security-3-768x432.jpg\" alt=\"CI_Feature Email Security (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-MSPs-6-768x432.jpg\" alt=\"CI_Feature MSPs (6)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"12 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Pen-Testing-768x432.jpg\" alt=\"CI_Feature Pen Testing\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"13 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Phishing-5-768x432.jpg\" alt=\"CI_Feature Phishing (5)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"14 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Ransomware-7-768x432.jpg\" alt=\"CI_Feature Ransomware (7)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"15 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-SaaS-4-768x432.jpg\" alt=\"CI_Feature SaaS (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"16 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Scam-Protection-3-768x432.jpg\" alt=\"CI_Feature Scam Protection (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"17 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Smart-Security-4-768x432.jpg\" alt=\"CI_Feature Smart Security (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"18 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Cyber-Training-4-768x432.jpg\" alt=\"CI_Feature Cyber Training (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"19 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-The-VPN-3-768x432.jpg\" alt=\"CI_Feature The VPN (3)\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: PCH Vector via Magnific Image Credit: IfOnlyCommunications<\/p>\n","protected":false},"author":1,"featured_media":28327,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[645,14],"tags":[889],"ppma_author":[505],"class_list":["post-28326","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mssp","category-cyberinsights","tag-selectingyourmsp"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP.jpg",1379,919,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP-300x200.jpg",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP-768x512.jpg",640,427,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP-1024x682.jpg",640,426,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP.jpg",1379,919,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP.jpg",1379,919,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP-1024x682.jpg",1024,682,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/05\/MSP-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/mssp\/\" rel=\"category tag\">MSSP<\/a> <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" rel=\"category tag\">SMECYBERIINSIGHTS<\/a>","tag_info":"SMECYBERIINSIGHTS","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/28326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=28326"}],"version-history":[{"count":7,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/28326\/revisions"}],"predecessor-version":[{"id":28397,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/28326\/revisions\/28397"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/28327"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=28326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=28326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=28326"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=28326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}