{"id":3784,"date":"2024-02-14T12:45:45","date_gmt":"2024-02-14T11:45:45","guid":{"rendered":"https:\/\/cyberinsights.argusgpi.com\/?p=3784"},"modified":"2025-02-20T15:23:50","modified_gmt":"2025-02-20T14:23:50","slug":"phishing-the-sextortion-scam","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/02\/14\/phishing-the-sextortion-scam\/","title":{"rendered":"CYBER INSIGHTS: PHISHING\/ SEXTORION &#8211; The SME Threat Increases!"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3784\" class=\"elementor elementor-3784\">\n\t\t\t\t<div class=\"elementor-element elementor-element-44931f06 e-flex e-con-boxed e-con e-parent\" data-id=\"44931f06\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-341b7ac1 e-con-full e-flex e-con e-child\" data-id=\"341b7ac1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-171c0779 elementor-widget elementor-widget-image\" data-id=\"171c0779\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"199\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/hacker-3480124_1280-300x199.jpg\" class=\"attachment-medium size-medium wp-image-3776\" alt=\"Cybersecurity Journalist, Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/hacker-3480124_1280-300x199.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/hacker-3480124_1280-1024x678.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/hacker-3480124_1280-768x508.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/hacker-3480124_1280.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d86ba96 e-con-full e-flex e-con e-child\" data-id=\"5d86ba96\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c62ff2e elementor-widget elementor-widget-wp-widget-text\" data-id=\"5c62ff2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Wednesday, 14 February 2024<\/p>\n<p><b><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-phishing\/\" target=\"_blank\" rel=\"noopener\">PHISHING<\/a>\/SEXTORION: The Take-over Scam &#8211; Surely this doesn&#8217;t happen to Businesses? WRONG!<\/b><br \/>\nWritten &amp; Curated By\u00a0<a href=\"https:\/\/www.google.com\/search?q=cybersecurity+journalist&amp;oq=Cybersec&amp;gs_lcrp=EgZjaHJvbWUqCQgAEEUYOxiABDIJCAAQRRg7GIAEMgYIARBFGDsyBwgCEAAYgAQyBggDEEUYQDIGCAQQRRg5MgcIBRAAGIAEMgcIBhAAGIAEMgcIBxAAGIAE0gEJMzc1MmowajE1qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser \u2013 SME Cybersecurity Journalist<\/a><br \/>\n<a href=\"https:\/\/www.iainfraser.net\/\" target=\"_blank\" rel=\"noopener\">IainFRASER.net\/CYBERInsights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=daily+cyber+insights&amp;oq=daily+cyber&amp;gs_lcrp=EgZjaHJvbWUqCAgCEEUYJxg7MgkIABBFGDkYgAQyBggBEEUYOzIICAIQRRgnGDsyBggDECMYJzIMCAQQABgUGIcCGIAEMgwIBRAAGBQYhwIYgAQyBwgGEAAYgAQyBwgHEAAYgAQyBwgIEAAYgAQyBwgJEAAYgATSAQk2NjUxajBqMTWoAgCwAgA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Daily Cyber Insights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=CYBER+INSIGHTS%3A+PHISHING%2F+SEXTORION+-+The+SME+Threat+Increases%21&amp;sca_esv=47a159505e5d460b&amp;sxsrf=ACQVn0-w6FvkMMFPY057Tzved75u14wxMg%3A1709650488037&amp;ei=ODLnZcLkAa6gkdUP7eeEqA4&amp;ved=0ahUKEwjC4J2wsN2EAxUuUKQEHe0zAeUQ4dUDCBA&amp;uact=5&amp;oq=CYBER+INSIGHTS%3A+PHISHING%2F+SEXTORION+-+The+SME+Threat+Increases%21&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiP0NZQkVSIElOU0lHSFRTOiBQSElTSElORy8gU0VYVE9SSU9OIC0gVGhlIFNNRSBUaHJlYXQgSW5jcmVhc2VzIUj3B1AAWN0EcAF4AJABAJgB9AGgAfQBqgEDMi0xuAEDyAEA-AEB-AECmAIBoAIhqAIPwgIHECMY6gIYJ8ICBxAuGOoCGCfCAhMQLhiABBiKBRhDGOoCGLQC2AEBwgITEAAYgAQYigUYQxjqAhi0AtgBAZgDIboGBggBEAEYAZIHATGgB_kC&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 140224 at 11:10 CET<\/a><br \/>\n<em>#CYBERInsights\u00a0 #CybersecurityJournalist\u00a0 #SMECybersecurity #Phishing<\/em><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-64d84a3e e-flex e-con-boxed e-con e-parent\" data-id=\"64d84a3e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ccb9542 e-con-full e-flex e-con e-child\" data-id=\"ccb9542\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2bce9aa2 elementor-widget elementor-widget-html\" data-id=\"2bce9aa2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=1321193.54&amp;bids=1321193.54&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"Microsoft365 for Business\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&offerid=1321193.54&bids=1321193.54&subid=0&type=4&gridnum=19\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e4de88b e-con-full e-flex e-con e-child\" data-id=\"3e4de88b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51b20d8 elementor-widget elementor-widget-wp-widget-text\" data-id=\"51b20d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-phishing\/\" target=\"_blank\" rel=\"noopener\">PHISHING<\/a>: The Sextortion scam<\/strong> as I like to call it, has raised its ugly head again with a refined Scam for 2024. I first wrote about this nearly six years ago after I received a flurry of emails with the standard copy &amp; paste text. Most <strong>Small Businesses\/SMEs<\/strong> ignore these threats as not being relevant to business but they would be wrong!<\/p>\n<p><em><strong>There are many surveys on this subject; but the rule is that over 70% of all internet users view Porn &#8211; and the the other 30% Lie!<\/strong><\/em><\/p>\n<p><a href=\"https:\/\/www.ncsc.gov.uk\/\" target=\"_blank\" rel=\"noopener\"><strong>The NCSC<\/strong> <\/a>(National Cyber Security Centre) defines Sextortion scams as <a href=\"https:\/\/www.ncsc.gov.uk\/guidance\/sextortion-scams-how-to-protect-yourself\" target=\"_blank\" rel=\"noopener\">&#8220;Sextortion scams are a type of phishing attack whereby people are coerced to pay a BitCoin ransom because they have been threatened with sharing video of themselves visiting adult websites. These scams are made to appear all the more credible because they provide seemingly plausible technical details about how this was achieved, and the phish can sometimes also include the individual\u2019s password&#8221;<\/a> Learn More \/&#8230;<\/p>\n<p><strong>How does the Sextortion Scam work?<\/strong><\/p>\n<p>Very simple really &#8211; An email arrives in your inbox, but from your email address. This of course garners immediate concern. The email usually says something like <em>&#8220;Hello!<\/em><br \/>\n<em>Have you recently noticed that I have e-mailed you from your account?<\/em><br \/>\n<em>Yes, this simply means that I have total access to your device. For the last couple of months, I have been watching you. Still wondering how is that possible? Well, you have been infected with malware originating from an adult website that you visited. You may not be familiar with this, but I will try explaining it to you.&#8221;<\/em><\/p>\n<p>These Emails are given added credence by the sender ID coming from one of your email addresses. They haven&#8217;t hijacked your account or computer but set up the sender ID as yours &#8211; Simple!<strong><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\"> Learn More \/&#8230; Join my Inner Sanctum for my Daily Cyber insights &#8211; Practical Daily Advice for your Small Business\/SME<\/a><\/strong><\/p>\n<p><em>#CYBERInsights\u00a0 #CybersecurityJournalist\u00a0 #SMECybersecurity #Phishing #Sextortion\u00a0<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c5a790a elementor-widget elementor-widget-image\" data-id=\"1c5a790a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"212\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/InnerSanctum_2024_2-8-1024x339.png\" class=\"attachment-large size-large wp-image-3762\" alt=\"Cybersecurity Journalist, Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/InnerSanctum_2024_2-8-1024x339.png 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/InnerSanctum_2024_2-8-300x99.png 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/InnerSanctum_2024_2-8-768x254.png 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/InnerSanctum_2024_2-8.png 1139w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8d9494c e-flex e-con-boxed e-con e-parent\" data-id=\"8d9494c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1516d137 e-con-full e-flex e-con e-child\" data-id=\"1516d137\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ff26a18 elementor-widget elementor-widget-image\" data-id=\"6ff26a18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"427\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-8509837_1280-1024x683.jpg\" class=\"attachment-large size-large wp-image-3369\" alt=\"Image Credit: Markus Winkler\/Pixabay | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-8509837_1280-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-8509837_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-8509837_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-8509837_1280.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2c3c5212 e-con-full e-flex e-con e-child\" data-id=\"2c3c5212\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-38cd509 elementor-widget elementor-widget-wp-widget-text\" data-id=\"38cd509\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>&nbsp;<\/p>\n<p><strong>INVESTIGATION: THE SMALL BUSINESS LOAN SCAM<\/strong><\/p>\n<p>This model of the Small Business Loan Scam started during the Covid Pandemic and true to form the Scammers were offering &#8220;Guaranteed&#8221; <strong>Small Business<\/strong> Loans. Well, I have to report that the Business Loan <strong>Scam<\/strong> is rearing its ugly head. <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">Register Free to read my full investigation and report in to this scourge on struggling SMEs\/Small Businesses.<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-63f3746f e-flex e-con-boxed e-con e-parent\" data-id=\"63f3746f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-36fa16fc e-con-full e-flex e-con e-child\" data-id=\"36fa16fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-20aca309 elementor-widget elementor-widget-image\" data-id=\"20aca309\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"426\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-1024x682.jpg\" class=\"attachment-large size-large wp-image-3368\" alt=\"Image Credit: Florian Pircher\/Pixabay | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6c09e778 e-con-full e-flex e-con e-child\" data-id=\"6c09e778\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56933d37 elementor-widget elementor-widget-wp-widget-text\" data-id=\"56933d37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>&nbsp;<\/p>\n<p><strong>CYBERSECURITY EVENTS &#8211; EUROPE | LIVE &amp; VIRTUAL<\/strong><\/p>\n<p>29\/02\/2024 LIVE EVENT: <strong>THE FRAUD CONFERENCE<\/strong> | 29 February 2024 | Royal College of Physicians, London. <a href=\"https:\/\/www.thefraudconference.com\/\" target=\"_blank\" rel=\"noopener\">Learn More \/&#8230;\u00a0<\/a><br \/>\n31\/05\/2024 <strong>ONLINE EVENT: SANS INSTITUTE &#8211;<\/strong> Ransomware Summit 2024 | 31 May 2024 | Live Online &#8211; <a href=\"https:\/\/www.sans.org\/cyber-security-training-events\/ransomware-summit-2024\/\" target=\"_blank\" rel=\"noopener\">Learn More \/&#8230;<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-157dcafc e-flex e-con-boxed e-con e-parent\" data-id=\"157dcafc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3bf57932 e-con-full e-flex e-con e-child\" data-id=\"3bf57932\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f6f1f3f elementor-widget elementor-widget-image\" data-id=\"3f6f1f3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"403\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/public-relations-8198201_1280-1024x644.jpg\" class=\"attachment-large size-large wp-image-2710\" alt=\"Cybersecurity Journalist, Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/public-relations-8198201_1280-1024x644.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/public-relations-8198201_1280-300x189.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/public-relations-8198201_1280-768x483.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/public-relations-8198201_1280-540x340.jpg 540w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/public-relations-8198201_1280.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5cfb78c4 e-con-full e-flex e-con e-child\" data-id=\"5cfb78c4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1751c221 elementor-widget elementor-widget-wp-widget-text\" data-id=\"1751c221\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>&nbsp;<\/p>\n<p><strong>CYBER VOICE\/PR WIRE<\/strong><\/p>\n<p><strong>GARTNER: <\/strong>Roll out the AI Opportunity Radar to your executive team. <a style=\"font-weight: bold\" href=\"https:\/\/www.gartner.com\/en\/information-technology\/insights\/it-symposium-keynote?utm_campaign=RM_GB_2024_ITAI_C_BB3_SYMTAKEAWAYSAI_RS&amp;utm_medium=email&amp;utm_source=Eloqua&amp;cm_mmc=Eloqua-_-Email-_-LM_RM_GB_2024_ITAI_C_BB3_SYMTAKEAWAYSAI_RS-_-0000\" target=\"_blank\" rel=\"noopener\">Learn More \/\u2026<\/a><br \/>\n<strong>VEEAM:<\/strong> Cybersecurity Best Practices and Hybrid Cloud Resilience. <strong><a href=\"https:\/\/go.veeam.com\/wp-cyber-resilient-data-recovery-strategy?st=drip&amp;utm_source=drip&amp;utm_medium=email&amp;utm_campaign=pln_coreprod&amp;ccode=pln_coreprod&amp;mkt_tok=ODcwLUxCRy0zMTIAAAGQv-zTxO0iIgjbzzOfUcympJDeB8x1qzL00WKKGi9els_NcnZcFOcB3Xawvo3c5zxPbYiei7Dwl1KisM3btM1TNqEUGDsOQGywOwouyuxMWUKMVvUSz1kj\" target=\"_blank\" rel=\"noopener\">Learn More \/&#8230;<\/a><\/strong><br \/>\n<strong>SME RESOURCES:<\/strong> Why Choose Datadog? Full-Stack Observability. <a href=\"https:\/\/www.datadoghq.com\/dg\/monitor\/personalized-demo-request\/?utm_source=Nurture&amp;utm_medium=Nurture&amp;utm_campaign=Nurture-202305NewContentDownloads3d_ab&amp;mkt_tok=ODc1LVVWWS02ODUAAAGQ0U2SyBsbJU8A6GvvW9BOMiJLhYbS2tifEPJgWqzsFYWM8N0r11HCntSYKb3IAEDuqWpYW22nWKtEumbrJ-8gZA-0g3u2BVXd5gKG6DjByAQ2jefTZM-5o4fu0A\" target=\"_blank\" rel=\"noopener\"><strong>Learn More \/&#8230;<\/strong><\/a><br \/>\n<strong>SPLUNK:<\/strong> Best practices for practical observability &#8211; must-read report. <a href=\"https:\/\/www.splunk.com\/en_us\/form\/a-cios-guide-to-observability.html?fbclid=IwAR2p2iMbfxcyQ7spXmbpSBeJe6g8I46TTCxu9udSeJsxOjAe2wjqhP_mrKo\" target=\"_blank\" rel=\"noopener\"><strong>Learn More \/&#8230;<\/strong><\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[14,604],"tags":[419],"ppma_author":[415],"class_list":["post-3784","post","type-post","status-publish","format-standard","hentry","category-cyberinsights","category-scam","tag-cyberinsights"],"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":"","covernews-featured":"","covernews-medium":""},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" rel=\"category tag\">SMECYBERIINSIGHTS<\/a> <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/scam\/\" rel=\"category tag\">SCAM<\/a>","tag_info":"SCAM","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/3784","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=3784"}],"version-history":[{"count":1,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/3784\/revisions"}],"predecessor-version":[{"id":18728,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/3784\/revisions\/18728"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=3784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=3784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=3784"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=3784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}