{"id":3942,"date":"2024-02-21T07:00:00","date_gmt":"2024-02-21T06:00:00","guid":{"rendered":"https:\/\/cyberinsights.argusgpi.com\/?p=3942"},"modified":"2024-03-14T16:39:43","modified_gmt":"2024-03-14T15:39:43","slug":"daily-cyber-insights-for-210224","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/02\/21\/daily-cyber-insights-for-210224\/","title":{"rendered":"DAILY CYBER INSIGHTS: The Latest SME Cybersecurity News &#038; Intel for Wednesday, 21 February 2024"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3942\" class=\"elementor elementor-3942\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27dd0cf7 e-flex e-con-boxed e-con e-parent\" data-id=\"27dd0cf7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-79722883 e-con-full e-flex e-con e-child\" data-id=\"79722883\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-273317dd elementor-widget elementor-widget-image\" data-id=\"273317dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/pixabay.com\/users\/viarami-13458823\/?utm_source=link-attribution&#038;utm_medium=referral&#038;utm_campaign=image&#038;utm_content=8509836\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/fraud-8509836_1280-1-300x200.jpg\" class=\"attachment-medium size-medium wp-image-3951\" alt=\"Image Credit: Markus Winkler\/Pixabay | Cybersecurity Journalist, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/fraud-8509836_1280-1-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/fraud-8509836_1280-1-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/fraud-8509836_1280-1-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/fraud-8509836_1280-1.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Markus Winkler\/Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-666891bc e-con-full e-flex e-con e-child\" data-id=\"666891bc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-49556d14 elementor-widget elementor-widget-wp-widget-text\" data-id=\"49556d14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Wednesday, 21 February 2024<\/p>\n<p><strong>DAILY CYBER INSIGHTS:<br \/>\nThe Latest SME Cybersecurity News &amp; Analysis for Wednesday, 21 February 2024<\/strong><br \/>\nWritten &amp; Curated By\u00a0<a href=\"https:\/\/www.google.com\/search?q=cybersecurity+journalist&amp;oq=Cybersec&amp;gs_lcrp=EgZjaHJvbWUqCQgAEEUYOxiABDIJCAAQRRg7GIAEMgYIARBFGDsyBwgCEAAYgAQyBggDEEUYQDIGCAQQRRg5MgcIBRAAGIAEMgcIBhAAGIAEMgcIBxAAGIAE0gEJMzc1MmowajE1qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser \u2013 SME Cybersecurity Journalist<\/a><br \/>\n<a href=\"https:\/\/www.iainfraser.net\/\" target=\"_blank\" rel=\"noopener\">IainFRASER.net\/CYBERInsights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=daily+cyber+insights&amp;oq=daily+cyber&amp;gs_lcrp=EgZjaHJvbWUqCAgCEEUYJxg7MgkIABBFGDkYgAQyBggBEEUYOzIICAIQRRgnGDsyBggDECMYJzIMCAQQABgUGIcCGIAEMgwIBRAAGBQYhwIYgAQyBwgGEAAYgAQyBwgHEAAYgAQyBwgIEAAYgAQyBwgJEAAYgATSAQk2NjUxajBqMTWoAgCwAgA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Daily Cyber Insights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=DAILY+CYBER+INSIGHTS%3A+The+Latest+SME+Cybersecurity+News+%26+Intel+for+Wednesday%2C+21+February+2024&amp;sca_esv=47a159505e5d460b&amp;sxsrf=ACQVn0-aVXOQGEfg5_qCDTeu9pTkQdIsrQ%3A1709652377691&amp;ei=mTnnZdewKcuD9u8PwNGJyA0&amp;ved=0ahUKEwiX4aS1t92EAxXLgf0HHcBoAtkQ4dUDCBA&amp;uact=5&amp;oq=DAILY+CYBER+INSIGHTS%3A+The+Latest+SME+Cybersecurity+News+%26+Intel+for+Wednesday%2C+21+February+2024&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiX0RBSUxZIENZQkVSIElOU0lHSFRTOiBUaGUgTGF0ZXN0IFNNRSBDeWJlcnNlY3VyaXR5IE5ld3MgJiBJbnRlbCBmb3IgV2VkbmVzZGF5LCAyMSBGZWJydWFyeSAyMDI0MgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnSIgIUABY3ARwAXgAkAEAmAEAoAEAqgEAuAEDyAEA-AEB-AECmAIBoAIXqAIKmAMXkgcBMaAHAA&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 210224 at 09:55 CET<\/a><br \/>\n<em>#CYBERInsights\u00a0 #CybersecurityJournalist\u00a0 #SMECybersecurity<\/em><\/p>\n<p><strong>Good Morning from Gibraltar | Todays CYBERInsights &#8211;\u00a0<\/strong><\/p>\n<p><strong> 1. <\/strong><strong>FRAUD:<\/strong> <a href=\"https:\/\/www.experianplc.com\/\" target=\"_blank\" rel=\"noopener\">Experian<\/a> releases its <a href=\"https:\/\/www.experianplc.com\/newsroom\/press-releases\/2024\/experian-releases-2024-future-of-fraud-forecast-\" target=\"_blank\" rel=\"noopener\">Future of Fraud Forecast for 2024<\/a>. According to the report close to 70% of businesses reported that Fraud in their business had increased in recent years. The latest report also identifies five emerging Fraud risks for the year ahead. Scammers are also presenting increasingly sophisticated technology including<strong> Generative AI<\/strong> to dupe their targets. <strong><a href=\"https:\/\/www.experianplc.com\/newsroom\/press-releases\/2024\/experian-releases-2024-future-of-fraud-forecast-\" target=\"_blank\" rel=\"noopener\">Learn More \/&#8230;<\/a><\/strong><\/p>\n<p><strong>2. OUTSOURCING:<\/strong> IT Service Company <strong><a href=\"https:\/\/www.amazingsupport.co.uk\/\" target=\"_blank\" rel=\"noopener\">Amazing Support<\/a><\/strong> has published a <a href=\"https:\/\/www.amazingsupport.co.uk\/blog\/comprehensive-guide-to-it-helpdesk-outsourcing\/\" target=\"_blank\" rel=\"noopener\">Comprehensive Guide to IT Helpdesk Outsourcing<\/a>. The Guide addresses the strategic decision making process that Business owners must adopt when deciding whether to maintain\/retain in-house &#8220;Helpdesk&#8221; Support or to Outsource completely &#8230; <strong><a href=\"https:\/\/www.amazingsupport.co.uk\/blog\/comprehensive-guide-to-it-helpdesk-outsourcing\/\" target=\"_blank\" rel=\"noopener\">Learn More \/&#8230;<\/a><\/strong><\/p>\n<p><strong>3. UNDERSTANDING RANSOMWARE: <\/strong><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-ransomware\/\" target=\"_blank\" rel=\"noopener\"><b>Ransomware <\/b><\/a>is a complex form of malware that utilizes encryption techniques, often employing asymmetric encryption, to render a victim\u2019s data inaccessible. This encryption process locks the victim out of their own system or files, demanding a ransom to restore access &#8211; e.g. the<em>\u00a0<strong>CryptoLocker<\/strong><\/em> <strong>Ransomware<\/strong> variant. <strong><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-ransomware\/\" target=\"_blank\" rel=\"noopener\">Learn More \/\u2026<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-426c90fe elementor-widget elementor-widget-image\" data-id=\"426c90fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"mailto:regeister@iainfraser.net\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"212\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/InnerSanctum_2024_2-8-1024x339.png\" class=\"attachment-large size-large wp-image-3762\" alt=\"Cybersecurity Journalist, Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/InnerSanctum_2024_2-8-1024x339.png 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/InnerSanctum_2024_2-8-300x99.png 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/InnerSanctum_2024_2-8-768x254.png 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/InnerSanctum_2024_2-8.png 1139w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-77b96f7f e-flex e-con-boxed e-con e-parent\" data-id=\"77b96f7f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2c03ac6c e-con-full e-flex e-con e-child\" data-id=\"2c03ac6c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-192d2444 elementor-widget elementor-widget-image\" data-id=\"192d2444\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"426\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-1024x682.jpg\" class=\"attachment-large size-large wp-image-3960\" alt=\"Cybersecurity Journalist, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-726968e3 e-con-full e-flex e-con e-child\" data-id=\"726968e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7978f4bf elementor-widget elementor-widget-wp-widget-text\" data-id=\"7978f4bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>&nbsp;<\/p>\n<p><strong>INVESTIGATION: THE SMALL BUSINESS LOAN SCAM<\/strong><\/p>\n<p>This model of the Small Business Loan Scam started during the Covid Pandemic and true to form the Scammers were offering &#8220;Guaranteed&#8221; <strong>Small Business<\/strong> Loans. Well, I have to report that the Business Loan <strong>Scam<\/strong> is rearing its ugly head. <a href=\"cyberinsights@iainfraser.net\">Register Free to read my full investigation and report in to this scourge on struggling SMEs\/Small Businesses.<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4e2c03f5 e-flex e-con-boxed e-con e-parent\" data-id=\"4e2c03f5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5d8ff08d e-con-full e-flex e-con e-child\" data-id=\"5d8ff08d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51b826cb elementor-widget elementor-widget-image\" data-id=\"51b826cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"426\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-1024x682.jpg\" class=\"attachment-large size-large wp-image-3368\" alt=\"Image Credit: Florian Pircher\/Pixabay | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d3d36ef e-con-full e-flex e-con e-child\" data-id=\"5d3d36ef\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-492a21ca elementor-widget elementor-widget-wp-widget-text\" data-id=\"492a21ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>&nbsp;<\/p>\n<p><strong>CYBERSECURITY EVENTS &#8211; EUROPE | LIVE &amp; VIRTUAL<\/strong><\/p>\n<p><strong>29\/02\/2024 &#8211;<\/strong> <strong>THE FRAUD CONFERENCE<\/strong> | London &#8211;\u00a0 <a href=\"https:\/\/www.thefraudconference.com\/\" target=\"_blank\" rel=\"noopener\">Learn More \/&#8230;\u00a0<\/a><br \/>\n<strong>31\/05\/2024 &#8211; SANS\u00a0 RANSOMWARE SUMMIT 2024 |\u00a0<\/strong> Online &#8211; <a href=\"https:\/\/www.sans.org\/cyber-security-training-events\/ransomware-summit-2024\/\" target=\"_blank\" rel=\"noopener\">Learn More \/&#8230;<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2427b516 e-flex e-con-boxed e-con e-parent\" data-id=\"2427b516\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7061b20c e-con-full e-flex e-con e-child\" data-id=\"7061b20c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6bb3a227 elementor-widget elementor-widget-image\" data-id=\"6bb3a227\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"403\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/public-relations-8198201_1280-1024x644.jpg\" class=\"attachment-large size-large wp-image-2710\" alt=\"Cybersecurity Journalist, Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/public-relations-8198201_1280-1024x644.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/public-relations-8198201_1280-300x189.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/public-relations-8198201_1280-768x483.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/public-relations-8198201_1280-540x340.jpg 540w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/public-relations-8198201_1280.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b23ba0e e-con-full e-flex e-con e-child\" data-id=\"6b23ba0e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d7dcf5f elementor-widget elementor-widget-wp-widget-text\" data-id=\"5d7dcf5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>&nbsp;<\/p>\n<p><strong>CYBER VOICE\/PR WIRE<\/strong><\/p>\n<p><strong>GARTNER: <\/strong>Roll out the AI Opportunity Radar to your executive team. <a style=\"font-weight: bold\" href=\"https:\/\/www.gartner.com\/en\/information-technology\/insights\/it-symposium-keynote?utm_campaign=RM_GB_2024_ITAI_C_BB3_SYMTAKEAWAYSAI_RS&amp;utm_medium=email&amp;utm_source=Eloqua&amp;cm_mmc=Eloqua-_-Email-_-LM_RM_GB_2024_ITAI_C_BB3_SYMTAKEAWAYSAI_RS-_-0000\" target=\"_blank\" rel=\"noopener\">Learn More \/\u2026<\/a><br \/>\n<strong>VEEAM:<\/strong> Cybersecurity Best Practices and Hybrid Cloud Resilience. <strong><a href=\"https:\/\/go.veeam.com\/wp-cyber-resilient-data-recovery-strategy?st=drip&amp;utm_source=drip&amp;utm_medium=email&amp;utm_campaign=pln_coreprod&amp;ccode=pln_coreprod&amp;mkt_tok=ODcwLUxCRy0zMTIAAAGQv-zTxO0iIgjbzzOfUcympJDeB8x1qzL00WKKGi9els_NcnZcFOcB3Xawvo3c5zxPbYiei7Dwl1KisM3btM1TNqEUGDsOQGywOwouyuxMWUKMVvUSz1kj\" target=\"_blank\" rel=\"noopener\">Learn More \/&#8230;<\/a><\/strong><br \/>\n<strong>SME RESOURCES:<\/strong> Why Choose Datadog? Full-Stack Observability. <a href=\"https:\/\/www.datadoghq.com\/dg\/monitor\/personalized-demo-request\/?utm_source=Nurture&amp;utm_medium=Nurture&amp;utm_campaign=Nurture-202305NewContentDownloads3d_ab&amp;mkt_tok=ODc1LVVWWS02ODUAAAGQ0U2SyBsbJU8A6GvvW9BOMiJLhYbS2tifEPJgWqzsFYWM8N0r11HCntSYKb3IAEDuqWpYW22nWKtEumbrJ-8gZA-0g3u2BVXd5gKG6DjByAQ2jefTZM-5o4fu0A\" target=\"_blank\" rel=\"noopener\"><strong>Learn More \/&#8230;<\/strong><\/a><br \/>\n<strong>SPLUNK:<\/strong> Best practices for practical observability &#8211; must-read report. <a href=\"https:\/\/www.splunk.com\/en_us\/form\/a-cios-guide-to-observability.html?fbclid=IwAR2p2iMbfxcyQ7spXmbpSBeJe6g8I46TTCxu9udSeJsxOjAe2wjqhP_mrKo\" target=\"_blank\" rel=\"noopener\"><strong>Learn More \/&#8230;<\/strong><\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: Markus Winkler\/Pixabay<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"","footnotes":""},"categories":[14],"tags":[419],"ppma_author":[415],"class_list":["post-3942","post","type-post","status-publish","format-standard","hentry","category-cyberinsights","tag-cyberinsights"],"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":"","covernews-featured":"","covernews-medium":""},"author_info":{"display_name":"Cybersecurity Journalist - Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" rel=\"category tag\">SMECYBERIINSIGHTS<\/a>","tag_info":"SMECYBERIINSIGHTS","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/3942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=3942"}],"version-history":[{"count":0,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/3942\/revisions"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=3942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=3942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=3942"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=3942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}