{"id":4098,"date":"2024-02-23T07:00:00","date_gmt":"2024-02-23T06:00:00","guid":{"rendered":"https:\/\/cyberinsights.argusgpi.com\/?p=4098"},"modified":"2024-05-09T13:40:10","modified_gmt":"2024-05-09T11:40:10","slug":"daily-cyber-insights-for-230224","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/02\/23\/daily-cyber-insights-for-230224\/","title":{"rendered":"DAILY CYBER INSIGHTS: The Latest SME Cybersecurity News &#038; Intel for Friday, 23 February 2024"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4098\" class=\"elementor elementor-4098\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1bf303fb e-flex e-con-boxed e-con e-parent\" data-id=\"1bf303fb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5607e034 e-con-full e-flex e-con e-child\" data-id=\"5607e034\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-488c0eba elementor-widget elementor-widget-image\" data-id=\"488c0eba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/pixabay.com\/users\/geralt-9301\/?utm_source=link-attribution&#038;utm_medium=referral&#038;utm_campaign=image&#038;utm_content=2956974\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"188\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/finger-2956974_1280-300x188.jpg\" class=\"attachment-medium size-medium wp-image-4118\" alt=\"Image Credit: Gerd Altmann\/Pixabay | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/finger-2956974_1280-300x188.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/finger-2956974_1280-1024x642.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/finger-2956974_1280-768x481.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/finger-2956974_1280-800x500.jpg 800w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/finger-2956974_1280-540x340.jpg 540w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/finger-2956974_1280-400x250.jpg 400w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/finger-2956974_1280.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Gerd Altmann\/Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6d5776a e-con-full e-flex e-con e-child\" data-id=\"6d5776a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-59275fd5 elementor-widget elementor-widget-wp-widget-text\" data-id=\"59275fd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar: Friday, 23 February 2024<\/p>\n<p><strong>CYBER INSIGHTS: The Latest SME Cybersecurity News &amp; Intel\u00a0<\/strong><br \/>\nWritten &amp; Curated By\u00a0<a href=\"https:\/\/www.google.com\/search?q=cybersecurity+journalist&amp;oq=Cybersec&amp;gs_lcrp=EgZjaHJvbWUqCQgAEEUYOxiABDIJCAAQRRg7GIAEMgYIARBFGDsyBwgCEAAYgAQyBggDEEUYQDIGCAQQRRg5MgcIBRAAGIAEMgcIBhAAGIAEMgcIBxAAGIAE0gEJMzc1MmowajE1qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser \u2013 SME Cybersecurity Journalist<\/a><br \/>\n<a href=\"https:\/\/www.iainfraser.net\/\" target=\"_blank\" rel=\"noopener\">IainFRASER.net\/CYBERInsights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=daily+cyber+insights&amp;oq=daily+cyber&amp;gs_lcrp=EgZjaHJvbWUqCAgCEEUYJxg7MgkIABBFGDkYgAQyBggBEEUYOzIICAIQRRgnGDsyBggDECMYJzIMCAQQABgUGIcCGIAEMgwIBRAAGBQYhwIYgAQyBwgGEAAYgAQyBwgHEAAYgAQyBwgIEAAYgAQyBwgJEAAYgATSAQk2NjUxajBqMTWoAgCwAgA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Daily Cyber Insights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=DAILY+CYBER+INSIGHTS%3A+The+Latest+SME+Cybersecurity+News+%26+Intel+for+Friday%2C+23+February+2024&amp;sca_esv=47a159505e5d460b&amp;sxsrf=ACQVn0_CzXuYCCZaEeC_MOvUFZ2d21WcYA%3A1709653002789&amp;ei=CjznZabGL_DO7_UPw_CCiAI&amp;ved=0ahUKEwim863fud2EAxVw57sIHUO4ACEQ4dUDCBA&amp;uact=5&amp;oq=DAILY+CYBER+INSIGHTS%3A+The+Latest+SME+Cybersecurity+News+%26+Intel+for+Friday%2C+23+February+2024&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiXERBSUxZIENZQkVSIElOU0lHSFRTOiBUaGUgTGF0ZXN0IFNNRSBDeWJlcnNlY3VyaXR5IE5ld3MgJiBJbnRlbCBmb3IgRnJpZGF5LCAyMyBGZWJydWFyeSAyMDI0MgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnSPMLUABYlQVwAXgAkAEAmAEAoAEAqgEAuAEDyAEA-AEB-AECmAIBoAIaqAIKmAMakgcBMaAHAA&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 230224 at 09:55 CET<\/a><br \/>\n<em>#CYBERInsights\u00a0 #CybersecurityJournalist\u00a0 #SMECybersecurity<\/em><\/p>\n<p><strong>1. CYBER RISK: EMAIL SECURITY &#8211;<\/strong> New Intelligence on Phishing, Impersonation &amp; Ransomware reveals <em>97% of Organizations have<br \/>\nsuffered Email-Based Phishing Attacks<\/em> according to a new report by <strong><a href=\"https:\/\/www.mimecast.com\/\" target=\"_blank\" rel=\"noopener\">MIMECAST<\/a><\/strong>. The Q3 Global Threat Intelligence Report distills insights<br \/>\nfrom intelligence gathered throughout the third quarter of 2023 &#8230; <a href=\"https:\/\/www.mimecast.com\/resources\/ebooks\/global-threat-intelligence-report-july-september-2023\/?utm_source=marketo&amp;utm_medium=email&amp;utm_campaign=GL-FY24-Q4-NT-TOFU-CG-EM3-Report-Q3-Global-Threat-Intelligence&amp;mkt_tok=MzM2LVRBVS01OTQAAAGRZbz-Yp3s1W_l3fGMaD9PzYJqvy1iAWoZ-cAFWkao1mwlOi_WIVMmpwLmjfzgkZCHPVY_qk5azawYS4WJtVWl9H1y5_TYKF6xhqec__OIiYZTdXc\" target=\"_blank\" rel=\"noopener\"><strong><br \/>\nLearn More \/&#8230;<\/strong><\/a><\/p>\n<p><strong>2. <\/strong><strong>CYBER SURVEY\/GARTNER:<\/strong> Adopting a franchise framework to<br \/>\nimprove digital delivery. Gartner has published <a href=\"https:\/\/www.gartner.com\/en\/information-technology\/insights\/cio-agenda?utm_campaign=RM_GB_2024_ITCIO_C_BB3_24CIOAGENDA_EB&amp;utm_medium=email&amp;utm_source=Eloqua&amp;cm_mmc=Eloqua-_-Email-_-LM_RM_GB_2024_ITCIO_C_BB3_24CIOAGENDA_EB-_-0000\" target=\"_blank\" rel=\"noopener\"><strong>CIO AGENDA 2024<\/strong><\/a> its annual survey &#8211; Informed by insights from more than 2,400 CIOs and IT executives, the <strong><a href=\"https:\/\/www.gartner.com\/en\/information-technology\/insights\/cio-agenda?utm_campaign=RM_GB_2024_ITCIO_C_BB3_24CIOAGENDA_EB&amp;utm_medium=email&amp;utm_source=Eloqua&amp;cm_mmc=Eloqua-_-Email-_-LM_RM_GB_2024_ITCIO_C_BB3_24CIOAGENDA_EB-_-0000\" target=\"_blank\" rel=\"noopener\">2024 CIO Agenda<\/a><\/strong> shows <strong>CIOs<\/strong> are being tasked with an increased demand in delivering business value &amp; initiatives without additional resources &#8230; <a href=\"https:\/\/www.gartner.com\/en\/information-technology\/insights\/cio-agenda?utm_campaign=RM_GB_2024_ITCIO_C_BB3_24CIOAGENDA_EB&amp;utm_medium=email&amp;utm_source=Eloqua&amp;cm_mmc=Eloqua-_-Email-_-LM_RM_GB_2024_ITCIO_C_BB3_24CIOAGENDA_EB-_-0000\" target=\"_blank\" rel=\"noopener\"><strong>Learn More \/&#8230;<\/strong><\/a><\/p>\n<p><strong>3.<\/strong> <strong>FRAUD:<\/strong> <a href=\"https:\/\/www.experianplc.com\/\" target=\"_blank\" rel=\"noopener\">Experian<\/a> releases its <a href=\"https:\/\/www.experianplc.com\/newsroom\/press-releases\/2024\/experian-releases-2024-future-of-fraud-forecast-\" target=\"_blank\" rel=\"noopener\">Future of Fraud Forecast for 2024<\/a>. According to the report close to 70% of businesses reported that Fraud<br \/>\nin their business had increased in recent years. The latest report also identifies five emerging Fraud risks for the year ahead. Scammers are<br \/>\nalso presenting increasingly sophisticated technology including<strong><br \/>\nGenerative AI<\/strong> to dupe their targets &#8230; <strong><a href=\"https:\/\/www.experianplc.com\/newsroom\/press-releases\/2024\/experian-releases-2024-future-of-fraud-forecast-\" target=\"_blank\" rel=\"noopener\">Learn More \/&#8230;<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a2a9c83 e-flex e-con-boxed e-con e-parent\" data-id=\"1a2a9c83\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4b2b16e7 e-con-full e-flex e-con e-child\" data-id=\"4b2b16e7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7939a320 elementor-widget elementor-widget-image\" data-id=\"7939a320\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"426\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-1024x682.jpg\" class=\"attachment-large size-large wp-image-3960\" alt=\"Cybersecurity Journalist, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-57cf49d6 e-con-full e-flex e-con e-child\" data-id=\"57cf49d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5562c67d elementor-widget elementor-widget-wp-widget-text\" data-id=\"5562c67d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>INVESTIGATION: THE SMALL BUSINESS LOAN SCAM<\/strong><\/p>\n<p>This model of the Small Business Loan Scam started during the Covid Pandemic and true to form the Scammers were offering &#8220;Guaranteed&#8221; <strong>Small Business<\/strong> Loans. Well, I have to report that the Business Loan <strong>Scam<\/strong> is rearing its ugly head. <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">Register Free to read my full investigation and report in to this scourge on struggling SMEs\/Small Businesses.<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-57485cf6 e-flex e-con-boxed e-con e-parent\" data-id=\"57485cf6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f7de100 e-con-full e-flex e-con e-child\" data-id=\"f7de100\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6635df3b elementor-widget elementor-widget-image\" data-id=\"6635df3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"426\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/book-2592057_1280-1024x682.jpg\" class=\"attachment-large size-large wp-image-4106\" alt=\"Cybersecurity Journalist,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/book-2592057_1280-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/book-2592057_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/book-2592057_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/book-2592057_1280.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-182fd15e e-con-full e-flex e-con e-child\" data-id=\"182fd15e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27a7044b elementor-widget elementor-widget-wp-widget-text\" data-id=\"27a7044b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>CYBERSECURITY EVENTS &#8211; EUROPE | LIVE &amp; VIRTUAL<\/strong><\/p>\n<p><strong>29 February 2024 &#8211;<\/strong> <strong>THE FRAUD CONFERENCE<\/strong> | London &#8211;\u00a0 <a href=\"https:\/\/www.thefraudconference.com\/\" target=\"_blank\" rel=\"noopener\">Learn More \/&#8230;\u00a0\u00a0<\/a><br \/>\n<strong>6\/7 March 2024 &#8211; CLOUD &amp; CYBER SECURITY EXPO<\/strong> | London &#8211; <a href=\"https:\/\/rfg.circdata.com\/publish\/CCSEL24\/?source=__&amp;utm_source=&amp;utm_medium=&amp;utm_campaign=\" target=\"_blank\" rel=\"noopener\">Learn More \/&#8230;<\/a><br \/>\n<strong>31 May 2024 &#8211; SANS\u00a0 RANSOMWARE SUMMIT 2024 |\u00a0<\/strong> Online &#8211; <a href=\"https:\/\/www.sans.org\/cyber-security-training-events\/ransomware-summit-2024\/\" target=\"_blank\" rel=\"noopener\">Learn More \/&#8230;<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4315f5c e-flex e-con-boxed e-con e-parent\" data-id=\"4315f5c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5560520 e-con-full e-flex e-con e-child\" data-id=\"5560520\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a13725a elementor-widget elementor-widget-image\" data-id=\"3a13725a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"426\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-1024x682.jpg\" class=\"attachment-large size-large wp-image-3368\" alt=\"Image Credit: Florian Pircher\/Pixabay | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-163e0320 e-con-full e-flex e-con e-child\" data-id=\"163e0320\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1825f392 elementor-widget elementor-widget-wp-widget-text\" data-id=\"1825f392\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>CYBER VOICE\/PR WIRE<\/strong><\/p>\n<p><strong>GARTNER: <\/strong>Roll out the AI Opportunity Radar to your executive team. <a style=\"font-weight: bold\" href=\"https:\/\/www.gartner.com\/en\/information-technology\/insights\/it-symposium-keynote?utm_campaign=RM_GB_2024_ITAI_C_BB3_SYMTAKEAWAYSAI_RS&amp;utm_medium=email&amp;utm_source=Eloqua&amp;cm_mmc=Eloqua-_-Email-_-LM_RM_GB_2024_ITAI_C_BB3_SYMTAKEAWAYSAI_RS-_-0000\" target=\"_blank\" rel=\"noopener\">Learn More \/\u2026<\/a><br \/>\n<strong>VEEAM:<\/strong> Cybersecurity Best Practices and Hybrid Cloud Resilience. <strong><a href=\"https:\/\/go.veeam.com\/wp-cyber-resilient-data-recovery-strategy?st=drip&amp;utm_source=drip&amp;utm_medium=email&amp;utm_campaign=pln_coreprod&amp;ccode=pln_coreprod&amp;mkt_tok=ODcwLUxCRy0zMTIAAAGQv-zTxO0iIgjbzzOfUcympJDeB8x1qzL00WKKGi9els_NcnZcFOcB3Xawvo3c5zxPbYiei7Dwl1KisM3btM1TNqEUGDsOQGywOwouyuxMWUKMVvUSz1kj\" target=\"_blank\" rel=\"noopener\">Learn More \/&#8230;<\/a><\/strong><br \/>\n<strong>SME RESOURCES:<\/strong> Why Choose Datadog? Full-Stack Observability. <a href=\"https:\/\/www.datadoghq.com\/dg\/monitor\/personalized-demo-request\/?utm_source=Nurture&amp;utm_medium=Nurture&amp;utm_campaign=Nurture-202305NewContentDownloads3d_ab&amp;mkt_tok=ODc1LVVWWS02ODUAAAGQ0U2SyBsbJU8A6GvvW9BOMiJLhYbS2tifEPJgWqzsFYWM8N0r11HCntSYKb3IAEDuqWpYW22nWKtEumbrJ-8gZA-0g3u2BVXd5gKG6DjByAQ2jefTZM-5o4fu0A\" target=\"_blank\" rel=\"noopener\"><strong>Learn More \/&#8230;<\/strong><\/a><br \/>\n<strong>SPLUNK:<\/strong> Best practices for practical observability &#8211; must-read report. <a href=\"https:\/\/www.splunk.com\/en_us\/form\/a-cios-guide-to-observability.html?fbclid=IwAR2p2iMbfxcyQ7spXmbpSBeJe6g8I46TTCxu9udSeJsxOjAe2wjqhP_mrKo\" target=\"_blank\" rel=\"noopener\"><strong>Learn More \/&#8230;<\/strong><\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: Gerd Altmann\/Pixabay<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[14],"tags":[419],"ppma_author":[505],"class_list":["post-4098","post","type-post","status-publish","format-standard","hentry","category-cyberinsights","tag-cyberinsights"],"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":"","covernews-featured":"","covernews-medium":""},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" rel=\"category tag\">SMECYBERIINSIGHTS<\/a>","tag_info":"SMECYBERIINSIGHTS","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/4098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=4098"}],"version-history":[{"count":0,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/4098\/revisions"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=4098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=4098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=4098"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=4098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}