{"id":5014,"date":"2024-03-07T06:00:00","date_gmt":"2024-03-07T05:00:00","guid":{"rendered":"https:\/\/cyberinsights.argusgpi.com\/?p=5014"},"modified":"2024-05-09T13:03:31","modified_gmt":"2024-05-09T11:03:31","slug":"cyber-insights-070324","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/03\/07\/cyber-insights-070324\/","title":{"rendered":"CYBER INSIGHTS: Thursday, 7 March 2024 &#8211; Today&#8217;s SME Cybersecurity News &#038; Intelligence"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5014\" class=\"elementor elementor-5014\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ba5760a e-flex e-con-boxed e-con e-parent\" data-id=\"5ba5760a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6c31f83d e-con-full e-flex e-con e-child\" data-id=\"6c31f83d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7549cb50 elementor-widget elementor-widget-image\" data-id=\"7549cb50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"225\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg\" class=\"attachment-medium size-medium wp-image-5079\" alt=\"Image Credit: IfOnlyCommunications | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-1024x768.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-768x576.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-79c91dbd e-con-full e-flex e-con e-child\" data-id=\"79c91dbd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5027817f elementor-widget elementor-widget-wp-widget-text\" data-id=\"5027817f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>&nbsp;<\/p>\n<p>Gibraltar: Thursday 7 March 2024\u00a0 at 07:00 CET<\/p>\n<p><strong>CYBER INSIGHTS: Today&#8217;s <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;sca_esv=350977eb0947f7bf&amp;sxsrf=ACQVn0-rYmAEbInLOanb9VZn4-wiMXumXw%3A1709712339874&amp;source=hp&amp;ei=0yPoZbGhM_GakdUPj-G_oAM&amp;iflsig=ANes7DEAAAAAZegx4zIh63qA8kSg92IhC_JF7xz151s1&amp;oq=sme+cyber&amp;gs_lp=Egdnd3Mtd2l6IglzbWUgY3liZXIqAggBMgQQIxgnMgQQIxgnMgQQIxgnMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgYQABgWGB5IzCdQAFjlDXAAeACQAQCYAZ8CoAGgDaoBBTAuNS40uAEDyAEA-AEBmAIJoALSDsICChAjGIAEGIoFGCfCAgsQABiABBiKBRiRAsICCxAuGIAEGMcBGNEDwgIKEAAYgAQYigUYQ8ICBRAuGIAEwgIKEAAYgAQYFBiHApgDAJIHBzAuNS4zLjGgB7BS&amp;sclient=gws-wiz#ip=1\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News <\/a><\/strong><strong>&amp; Intelligence &#8230;<\/strong><br \/>\nWritten &amp; Curated By\u00a0<a href=\"https:\/\/www.google.com\/search?q=cybersecurity+journalist&amp;oq=Cybersec&amp;gs_lcrp=EgZjaHJvbWUqCQgAEEUYOxiABDIJCAAQRRg7GIAEMgYIARBFGDsyBwgCEAAYgAQyBggDEEUYQDIGCAQQRRg5MgcIBRAAGIAEMgcIBhAAGIAEMgcIBxAAGIAE0gEJMzc1MmowajE1qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser \u2013 Cybersecurity Journalist,<\/a><br \/>\n<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">IainFRASER.net\/CYBERInsights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=daily+cyber+insights&amp;oq=daily+cyber&amp;gs_lcrp=EgZjaHJvbWUqCAgCEEUYJxg7MgkIABBFGDkYgAQyBggBEEUYOzIICAIQRRgnGDsyBggDECMYJzIMCAQQABgUGIcCGIAEMgwIBRAAGBQYhwIYgAQyBwgGEAAYgAQyBwgHEAAYgAQyBwgIEAAYgAQyBwgJEAAYgATSAQk2NjUxajBqMTWoAgCwAgA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Daily Cyber Insights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=CYBER+INSIGHTS%3A+The+Latest+SME+Cybersecurity+News+%26+Intel+for+Thursday%2C+7+March+2024&amp;sca_esv=21105454922e231e&amp;sxsrf=ACQVn0_RiaXRTEfy9bPVxLII1IZ1Z0b_4g%3A1710330189849&amp;ei=TZHxZe-7M_uYkdUP_fmpmA8&amp;ved=0ahUKEwivlqi7lPGEAxV7TKQEHf18CvMQ4dUDCBA&amp;uact=5&amp;oq=CYBER+INSIGHTS%3A+The+Latest+SME+Cybersecurity+News+%26+Intel+for+Thursday%2C+7+March+2024&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiVENZQkVSIElOU0lHSFRTOiBUaGUgTGF0ZXN0IFNNRSBDeWJlcnNlY3VyaXR5IE5ld3MgJiBJbnRlbCBmb3IgVGh1cnNkYXksIDcgTWFyY2ggMjAyNEgAUABYAHAAeACQAQCYAQCgAQCqAQC4AQPIAQD4AQGYAgCgAgCYAwCSBwCgBwA&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 070324 at 11:05 CET<\/a><\/p>\n<p><em>#CybersecurityJournalist\u00a0 <\/em><em>#CYBERInsights\u00a0#SMECyberInsights #SMECybersecurityNews<\/em><\/p>\n<p><strong>WELCOME TO TODAY&#8217;S EDITION OF <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERINSIGHTS<\/a> &#8211; MY DAILY ROUNDUP OF THE LATEST EUROPEAN <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;sca_esv=350977eb0947f7bf&amp;sxsrf=ACQVn0-rYmAEbInLOanb9VZn4-wiMXumXw%3A1709712339874&amp;source=hp&amp;ei=0yPoZbGhM_GakdUPj-G_oAM&amp;iflsig=ANes7DEAAAAAZegx4zIh63qA8kSg92IhC_JF7xz151s1&amp;oq=sme+cyber&amp;gs_lp=Egdnd3Mtd2l6IglzbWUgY3liZXIqAggBMgQQIxgnMgQQIxgnMgQQIxgnMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgYQABgWGB5IzCdQAFjlDXAAeACQAQCYAZ8CoAGgDaoBBTAuNS40uAEDyAEA-AEBmAIJoALSDsICChAjGIAEGIoFGCfCAgsQABiABBiKBRiRAsICCxAuGIAEGMcBGNEDwgIKEAAYgAQYigUYQ8ICBRAuGIAEwgIKEAAYgAQYFBiHApgDAJIHBzAuNS4zLjGgB7BS&amp;sclient=gws-wiz#ip=1\" target=\"_blank\" rel=\"noopener\">SME CYBERSECURITY NEWS<\/a>, INTELLIGENCE &amp; ANALYSIS INCLUDING: BITCOIN,\u00a0 ONLINE REPUTATION &amp; CONTINGENCY PLANS. <\/strong><\/p>\n<p><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\"><strong>NOT A MEMBER? JOIN MY INNER SANCTUM FREE<\/strong><\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-613f27f1 e-flex e-con-boxed e-con e-parent\" data-id=\"613f27f1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3ce7d267 e-con-full e-flex e-con e-child\" data-id=\"3ce7d267\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ce405d4 elementor-widget elementor-widget-image\" data-id=\"5ce405d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"408\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Bitcoin_Shining.jpg\" class=\"attachment-large size-large wp-image-5018\" alt=\"Image credit: IfOnlyCommunications | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Bitcoin_Shining.jpg 1020w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Bitcoin_Shining-300x191.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Bitcoin_Shining-768x489.jpg 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunication<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-172babe0 e-con-full e-flex e-con e-child\" data-id=\"172babe0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cf9d8c elementor-widget elementor-widget-wp-widget-text\" data-id=\"3cf9d8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>\u00a01) VIRTUAL CURRENCY (VC): BITCOIN &#8211;<\/strong> <strong>Heavyweight support boost Bitcoin to 69,200 USD. <\/strong>An influx of billions of dollars from US Banking &amp; Finance heavyweights has boosted the price of the Worlds largest &amp; best known Cryptocurrency &#8211; <strong>Bitcoin<\/strong> seeing the price jump from a stagnant $16,500 to top out at a staggering $69,200 an all time record before settling back, currently trading at $67,355.60 (<a href=\"http:\/\/www.coindesk.com\" target=\"_blank\" rel=\"noopener\">Coindesk.com<\/a>) <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\"><strong>Learn More \/&#8230;<\/strong><\/a><\/p>\n<p><em><strong>SMEs<\/strong> are currently being targeted by Crypto scams. For example, a new customer makes a huge order but is only willing to pay with <strong>Bitcoin<\/strong> &#8211; What do you do? Ask Yourself &#8211; Do you know enough about Cryptocurrency?<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53940b3d e-flex e-con-boxed e-con e-parent\" data-id=\"53940b3d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7cd43f75 e-con-full e-flex e-con e-child\" data-id=\"7cd43f75\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61b764ed elementor-widget elementor-widget-image\" data-id=\"61b764ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"360\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_NewsStand-1024x576.jpg\" class=\"attachment-large size-large wp-image-5028\" alt=\"Image Credit: IfOnlyCommunications | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_NewsStand-1024x576.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_NewsStand-300x169.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_NewsStand-768x432.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_NewsStand.jpg 1344w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunication<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a76b646 e-con-full e-flex e-con e-child\" data-id=\"2a76b646\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54bafcf9 elementor-widget elementor-widget-wp-widget-text\" data-id=\"54bafcf9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>2) SUPPLY CHAIN: WE MUST OPTIMISE SUPPLY CHAINS FOR THE SHARING ECONOMY &#8211; WEF <\/strong>The rise of peer-to-peer exchanges, and the digital platforms that enable them, has been meteoric in recent years. Yet, little attention has been devoted to the supply chains that underpin these exchanges. A new case study sheds light on a successful arrangement for supply chains in the sharing economy. <strong>Learn More \/&#8230;<\/strong><\/p>\n<p><em>Introduction to Supply Chain Management for <strong>SMEs<\/strong> &#8211; Effective supply chain management (SCM) is paramount. Read <\/em><em>Supply Chain Management Best Practices for <strong>SMEs<\/strong>:<a href=\"https:\/\/startup-house.com\/blog\/supply-chain-management-best-practices-for-smes\" target=\"_blank\" rel=\"noopener\"> A Comprehensive Guide by Startup-House<\/a><\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-19bc0e59 e-flex e-con-boxed e-con e-parent\" data-id=\"19bc0e59\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4e0f22dd e-con-full e-flex e-con e-child\" data-id=\"4e0f22dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5fa79ac0 elementor-widget elementor-widget-image\" data-id=\"5fa79ac0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"360\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Facebook-1024x576.jpg\" class=\"attachment-large size-large wp-image-5029\" alt=\"Image Credit: IfOnlyCommunications | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Facebook-1024x576.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Facebook-300x169.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Facebook-768x432.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Facebook.jpg 1344w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunication<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-243e019c e-con-full e-flex e-con e-child\" data-id=\"243e019c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-614e049b elementor-widget elementor-widget-wp-widget-text\" data-id=\"614e049b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>3) INNOVATION: ECSO LAUNCHES EUROPEAN DIGITAL INNOVATION HUBS NETWORK &#8211; TWG. <a href=\"https:\/\/ecs-org.eu\/\" target=\"_blank\" rel=\"noopener\">ECSO<\/a> <\/strong>The European Cyber Security Organisation has launched a Thematic Working Group (TWG) with a goal of promoting Cybersecurity as a precondition and basis for a successful digitalisation, to support advancements in boosting Cybersecurity postures, and support local cybersecurity ecosystems. \u00a0<strong><a href=\"https:\/\/european-digital-innovation-hubs.ec.europa.eu\/knowledge-hub\/thematic-groups\/cybersecurity\" target=\"_blank\" rel=\"noopener\">Learn More \/&#8230;<\/a><\/strong><\/p>\n<p><em><a href=\"https:\/\/ecs-org.eu\/\" target=\"_blank\" rel=\"noopener\"><strong>ECSO<\/strong><\/a> contributes to European Sovereignty, Autonomy &amp; strengthening Europe&#8217;s cyber-resilience. Given the key position of <strong>SMEs<\/strong> in the digital economy, the focus will be on their secure digital transformation.\u00a0<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-64434c59 e-flex e-con-boxed e-con e-parent\" data-id=\"64434c59\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-32d691d7 e-con-full e-flex e-con e-child\" data-id=\"32d691d7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-400b2d51 elementor-widget elementor-widget-image\" data-id=\"400b2d51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"426\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/book-2592057_1280-1024x682.jpg\" class=\"attachment-large size-large wp-image-4106\" alt=\"Cybersecurity Journalist,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/book-2592057_1280-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/book-2592057_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/book-2592057_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/book-2592057_1280.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-43407289 e-con-full e-flex e-con e-child\" data-id=\"43407289\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2a28a0 elementor-widget elementor-widget-wp-widget-text\" data-id=\"e2a28a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>CYBERSECURITY EVENTS \u2013 EUROPE | LIVE &amp; VIRTUAL<\/strong><\/p>\n<p><strong>06\/03\/2024 \u2013 CLOUD&amp;CYBER SEC EXPO<\/strong>\u00a0| London \u2013\u00a0<strong><a href=\"https:\/\/rfg.circdata.com\/publish\/CCSEL24\/?source=__&amp;utm_source=&amp;utm_medium=&amp;utm_campaign=\" target=\"_blank\" rel=\"noopener\">Learn More \/\u2026\u00a0<\/a><\/strong><br \/>\n<strong>17\/03\/2024 \u2013 RETHINK! IT SECURITY |\u00a0<\/strong>Berlin \u2013\u00a0<strong>Learn More \/\u2026<br \/>\n<\/strong><strong>20\/05\/2024 \u2013 CYBERWISECON EUROPE<\/strong>\u00a0| Online \u2013\u00a0<strong><a href=\"https:\/\/cyberwisecon.eu\/tickets-payment\/\" target=\"_blank\" rel=\"noopener\">Learn More \/\u2026<\/a><\/strong><br \/>\n<strong>31\/05\/2024 \u2013 SANS\u00a0 RANSOMWARE SUMMIT |\u00a0<\/strong>\u00a0Online \u2013\u00a0<strong><a href=\"https:\/\/www.sans.org\/cyber-security-training-events\/ransomware-summit-2024\/\" target=\"_blank\" rel=\"noopener\">Learn More \/\u2026<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3b2093ca e-flex e-con-boxed e-con e-parent\" data-id=\"3b2093ca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5201866b e-con-full e-flex e-con e-child\" data-id=\"5201866b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2dbe886c elementor-widget elementor-widget-image\" data-id=\"2dbe886c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"426\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-1024x682.jpg\" class=\"attachment-large size-large wp-image-3368\" alt=\"Image Credit: Florian Pircher\/Pixabay | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3918fecd e-con-full e-flex e-con e-child\" data-id=\"3918fecd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f50269a elementor-widget elementor-widget-wp-widget-text\" data-id=\"5f50269a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>CYBER VOICE\/PR WIRE<\/strong><\/p>\n<p class=\"body-copy\"><strong>CYBER TRAINING:<\/strong>\u00a0<a href=\"https:\/\/www.sans.org\/course-preview\/\" target=\"_blank\" rel=\"noopener\">Test Drive World-Class SANS\u00a0Cyber Security Training <\/a><br \/>\n<strong>GARTNER:\u00a0<\/strong><a href=\"https:\/\/www.gartner.com\/en\/information-technology\/insights\/it-symposium-keynote?utm_campaign=RM_GB_2024_ITAI_C_BB3_SYMTAKEAWAYSAI_RS&amp;utm_medium=email&amp;utm_source=Eloqua&amp;cm_mmc=Eloqua-_-Email-_-LM_RM_GB_2024_ITAI_C_BB3_SYMTAKEAWAYSAI_RS-_-0000\" target=\"_blank\" rel=\"noopener\">Roll out the AI Opportunity Radar to your executive team.<\/a> <br \/><strong>VEEAM:<\/strong>\u00a0<a href=\"https:\/\/go.veeam.com\/wp-cyber-resilient-data-recovery-strategy?st=drip&amp;utm_source=drip&amp;utm_medium=email&amp;utm_campaign=pln_coreprod&amp;ccode=pln_coreprod&amp;mkt_tok=ODcwLUxCRy0zMTIAAAGQv-zTxO0iIgjbzzOfUcympJDeB8x1qzL00WKKGi9els_NcnZcFOcB3Xawvo3c5zxPbYiei7Dwl1KisM3btM1TNqEUGDsOQGywOwouyuxMWUKMVvUSz1kj\" target=\"_blank\" rel=\"noopener\">Cybersecurity Best Practices and Hybrid Cloud Resilience.\u00a0<\/a><br \/>\n<strong>SME RESOURCES:<\/strong>\u00a0<a href=\"https:\/\/www.datadoghq.com\/dg\/monitor\/personalized-demo-request\/?utm_source=Nurture&amp;utm_medium=Nurture&amp;utm_campaign=Nurture-202305NewContentDownloads3d_ab&amp;mkt_tok=ODc1LVVWWS02ODUAAAGQ0U2SyBsbJU8A6GvvW9BOMiJLhYbS2tifEPJgWqzsFYWM8N0r11HCntSYKb3IAEDuqWpYW22nWKtEumbrJ-8gZA-0g3u2BVXd5gKG6DjByAQ2jefTZM-5o4fu0A\" target=\"_blank\" rel=\"noopener\">Why Choose Datadog? Full-Stack Observability.\u00a0<\/a><br \/>\n<strong>SPLUNK:<\/strong>\u00a0<a href=\"https:\/\/www.splunk.com\/en_us\/form\/a-cios-guide-to-observability.html?fbclid=IwAR2p2iMbfxcyQ7spXmbpSBeJe6g8I46TTCxu9udSeJsxOjAe2wjqhP_mrKo\" target=\"_blank\" rel=\"noopener\">Best practices for practical observability \u2013 must-read report.<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-36afa073 e-flex e-con-boxed e-con e-parent\" data-id=\"36afa073\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a79ebf7 e-con-full e-flex e-con e-child\" data-id=\"a79ebf7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79cd5617 elementor-widget elementor-widget-image\" data-id=\"79cd5617\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"426\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-1024x682.jpg\" class=\"attachment-large size-large wp-image-3960\" alt=\"Cybersecurity Journalist, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26357b0d e-con-full e-flex e-con e-child\" data-id=\"26357b0d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ac163f2 elementor-widget elementor-widget-wp-widget-text\" data-id=\"ac163f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>INVESTIGATIONS 2024: <\/strong><\/p>\n<p><strong>1. THE SMALL BUSINESS LOAN SCAM <\/strong>This model of the Small Business Loan Scam started during the Covid Pandemic and true to form the Scammers were offering &#8220;Guaranteed&#8221; <strong>Small Business<\/strong> Loans. Well, I have to report that the Business Loan <strong>Scam<\/strong> is rearing its ugly head. <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">Register Free to read the full Report<\/a><\/p>\n<p><strong>2. PHISHING: The Sextortion scam<\/strong> as it is termed, has raised its ugly head again with a refined Scam for 2024. I first wrote about this nearly six years ago after I received a flurry of emails with the standard copy &amp; paste text. Most <strong>Small Businesses\/ SMEs<\/strong> ignore these threats as not being relevant to business but they would be wrong! <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">Register Free to read the full Report<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-319c61d9 e-flex e-con-boxed e-con e-parent\" data-id=\"319c61d9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-60050cf1 e-con-full e-flex e-con e-child\" data-id=\"60050cf1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-179a1723 elementor-widget elementor-widget-image\" data-id=\"179a1723\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"400\" height=\"265\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/IF_Kenya_Cropped.png\" class=\"attachment-large size-large wp-image-3101\" alt=\"Cybersecurity Journalist, Daily Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/IF_Kenya_Cropped.png 400w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/IF_Kenya_Cropped-300x199.png 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eae113b e-con-full e-flex e-con e-child\" data-id=\"eae113b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a27a2fd elementor-widget elementor-widget-wp-widget-text\" data-id=\"4a27a2fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>ABOUT IAIN FRASER &#8211;<\/strong> Gibraltar based Professional Journalist,<br \/>\nAccredited Authority Writer &amp; Commentator on all aspects of <strong>SME<\/strong> (Small, Medium Sized Business) Cybersecurity, Latest Threat Intelligence, Scam Alerts and Best Practice Compliance &amp; Mitigation. In addition to Publishing <strong>CYBERInsights<\/strong> I contribute to 20+ News Sites, Authority Blogs and Digital Magazines.<\/p>\n<p>If you need high quality, well-researched content &#8211; Features, Articles, Web Content, Product\/Service Review or Guest Post on any aspect of Business (SME) Cybersecurity &#8211; On time, On budget, Every time &#8230; <strong>then We Should Talk!<\/strong> | Email: <a href=\"mailto:iain@iainfraser.net\">iain@iainfraser.net<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: IfOnlyCommunications Image Credit: IfOnlyCommunication Image Credit: IfOnlyCommunication Image Credit: IfOnlyCommunication<\/p>\n","protected":false},"author":1,"featured_media":5018,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[14],"tags":[419],"ppma_author":[505],"class_list":["post-5014","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberinsights","tag-cyberinsights"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Bitcoin_Shining.jpg",1020,650,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Bitcoin_Shining-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Bitcoin_Shining-300x191.jpg",300,191,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Bitcoin_Shining-768x489.jpg",640,408,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Bitcoin_Shining.jpg",640,408,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Bitcoin_Shining.jpg",1020,650,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Bitcoin_Shining.jpg",1020,650,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Bitcoin_Shining.jpg",1020,650,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Bitcoin_Shining-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" rel=\"category tag\">SMECYBERIINSIGHTS<\/a>","tag_info":"SMECYBERIINSIGHTS","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/5014","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=5014"}],"version-history":[{"count":0,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/5014\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/5018"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=5014"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=5014"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=5014"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=5014"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}