{"id":5753,"date":"2024-03-22T07:00:00","date_gmt":"2024-03-22T06:00:00","guid":{"rendered":"https:\/\/cyberinsights.argusgpi.com\/?p=5753"},"modified":"2024-05-09T13:01:19","modified_gmt":"2024-05-09T11:01:19","slug":"cyber-insights-220324","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/03\/22\/cyber-insights-220324\/","title":{"rendered":"CYBER INSIGHTS: Friday, 22 March 2024 \u2013 Today\u2019s SME Cybersecurity News &#038; Intelligence"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5753\" class=\"elementor elementor-5753\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e23038d e-flex e-con-boxed e-con e-parent\" data-id=\"2e23038d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-44fb64a1 e-con-full e-flex e-con e-child\" data-id=\"44fb64a1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a141643 elementor-widget elementor-widget-image\" data-id=\"5a141643\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"225\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg\" class=\"attachment-medium size-medium wp-image-5079\" alt=\"Image Credit: IfOnlyCommunications | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-1024x768.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-768x576.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6cc2f2fe e-con-full e-flex e-con e-child\" data-id=\"6cc2f2fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e31bcae elementor-widget elementor-widget-wp-widget-text\" data-id=\"e31bcae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar: Friday 15 March 2024\u00a0 at 07:00 CET<\/p>\n<p><strong>CYBER INSIGHTS: The Latest <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;sca_esv=350977eb0947f7bf&amp;sxsrf=ACQVn0-rYmAEbInLOanb9VZn4-wiMXumXw%3A1709712339874&amp;source=hp&amp;ei=0yPoZbGhM_GakdUPj-G_oAM&amp;iflsig=ANes7DEAAAAAZegx4zIh63qA8kSg92IhC_JF7xz151s1&amp;oq=sme+cyber&amp;gs_lp=Egdnd3Mtd2l6IglzbWUgY3liZXIqAggBMgQQIxgnMgQQIxgnMgQQIxgnMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgYQABgWGB5IzCdQAFjlDXAAeACQAQCYAZ8CoAGgDaoBBTAuNS40uAEDyAEA-AEBmAIJoALSDsICChAjGIAEGIoFGCfCAgsQABiABBiKBRiRAsICCxAuGIAEGMcBGNEDwgIKEAAYgAQYigUYQ8ICBRAuGIAEwgIKEAAYgAQYFBiHApgDAJIHBzAuNS4zLjGgB7BS&amp;sclient=gws-wiz#ip=1\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News <\/a><\/strong><strong>&amp; Intelligence &#8230;<\/strong><br \/>\nWritten &amp; Curated By\u00a0<a href=\"https:\/\/www.google.com\/search?q=cybersecurity+journalist&amp;oq=Cybersec&amp;gs_lcrp=EgZjaHJvbWUqCQgAEEUYOxiABDIJCAAQRRg7GIAEMgYIARBFGDsyBwgCEAAYgAQyBggDEEUYQDIGCAQQRRg5MgcIBRAAGIAEMgcIBhAAGIAEMgcIBxAAGIAE0gEJMzc1MmowajE1qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser \u2013 Cybersecurity Journalist,<\/a><br \/>\n<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">IainFRASER.net\/CYBERInsights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=daily+cyber+insights&amp;oq=daily+cyber&amp;gs_lcrp=EgZjaHJvbWUqCAgCEEUYJxg7MgkIABBFGDkYgAQyBggBEEUYOzIICAIQRRgnGDsyBggDECMYJzIMCAQQABgUGIcCGIAEMgwIBRAAGBQYhwIYgAQyBwgGEAAYgAQyBwgHEAAYgAQyBwgIEAAYgAQyBwgJEAAYgATSAQk2NjUxajBqMTWoAgCwAgA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Daily Cyber Insights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=CYBER+INSIGHTS%3A+Friday%2C+22+March+2024+%E2%80%93+Today%E2%80%99s+SME+Cybersecurity+News+%26+Intelligence&amp;sca_esv=ff48bec18c46a1e3&amp;sxsrf=ACQVn0-Fpsz4rAVPyA2Ev_j5h_tNoevYbQ%3A1711106185630&amp;ei=iWj9Zf7_JbOTkdUPo7-M2A4&amp;ved=0ahUKEwi-6Pei34eFAxWzSaQEHaMfA-sQ4dUDCBA&amp;uact=5&amp;oq=CYBER+INSIGHTS%3A+Friday%2C+22+March+2024+%E2%80%93+Today%E2%80%99s+SME+Cybersecurity+News+%26+Intelligence&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiWUNZQkVSIElOU0lHSFRTOiBGcmlkYXksIDIyIE1hcmNoIDIwMjQg4oCTIFRvZGF54oCZcyBTTUUgQ3liZXJzZWN1cml0eSBOZXdzICYgSW50ZWxsaWdlbmNlSABQAFgAcAB4AJABAJgBAKABAKoBALgBA8gBAPgBAZgCAKACAJgDAJIHAKAHAA&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 220324 at 08:10 CET<\/a><\/p>\n<p><em>#CybersecurityJournalist\u00a0 <\/em><em>#CYBERInsights\u00a0#SMECyberInsights #SMECybersecurityNews<\/em><\/p>\n<p><strong>Welcome to Today&#8217;s Edition of CYBERInsights &#8211; My Daily Roundup of the Latest European <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;sca_esv=350977eb0947f7bf&amp;sxsrf=ACQVn0-rYmAEbInLOanb9VZn4-wiMXumXw%3A1709712339874&amp;source=hp&amp;ei=0yPoZbGhM_GakdUPj-G_oAM&amp;iflsig=ANes7DEAAAAAZegx4zIh63qA8kSg92IhC_JF7xz151s1&amp;oq=sme+cyber&amp;gs_lp=Egdnd3Mtd2l6IglzbWUgY3liZXIqAggBMgQQIxgnMgQQIxgnMgQQIxgnMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgYQABgWGB5IzCdQAFjlDXAAeACQAQCYAZ8CoAGgDaoBBTAuNS40uAEDyAEA-AEBmAIJoALSDsICChAjGIAEGIoFGCfCAgsQABiABBiKBRiRAsICCxAuGIAEGMcBGNEDwgIKEAAYgAQYigUYQ8ICBRAuGIAEwgIKEAAYgAQYFBiHApgDAJIHBzAuNS4zLjGgB7BS&amp;sclient=gws-wiz#ip=1\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News<\/a> Including: 1). Password Policy 2). Cyber Resilience 3). Online Reputation\u00a0<\/strong><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-61585ec6 e-flex e-con-boxed e-con e-parent\" data-id=\"61585ec6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2adf289b elementor-widget elementor-widget-shortcode\" data-id=\"2adf289b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"poptin-embedded\" data-id=\"815664ec428d5\"><\/div><br\/><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a8187b8 e-flex e-con-boxed e-con e-parent\" data-id=\"1a8187b8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6fc81a9a elementor-widget elementor-widget-html\" data-id=\"6fc81a9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loQjS\/creativeref:1101l64059\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loQjS\/creativeref:1101l64059\" width=\"1940\" height=\"500\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-768a5c59 e-flex e-con-boxed e-con e-parent\" data-id=\"768a5c59\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-69eddbb9 e-con-full e-flex e-con e-child\" data-id=\"69eddbb9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-75f2a64f elementor-widget elementor-widget-image\" data-id=\"75f2a64f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"457\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_LogOn_Password_1.jpg\" class=\"attachment-large size-large wp-image-5778\" alt=\"Image Credit: IfOnlyCommunications | Cybersecurity Journalist, CYBER Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_LogOn_Password_1.jpg 1019w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_LogOn_Password_1-300x214.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_LogOn_Password_1-768x548.jpg 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cd62600 e-con-full e-flex e-con e-child\" data-id=\"4cd62600\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-21c705d3 elementor-widget elementor-widget-wp-widget-text\" data-id=\"21c705d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>1). PASSWORD POLICY \u2013<\/strong> According to Verizon 80% of data breaches stem from either weak or re-used (previously compromised) Are your <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-the-definition-of-an-sme-in-europe\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a> Passwords Secure Enough? A strong password policy is any organization\u2019s first line of defense against intruders according to Netwrix in their latest guide Password Policy Best Practices.<\/p>\n<p><em><strong>ABOUT NETWRIX \u2013<\/strong> Netwrix empowers security professionals to face digital threats with confidence by enabling them to identify and protect sensitive data as well as respond to &amp; recover from attacks.<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22bf2488 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"22bf2488\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/try.netwrix.com\/password_policy_best_practices\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6d3f471e e-flex e-con-boxed e-con e-parent\" data-id=\"6d3f471e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-28b00baf e-con-full e-flex e-con e-child\" data-id=\"28b00baf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-36ce142f elementor-widget elementor-widget-image\" data-id=\"36ce142f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/pixabay.com\/users\/startupstockphotos-690514\/?utm_source=link-attribution&#038;utm_medium=referral&#038;utm_campaign=image&#038;utm_content=593341\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"427\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/security-8499276_1280-1024x683.jpg\" class=\"attachment-large size-large wp-image-5786\" alt=\"security-8499276_1280\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/security-8499276_1280-1024x683.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/security-8499276_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/security-8499276_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/security-8499276_1280.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"> Image Credit: StartupStockPhotos\/Pixabay <\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a9732ed e-con-full e-flex e-con e-child\" data-id=\"6a9732ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34d1af9c elementor-widget elementor-widget-wp-widget-text\" data-id=\"34d1af9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>2). <\/strong><strong>CYBER RESILIENCE:<\/strong> <strong>ECCO<\/strong> is encouraging cooperation within the EC Community through the variety of mechanisms on offer such as the Radar, the Marketplace, the many events ongoing that will make it easier for the Cybersecurity community to interact &amp; promote cooperation both within &amp; between the various parts of European Cybersecurity communities.<\/p>\n<p><em><strong>About ECCO &#8211; <\/strong>The European Cybersecurity Competence Community (ECCO) &#8211; Exists to communicate, promote and improve visibility stability of work of the European Cybersecurity Community<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24499b70 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"24499b70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberwatching.eu\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-665a4796 e-flex e-con-boxed e-con e-parent\" data-id=\"665a4796\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6954cd5d e-con-full e-flex e-con e-child\" data-id=\"6954cd5d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2676b6c5 elementor-widget elementor-widget-image\" data-id=\"2676b6c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"464\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Newsstand_1-1.jpg\" class=\"attachment-large size-large wp-image-5788\" alt=\"CI_Newsstand_1\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Newsstand_1-1.jpg 1019w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Newsstand_1-1-300x217.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Newsstand_1-1-768x556.jpg 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOPnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-70bcd6d2 e-con-full e-flex e-con e-child\" data-id=\"70bcd6d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15999e58 elementor-widget elementor-widget-wp-widget-text\" data-id=\"15999e58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>3). <\/strong><strong>ONLINE REPUTATION: What is Your Online Reputation worth? <\/strong>Very few Business Relationships are forged without at least a cursory search on Google \u2013 Today your Online Reputation is Everything! By deploying proprietary protocols <strong>ScarabORM<\/strong> will\u00a0investigate the extent of the negative content &amp; start repairing the damage.<\/p>\n<p><em><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-the-definition-of-an-sme-in-europe\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a>\u00a0need to stay aware of these clear and present threats and not dismiss them as only happening to individuals. There is clear evidence that Cybercriminals are targeting\u00a0<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-the-definition-of-an-sme-in-europe\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a>\u00a0as the risk\/reward ratio is compelling.<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0fe021 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"e0fe021\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d901324 e-flex e-con-boxed e-con e-parent\" data-id=\"2d901324\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12b7c109 elementor-widget elementor-widget-html\" data-id=\"12b7c109\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script type=\"text\/javascript\" src=\"https:\/\/creative.prf.hn\/creative\/camref:1101loxy2\/creativeref:1101l50785\"><\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-152aa93f e-flex e-con-boxed e-con e-parent\" data-id=\"152aa93f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6bc848e3 e-con-full e-flex e-con e-child\" data-id=\"6bc848e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5532e17e elementor-widget elementor-widget-image\" data-id=\"5532e17e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"426\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-1024x682.jpg\" class=\"attachment-large size-large wp-image-3368\" alt=\"Image Credit: Florian Pircher\/Pixabay | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-371bfec0 e-con-full e-flex e-con e-child\" data-id=\"371bfec0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cc50007 elementor-widget elementor-widget-wp-widget-text\" data-id=\"4cc50007\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>CYBER VOICE\/PR WIRE | <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/about-cyber_voice-sme-cybersecurity-pr\/\" target=\"_blank\" rel=\"noopener\">POST YOUR NEWS HERE<\/a><\/strong><\/p>\n<p class=\"body-copy\"><strong>CYBER TRAINING:<\/strong>\u00a0<a href=\"https:\/\/www.sans.org\/course-preview\/\" target=\"_blank\" rel=\"noopener\">Test Drive World-Class SANS\u00a0Cyber Security Training <\/a><br \/>\n<strong>GARTNER:\u00a0<\/strong><a href=\"https:\/\/www.gartner.com\/en\/information-technology\/insights\/it-symposium-keynote?utm_campaign=RM_GB_2024_ITAI_C_BB3_SYMTAKEAWAYSAI_RS&amp;utm_medium=email&amp;utm_source=Eloqua&amp;cm_mmc=Eloqua-_-Email-_-LM_RM_GB_2024_ITAI_C_BB3_SYMTAKEAWAYSAI_RS-_-0000\" target=\"_blank\" rel=\"noopener\">Roll out the AI Opportunity Radar to your executive team.<\/a><br \/>\n<strong>VEEAM:<\/strong>\u00a0<a href=\"https:\/\/go.veeam.com\/wp-cyber-resilient-data-recovery-strategy?st=drip&amp;utm_source=drip&amp;utm_medium=email&amp;utm_campaign=pln_coreprod&amp;ccode=pln_coreprod&amp;mkt_tok=ODcwLUxCRy0zMTIAAAGQv-zTxO0iIgjbzzOfUcympJDeB8x1qzL00WKKGi9els_NcnZcFOcB3Xawvo3c5zxPbYiei7Dwl1KisM3btM1TNqEUGDsOQGywOwouyuxMWUKMVvUSz1kj\" target=\"_blank\" rel=\"noopener\">Cybersecurity Best Practices and Hybrid Cloud Resilience.\u00a0<\/a><br \/>\n<strong>SME RESOURCES:<\/strong>\u00a0<a href=\"https:\/\/www.datadoghq.com\/dg\/monitor\/personalized-demo-request\/?utm_source=Nurture&amp;utm_medium=Nurture&amp;utm_campaign=Nurture-202305NewContentDownloads3d_ab&amp;mkt_tok=ODc1LVVWWS02ODUAAAGQ0U2SyBsbJU8A6GvvW9BOMiJLhYbS2tifEPJgWqzsFYWM8N0r11HCntSYKb3IAEDuqWpYW22nWKtEumbrJ-8gZA-0g3u2BVXd5gKG6DjByAQ2jefTZM-5o4fu0A\" target=\"_blank\" rel=\"noopener\">Why Choose Datadog? Full-Stack Observability.\u00a0<\/a><br \/>\n<strong>SPLUNK:<\/strong>\u00a0<a href=\"https:\/\/www.splunk.com\/en_us\/form\/a-cios-guide-to-observability.html?fbclid=IwAR2p2iMbfxcyQ7spXmbpSBeJe6g8I46TTCxu9udSeJsxOjAe2wjqhP_mrKo\" target=\"_blank\" rel=\"noopener\">Best practices for practical observability \u2013 must-read report.<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-61fb5531 e-flex e-con-boxed e-con e-parent\" data-id=\"61fb5531\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-28e9a100 e-con-full e-flex e-con e-child\" data-id=\"28e9a100\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-14088d39 elementor-widget elementor-widget-image\" data-id=\"14088d39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"426\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-1024x682.jpg\" class=\"attachment-large size-large wp-image-3960\" alt=\"Cybersecurity Journalist, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5715f433 e-con-full e-flex e-con e-child\" data-id=\"5715f433\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-332f37bc elementor-widget elementor-widget-wp-widget-text\" data-id=\"332f37bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>INVESTIGATIONS 2024: <\/strong><\/p>\n<p><strong>1. THE SMALL BUSINESS LOAN SCAM <\/strong>This model of the Small Business Loan Scam started during the Covid Pandemic and true to form the Scammers were offering &#8220;Guaranteed&#8221; <strong>Small Business<\/strong> Loans. Well, I have to report that the Business Loan <strong>Scam<\/strong> is rearing its ugly head. <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">Register Free to read the full Report<\/a><\/p>\n<p><strong>2. PHISHING: The Sextortion scam<\/strong> as it is termed, has raised its ugly head again with a refined Scam for 2024. I first wrote about this nearly six years ago after I received a flurry of emails with the standard copy &amp; paste text. Most <strong>Small Businesses\/ SMEs<\/strong> ignore these threats as not being relevant to business but they would be wrong! <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">Register Free to read the full Report<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c65530d e-flex e-con-boxed e-con e-parent\" data-id=\"c65530d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3ee6e98f e-con-full e-flex e-con e-child\" data-id=\"3ee6e98f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b0fddce elementor-widget elementor-widget-image\" data-id=\"6b0fddce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"400\" height=\"265\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/IF_Kenya_Cropped.png\" class=\"attachment-large size-large wp-image-3101\" alt=\"Cybersecurity Journalist, Daily Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/IF_Kenya_Cropped.png 400w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/IF_Kenya_Cropped-300x199.png 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a19f1dc e-con-full e-flex e-con e-child\" data-id=\"5a19f1dc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f994664 elementor-widget elementor-widget-wp-widget-text\" data-id=\"f994664\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>ABOUT IAIN FRASER \u2013<\/strong> Gibraltar based Accredited Journalist, Authority Writer &amp; Commentator on all aspects of <strong>SME<\/strong> (Small, Medium Sized Business) Cybersecurity, Latest Threat Intelligence, Scam Alerts and Best Practice Compliance &amp; Mitigation. In addition to Publishing <strong>CYBERInsights<\/strong>, I contribute to 20+ News Sites, Blogs &amp; Digital Magazines.<\/p>\n<p><em>If you need high quality, well-researched content \u2013 Features, Articles, Web Content, Product\/Service Review or Guest Post on any aspect of Business (SME) Cybersecurity \u2013 On time, On budget, Every time \u2026\u00a0<strong>then We Should Talk!<\/strong>\u00a0| Email:\u00a0<a href=\"mailto:iain@iainfraser.net\">iain@iainfraser.net<\/a><\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: IfOnlyCommunications Image Credit: IfOnlyCommunications Learn More \/&#8230; Image Credit: StartupStockPhotos\/Pixabay Learn More \/&#8230;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":5778,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[14],"tags":[419],"ppma_author":[505],"class_list":["post-5753","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberinsights","tag-cyberinsights"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_LogOn_Password_1.jpg",1019,727,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_LogOn_Password_1-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_LogOn_Password_1-300x214.jpg",300,214,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_LogOn_Password_1-768x548.jpg",640,457,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_LogOn_Password_1.jpg",640,457,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_LogOn_Password_1.jpg",1019,727,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_LogOn_Password_1.jpg",1019,727,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_LogOn_Password_1.jpg",1019,727,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_LogOn_Password_1-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" rel=\"category tag\">SMECYBERIINSIGHTS<\/a>","tag_info":"SMECYBERIINSIGHTS","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/5753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=5753"}],"version-history":[{"count":0,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/5753\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/5778"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=5753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=5753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=5753"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=5753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}