{"id":6074,"date":"2024-04-01T07:00:00","date_gmt":"2024-04-01T05:00:00","guid":{"rendered":"https:\/\/cyberinsights.argusgpi.com\/?p=6074"},"modified":"2024-04-01T12:43:04","modified_gmt":"2024-04-01T10:43:04","slug":"cyber-insights-010424","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/04\/01\/cyber-insights-010424\/","title":{"rendered":"CYBER INSIGHTS: Monday, 1 April 2024 \u2013 Today\u2019s SME Cybersecurity News &#038; Intelligence"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6074\" class=\"elementor elementor-6074\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f4fab1d e-flex e-con-boxed e-con e-parent\" data-id=\"5f4fab1d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6c99959e e-con-full e-flex e-con e-child\" data-id=\"6c99959e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d52347b elementor-widget elementor-widget-image\" data-id=\"d52347b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"225\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg\" class=\"attachment-medium size-medium wp-image-5079\" alt=\"Image Credit: IfOnlyCommunications | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-1024x768.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-768x576.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-171fd141 e-con-full e-flex e-con e-child\" data-id=\"171fd141\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-125117f7 elementor-widget elementor-widget-wp-widget-text\" data-id=\"125117f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar: Monday 1st April 2024\u00a0 at 07:00 CET<\/p>\n<p><strong>CYBER INSIGHTS: The Latest <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;sca_esv=350977eb0947f7bf&amp;sxsrf=ACQVn0-rYmAEbInLOanb9VZn4-wiMXumXw%3A1709712339874&amp;source=hp&amp;ei=0yPoZbGhM_GakdUPj-G_oAM&amp;iflsig=ANes7DEAAAAAZegx4zIh63qA8kSg92IhC_JF7xz151s1&amp;oq=sme+cyber&amp;gs_lp=Egdnd3Mtd2l6IglzbWUgY3liZXIqAggBMgQQIxgnMgQQIxgnMgQQIxgnMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgYQABgWGB5IzCdQAFjlDXAAeACQAQCYAZ8CoAGgDaoBBTAuNS40uAEDyAEA-AEBmAIJoALSDsICChAjGIAEGIoFGCfCAgsQABiABBiKBRiRAsICCxAuGIAEGMcBGNEDwgIKEAAYgAQYigUYQ8ICBRAuGIAEwgIKEAAYgAQYFBiHApgDAJIHBzAuNS4zLjGgB7BS&amp;sclient=gws-wiz#ip=1\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News <\/a><\/strong><strong>&amp; Intelligence &#8230;<\/strong><br \/>\nWritten &amp; Curated By\u00a0<a href=\"https:\/\/www.google.com\/search?q=cybersecurity+journalist&amp;oq=Cybersec&amp;gs_lcrp=EgZjaHJvbWUqCQgAEEUYOxiABDIJCAAQRRg7GIAEMgYIARBFGDsyBwgCEAAYgAQyBggDEEUYQDIGCAQQRRg5MgcIBRAAGIAEMgcIBhAAGIAEMgcIBxAAGIAE0gEJMzc1MmowajE1qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser \u2013 Cybersecurity Journalist,<\/a><br \/>\n<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">IainFRASER.net\/CYBERInsights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=sme+cyber+insights&amp;oq=&amp;gs_lcrp=EgZjaHJvbWUqCQgAECMYJxjqAjIJCAAQIxgnGOoCMgkIARAjGCcY6gIyCQgCECMYJxjqAjIJCAMQIxgnGOoCMgkIBBAjGCcY6gIyCQgFECMYJxjqAjIJCAYQIxgnGOoCMgkIBxAjGCcY6gLSAQkxMDU1ajBqMTWoAgiwAgE&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cyber Insights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=sme+cyber+insights&amp;sca_esv=91d7bb7c0aabaac7&amp;sca_upv=1&amp;sxsrf=ACQVn0_06GS09jj2M4DkFVXQeEXDdzPcnQ%3A1711967905509&amp;ei=oY4KZsrNHoalkdUPupCfwAU&amp;oq=sme+cyber+insights&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiEnNtZSBjeWJlciBpbnNpZ2h0cyoCCAAyChAjGIAEGIoFGCcyCxAAGIAEGIoFGIYDMgsQABiABBiKBRiGAzILEAAYgAQYigUYhgNIyF9QAFjNUXABeACQAQGYAccMoAGRU6oBETAuMi4yLjMuMi4yLjMuMS4yuAEByAEA-AEBmAIRoALNT6gCCsICBxAjGOoCGCfCAgQQIxgnwgILEAAYgAQYigUYkQLCAgsQLhiABBjHARjRA8ICBRAAGIAEwgIKEAAYgAQYigUYQ8ICChAuGIAEGIoFGEPCAgoQABiABBgUGIcCwgIGEAAYFhgemAMckgcPMS4yLjEuNC4zLjIuMS4zoAffiQE&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 010424 at 07:40 CET<\/a><\/p>\n<p><em>#CybersecurityJournalist\u00a0 <\/em><em>#CYBERInsights\u00a0#SMECyberInsights #SMECybersecurityNews<\/em><\/p>\n<p><strong>Welcome to Today&#8217;s Edition of CYBERInsights &#8211; My Daily Roundup of the Latest European <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;sca_esv=350977eb0947f7bf&amp;sxsrf=ACQVn0-rYmAEbInLOanb9VZn4-wiMXumXw%3A1709712339874&amp;source=hp&amp;ei=0yPoZbGhM_GakdUPj-G_oAM&amp;iflsig=ANes7DEAAAAAZegx4zIh63qA8kSg92IhC_JF7xz151s1&amp;oq=sme+cyber&amp;gs_lp=Egdnd3Mtd2l6IglzbWUgY3liZXIqAggBMgQQIxgnMgQQIxgnMgQQIxgnMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgYQABgWGB5IzCdQAFjlDXAAeACQAQCYAZ8CoAGgDaoBBTAuNS40uAEDyAEA-AEBmAIJoALSDsICChAjGIAEGIoFGCfCAgsQABiABBiKBRiRAsICCxAuGIAEGMcBGNEDwgIKEAAYgAQYigUYQ8ICBRAuGIAEwgIKEAAYgAQYFBiHApgDAJIHBzAuNS4zLjGgB7BS&amp;sclient=gws-wiz#ip=1\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News<\/a> Including:\u00a0<\/strong><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c9cdaad e-flex e-con-boxed e-con e-parent\" data-id=\"7c9cdaad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1337d768 elementor-widget elementor-widget-shortcode\" data-id=\"1337d768\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"poptin-embedded\" data-id=\"815664ec428d5\"><\/div><br\/><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-144ead25 e-flex e-con-boxed e-con e-parent\" data-id=\"144ead25\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69edb1aa elementor-widget elementor-widget-html\" data-id=\"69edb1aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loQjS\/creativeref:1101l64059\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loQjS\/creativeref:1101l64059\" width=\"1940\" height=\"500\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3cdd9293 e-flex e-con-boxed e-con e-parent\" data-id=\"3cdd9293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7a9a9610 e-con-full e-flex e-con e-child\" data-id=\"7a9a9610\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea24384 elementor-widget elementor-widget-image\" data-id=\"ea24384\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"424\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/contact-us-2993000_1280-1024x678.jpg\" class=\"attachment-large size-large wp-image-5687\" alt=\"Image Credit: Tumisu\/Pixabay | Cybersecurity Journalist, CYBER Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/contact-us-2993000_1280-1024x678.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/contact-us-2993000_1280-300x199.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/contact-us-2993000_1280-768x509.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/contact-us-2993000_1280.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Tumisu\/Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-71bd2144 e-con-full e-flex e-con e-child\" data-id=\"71bd2144\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-53b2883a elementor-widget elementor-widget-wp-widget-text\" data-id=\"53b2883a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>1). <\/strong><strong>EMAIL SECURITY: Is Your SMEs Email Security Up-to-Snuff?<\/strong>\u00a0According to a recent UK government report, 32% of<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-the-definition-of-an-sme-in-europe\/\" target=\"_blank\" rel=\"noopener\"><strong>\u00a0SMEs<\/strong><\/a>\u00a0experienced a breach or Cyber attack in the last 12 months, and one of the most common techniques criminals use is to send phishing emails \u2013 fake emails that impersonate your organisation.<\/p>\n<p><em>The\u00a0<a href=\"https:\/\/www.ncsc.gov.uk\/\" target=\"_blank\" rel=\"noopener\"><strong>NCSC<\/strong><\/a>\u00a0(National Cyber Security Centre) have a free tool to check your email security and prevent cyber criminals using your email to conduct Cyber attacks.<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78058542 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"78058542\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/checkcybersecurity.service.ncsc.gov.uk\/email-security-check\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d1fdfba e-flex e-con-boxed e-con e-parent\" data-id=\"d1fdfba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6ce326f9 e-con-full e-flex e-con e-child\" data-id=\"6ce326f9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77701106 elementor-widget elementor-widget-image\" data-id=\"77701106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"360\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/04\/imagebot_31_03_2024-3-1024x576.jpg\" class=\"attachment-large size-large wp-image-6201\" alt=\"Cybersecurity Journalist, CYBER Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/04\/imagebot_31_03_2024-3-1024x576.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/04\/imagebot_31_03_2024-3-300x169.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/04\/imagebot_31_03_2024-3-768x432.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/04\/imagebot_31_03_2024-3.jpg 1344w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-726b6b57 e-con-full e-flex e-con e-child\" data-id=\"726b6b57\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61695d5a elementor-widget elementor-widget-wp-widget-text\" data-id=\"61695d5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>2).<\/strong><strong>\u00a0<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-phishing\/\" target=\"_blank\" rel=\"noopener\">PHISHING<\/a>\u00a0\u2013 EARLY WARNING :<\/strong>\u00a0As the fiscal year comes to a close &amp; phishing threats increase the\u00a0<strong>NCSC\u00a0<\/strong>launches\u00a0<strong>EARLY WARNING\u00a0<\/strong>a free to use Initiative providing advanced alerts to keep you one step ahead of\u00a0<strong>Cybersecurity<\/strong>\u00a0threats.\u00a0\u00a0<strong>Early Warning<\/strong>\u00a0will deliver the latest Cyber Threat Intel, Network Abuse &amp; Vulnerability Alerts.<\/p>\n<p><em>Help secure Your\u00a0<strong>SME<\/strong>\u00a0for Free.\u00a0<strong><a href=\"https:\/\/www.signin.service.ncsc.gov.uk\/auth\/realms\/ukncsc\/protocol\/openid-connect\/auth?client_id=EarlyWarning-prod&amp;redirect_uri=https%3A%2F%2Fauth.earlywarning.service.ncsc.gov.uk%2Foauth2%2Fidpresponse&amp;scope=openid&amp;response_type=code&amp;state=H4sIAAAAAAAAAIWQ227iMBCG38XXBLBzsrmDFAihEFSgTbpaISdxTpg455Cu9t3rPkHvPs3838xo_gEKFoB1ysCaVkG36yrJrOdoHMEEBLJztM6WxFCigTIesVonKg0T2tQarxgpqpojGYhkIG3bslnMZsMwTBmt-TjQusiKZNqwus9CNi3CJpwmop9295nof4pskC6TbigiJjGW6O5eflYmYPEHiJIVWQT-TkAqO1_9yl8X_Lwd8jluS-2pDlSjczelPnn44UpamYztd5CK3QXlh3dCiHIKXjdLYp2sN46F2o9iiVsHR9XTqA_SyKVxRroh8S5xFNB0uqxi0ZEMz95uzG3miHf7c1R9O3UNN1OcfgsPhr5eVltr089hf2ZuG9jiiErimDfPh7pa07Y53fux2lXXVK9I6WwE4Q8y319eeRGhD_GC7VO5ebpeVtoPcvQsyqIrbUhuXjE1mPdGHce9f-T5LT5pCNnd5bND-5WHA361Dbx-NPJiLi-mXZv--m-ZfYAFNOEcacg0jQkowSKmvGETUMshkQ4DFVJNoaYWKZqOsYIDaCqMxTFFGkSqhsH_b4TwtOwuAgAA.H4sIAAAAAAAAAJPfGvKgv1c36v_Nv7q8s8RdVsWyW1aqPUrZ2HZq_1Hm6CcAHW4HdSAAAAA.3\" target=\"_blank\" rel=\"noopener\">Click Here to Set-up EARLY WARNING Free Alerts Now!<\/a>\u00a0N.B.<\/strong>\u00a0<strong>Early Warning<\/strong>\u00a0is designed to complement your existing threat products and should not be used in isolation.\u00a0<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7eea123c elementor-align-center elementor-widget elementor-widget-button\" data-id=\"7eea123c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/my.ncsc.gov.uk\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6d6d6427 e-flex e-con-boxed e-con e-parent\" data-id=\"6d6d6427\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-72884c3f e-con-full e-flex e-con e-child\" data-id=\"72884c3f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c59176 elementor-widget elementor-widget-image\" data-id=\"9c59176\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"360\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Webinar_1-1024x576.jpg\" class=\"attachment-large size-large wp-image-5735\" alt=\"Image Credit: IfOnlyCommunications | Cybsrescurity Journalist, CYBER Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Webinar_1-1024x576.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Webinar_1-300x169.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Webinar_1-768x432.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_Webinar_1.jpg 1344w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"> Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-261fa4e1 e-con-full e-flex e-con e-child\" data-id=\"261fa4e1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b934e55 elementor-widget elementor-widget-wp-widget-text\" data-id=\"1b934e55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>3). <\/strong><strong>What is Multi Factor Authentication and why should SMEs use it?\u00a0<\/strong>Multi-factor authentication (MFA; two-factor authentication, or 2FA)\u00a0is a multi-step account login process that requires users to enter more information than just a password. For example, along with the password, users might be asked to enter a code sent to their email, answer a secret question, or scan a fingerprint. MFA protects personal data\u2014which may include personal identification or financial assets\u2014from being accessed by an unauthorized third party that may have been able to discover, for example, a single password.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-226cee1 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"226cee1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a2a3a6b e-flex e-con-boxed e-con e-parent\" data-id=\"a2a3a6b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-788a453c elementor-widget elementor-widget-html\" data-id=\"788a453c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script type=\"text\/javascript\" src=\"https:\/\/creative.prf.hn\/creative\/camref:1101loxy2\/creativeref:1101l50785\"><\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5cd4328 e-flex e-con-boxed e-con e-parent\" data-id=\"5cd4328\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-62d3e9d3 e-con-full e-flex e-con e-child\" data-id=\"62d3e9d3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-597c1d9d elementor-widget elementor-widget-image\" data-id=\"597c1d9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"426\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-1024x682.jpg\" class=\"attachment-large size-large wp-image-3368\" alt=\"Image Credit: Florian Pircher\/Pixabay | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-57c4f342 e-con-full e-flex e-con e-child\" data-id=\"57c4f342\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-30a885c9 elementor-widget elementor-widget-wp-widget-text\" data-id=\"30a885c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>CYBER VOICE\/PR WIRE | <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/about-cyber_voice-sme-cybersecurity-pr\/\" target=\"_blank\" rel=\"noopener\">POST YOUR NEWS HERE<\/a><\/strong><\/p>\n<p class=\"body-copy\"><strong>CYBER TRAINING:<\/strong>\u00a0<a href=\"https:\/\/www.sans.org\/course-preview\/\" target=\"_blank\" rel=\"noopener\">Test Drive World-Class SANS\u00a0Cyber Security Training <\/a><br \/>\n<strong>GARTNER:\u00a0<\/strong><a href=\"https:\/\/www.gartner.com\/en\/information-technology\/insights\/it-symposium-keynote?utm_campaign=RM_GB_2024_ITAI_C_BB3_SYMTAKEAWAYSAI_RS&amp;utm_medium=email&amp;utm_source=Eloqua&amp;cm_mmc=Eloqua-_-Email-_-LM_RM_GB_2024_ITAI_C_BB3_SYMTAKEAWAYSAI_RS-_-0000\" target=\"_blank\" rel=\"noopener\">Roll out the AI Opportunity Radar to your executive team.<\/a><br \/>\n<strong>VEEAM:<\/strong>\u00a0<a href=\"https:\/\/go.veeam.com\/wp-cyber-resilient-data-recovery-strategy?st=drip&amp;utm_source=drip&amp;utm_medium=email&amp;utm_campaign=pln_coreprod&amp;ccode=pln_coreprod&amp;mkt_tok=ODcwLUxCRy0zMTIAAAGQv-zTxO0iIgjbzzOfUcympJDeB8x1qzL00WKKGi9els_NcnZcFOcB3Xawvo3c5zxPbYiei7Dwl1KisM3btM1TNqEUGDsOQGywOwouyuxMWUKMVvUSz1kj\" target=\"_blank\" rel=\"noopener\">Cybersecurity Best Practices and Hybrid Cloud Resilience.\u00a0<\/a><br \/>\n<strong>SME RESOURCES:<\/strong>\u00a0<a href=\"https:\/\/www.datadoghq.com\/dg\/monitor\/personalized-demo-request\/?utm_source=Nurture&amp;utm_medium=Nurture&amp;utm_campaign=Nurture-202305NewContentDownloads3d_ab&amp;mkt_tok=ODc1LVVWWS02ODUAAAGQ0U2SyBsbJU8A6GvvW9BOMiJLhYbS2tifEPJgWqzsFYWM8N0r11HCntSYKb3IAEDuqWpYW22nWKtEumbrJ-8gZA-0g3u2BVXd5gKG6DjByAQ2jefTZM-5o4fu0A\" target=\"_blank\" rel=\"noopener\">Why Choose Datadog? Full-Stack Observability.\u00a0<\/a><br \/>\n<strong>SPLUNK:<\/strong>\u00a0<a href=\"https:\/\/www.splunk.com\/en_us\/form\/a-cios-guide-to-observability.html?fbclid=IwAR2p2iMbfxcyQ7spXmbpSBeJe6g8I46TTCxu9udSeJsxOjAe2wjqhP_mrKo\" target=\"_blank\" rel=\"noopener\">Best practices for practical observability \u2013 must-read report.<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-77922cc5 e-flex e-con-boxed e-con e-parent\" data-id=\"77922cc5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8c83134 e-con-full e-flex e-con e-child\" data-id=\"8c83134\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-30c37883 elementor-widget elementor-widget-image\" data-id=\"30c37883\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"400\" height=\"265\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/IF_Kenya_Cropped.png\" class=\"attachment-large size-large wp-image-3101\" alt=\"Cybersecurity Journalist, Daily Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/IF_Kenya_Cropped.png 400w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/IF_Kenya_Cropped-300x199.png 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6cbd1a2 e-con-full e-flex e-con e-child\" data-id=\"6cbd1a2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45e22345 elementor-widget elementor-widget-wp-widget-text\" data-id=\"45e22345\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>ABOUT IAIN FRASER \u2013<\/strong> Gibraltar based Accredited Journalist, Authority Writer &amp; Commentator on all aspects of <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-the-definition-of-an-sme-in-europe\/\" target=\"_blank\" rel=\"noopener\"><strong>SME<\/strong><\/a> (Small, Medium Sized Business) Cybersecurity, Latest Threat Intelligence, Scam Alerts and Best Practice Compliance &amp; Mitigation. In addition to Publishing <strong>CYBERInsights<\/strong>, I contribute to 20+ News Sites, Blogs &amp; Digital Magazines.<\/p>\n<p><em>If you need high quality, well-researched content \u2013 Features, Articles, Web Content, Product\/Service Review or Guest Post on any aspect of Business (<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-the-definition-of-an-sme-in-europe\/\" target=\"_blank\" rel=\"noopener\"><strong>SME<\/strong><\/a>) Cybersecurity \u2013 On time, On budget, Every time \u2026\u00a0<strong>then We Should Talk!<\/strong>\u00a0| Email:\u00a0<a href=\"mailto:iain@iainfraser.net\">iain@iainfraser.net<\/a><\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: IfOnlyCommunications Image Credit: Tumisu\/Pixabay Learn More \/&#8230; Image Credit: IfOnlyCommunications Learn More \/&#8230;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":5687,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[14],"tags":[419],"ppma_author":[505],"class_list":["post-6074","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberinsights","tag-cyberinsights"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/contact-us-2993000_1280.jpg",1280,848,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/contact-us-2993000_1280-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/contact-us-2993000_1280-300x199.jpg",300,199,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/contact-us-2993000_1280-768x509.jpg",640,424,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/contact-us-2993000_1280-1024x678.jpg",640,424,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/contact-us-2993000_1280.jpg",1280,848,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/contact-us-2993000_1280.jpg",1280,848,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/contact-us-2993000_1280-1024x678.jpg",1024,678,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/contact-us-2993000_1280-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" rel=\"category tag\">SMECYBERIINSIGHTS<\/a>","tag_info":"SMECYBERIINSIGHTS","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/6074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=6074"}],"version-history":[{"count":0,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/6074\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/5687"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=6074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=6074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=6074"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=6074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}