{"id":6085,"date":"2024-04-02T07:00:00","date_gmt":"2024-04-02T05:00:00","guid":{"rendered":"https:\/\/cyberinsights.argusgpi.com\/?p=6085"},"modified":"2024-05-09T12:59:30","modified_gmt":"2024-05-09T10:59:30","slug":"cyber-insights-020424","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/04\/02\/cyber-insights-020424\/","title":{"rendered":"CYBER INSIGHTS: Tuesday, 2 April 2024 \u2013 Today\u2019s SME Cybersecurity News &#038; Intelligence\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6085\" class=\"elementor elementor-6085\">\n\t\t\t\t<div class=\"elementor-element elementor-element-59b1cbba e-flex e-con-boxed e-con e-parent\" data-id=\"59b1cbba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-57c5e408 e-con-full e-flex e-con e-child\" data-id=\"57c5e408\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10e98000 elementor-widget elementor-widget-image\" data-id=\"10e98000\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"225\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg\" class=\"attachment-medium size-medium wp-image-5079\" alt=\"Image Credit: IfOnlyCommunications | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-1024x768.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-768x576.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f224b3a e-con-full e-flex e-con e-child\" data-id=\"5f224b3a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-28f2e689 elementor-widget elementor-widget-wp-widget-text\" data-id=\"28f2e689\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar: Tuesday\u00a0 2nd April 2024\u00a0 at 07:00 CET<\/p>\n<p><strong>CYBER INSIGHTS: The Latest <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;sca_esv=350977eb0947f7bf&amp;sxsrf=ACQVn0-rYmAEbInLOanb9VZn4-wiMXumXw%3A1709712339874&amp;source=hp&amp;ei=0yPoZbGhM_GakdUPj-G_oAM&amp;iflsig=ANes7DEAAAAAZegx4zIh63qA8kSg92IhC_JF7xz151s1&amp;oq=sme+cyber&amp;gs_lp=Egdnd3Mtd2l6IglzbWUgY3liZXIqAggBMgQQIxgnMgQQIxgnMgQQIxgnMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgYQABgWGB5IzCdQAFjlDXAAeACQAQCYAZ8CoAGgDaoBBTAuNS40uAEDyAEA-AEBmAIJoALSDsICChAjGIAEGIoFGCfCAgsQABiABBiKBRiRAsICCxAuGIAEGMcBGNEDwgIKEAAYgAQYigUYQ8ICBRAuGIAEwgIKEAAYgAQYFBiHApgDAJIHBzAuNS4zLjGgB7BS&amp;sclient=gws-wiz#ip=1\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News <\/a><\/strong><strong>&amp; Intelligence &#8230;<\/strong><br \/>\nWritten &amp; Curated By\u00a0<a href=\"https:\/\/www.google.com\/search?q=cybersecurity+journalist&amp;oq=Cybersec&amp;gs_lcrp=EgZjaHJvbWUqCQgAEEUYOxiABDIJCAAQRRg7GIAEMgYIARBFGDsyBwgCEAAYgAQyBggDEEUYQDIGCAQQRRg5MgcIBRAAGIAEMgcIBhAAGIAEMgcIBxAAGIAE0gEJMzc1MmowajE1qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser \u2013 Cybersecurity Journalist,<\/a><br \/>\n<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">IainFRASER.net\/CYBERInsights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=sme+cyber+insights&amp;oq=&amp;gs_lcrp=EgZjaHJvbWUqCQgAECMYJxjqAjIJCAAQIxgnGOoCMgkIARAjGCcY6gIyCQgCECMYJxjqAjIJCAMQIxgnGOoCMgkIBBAjGCcY6gIyCQgFECMYJxjqAjIJCAYQIxgnGOoCMgkIBxAjGCcY6gLSAQkxMDU1ajBqMTWoAgiwAgE&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cyber Insights<\/a><br \/>\nGoogle Indexed on 020424 at 07:55 CET<\/p>\n<p><em>#CybersecurityJournalist\u00a0 <\/em><em>#CYBERInsights\u00a0#SMECyberInsights #SMECybersecurityNews<\/em><\/p>\n<p><strong>Welcome to Today&#8217;s Edition of CYBERInsights &#8211; My Daily Roundup of the Latest European <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;sca_esv=350977eb0947f7bf&amp;sxsrf=ACQVn0-rYmAEbInLOanb9VZn4-wiMXumXw%3A1709712339874&amp;source=hp&amp;ei=0yPoZbGhM_GakdUPj-G_oAM&amp;iflsig=ANes7DEAAAAAZegx4zIh63qA8kSg92IhC_JF7xz151s1&amp;oq=sme+cyber&amp;gs_lp=Egdnd3Mtd2l6IglzbWUgY3liZXIqAggBMgQQIxgnMgQQIxgnMgQQIxgnMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgYQABgWGB5IzCdQAFjlDXAAeACQAQCYAZ8CoAGgDaoBBTAuNS40uAEDyAEA-AEBmAIJoALSDsICChAjGIAEGIoFGCfCAgsQABiABBiKBRiRAsICCxAuGIAEGMcBGNEDwgIKEAAYgAQYigUYQ8ICBRAuGIAEwgIKEAAYgAQYFBiHApgDAJIHBzAuNS4zLjGgB7BS&amp;sclient=gws-wiz#ip=1\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News<\/a> &#8230;<\/strong><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1be1a59d e-flex e-con-boxed e-con e-parent\" data-id=\"1be1a59d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79e70e8c elementor-widget elementor-widget-shortcode\" data-id=\"79e70e8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"poptin-embedded\" data-id=\"815664ec428d5\"><\/div><br\/><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7533388 e-flex e-con-boxed e-con e-parent\" data-id=\"7533388\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6827279 elementor-widget elementor-widget-html\" data-id=\"6827279\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loQjS\/creativeref:1101l64059\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loQjS\/creativeref:1101l64059\" width=\"1940\" height=\"500\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-748d22c9 e-flex e-con-boxed e-con e-parent\" data-id=\"748d22c9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1b1b0ac5 e-con-full e-flex e-con e-child\" data-id=\"1b1b0ac5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f8a0e2e elementor-widget elementor-widget-image\" data-id=\"1f8a0e2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"360\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_EU_GDPR_Email_1-1024x576.jpg\" class=\"attachment-large size-large wp-image-5900\" alt=\"Image Credit: IfOnlyCommunications | Cybersecurity Journalist, CYBER Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_EU_GDPR_Email_1-1024x576.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_EU_GDPR_Email_1-300x169.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_EU_GDPR_Email_1-768x432.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_EU_GDPR_Email_1.jpg 1344w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-320ec260 e-con-full e-flex e-con e-child\" data-id=\"320ec260\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6444381c elementor-widget elementor-widget-wp-widget-text\" data-id=\"6444381c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>1). <\/strong><strong>DMARC: What is DMARC? &amp; How to Achieve DMARC Enforcement.<\/strong><br \/>\nImpersonation and spoofing attacks are significant issues for most organizations. It\u2019s creepy. It\u2019s sneaky. It\u2019s an increasingly successful tactic, especially as IT and security teams struggle to achieve full DMARC enforcement. What Is DMARC based Message Authentication?<\/p>\n<p><em>Download the ESG Showcase Whitepaper to explore the DMARC opportunity, its implementation process &amp; an innovative approach to successful DMARC.<a href=\"https:\/\/www.mimecast.com\/resources\/white-papers\/esg-showcase-overcoming-the-challenges-associated-with-achieving-dmarc-enforcement\/download\/?utm_source=marketo&amp;utm_medium=email&amp;utm_campaign=GL-FY24-Q4-NT-TOFU-CG-EM6-WP-ESG-Showcase-DMARC-Enforcement&amp;mkt_tok=MzM2LVRBVS01OTQAAAGRrdYwphiaA44UZ4UhncqB5Ehobkc0ORKLRtTj7fYKJuhLw8vL5EFNWwovN8OPNsEAp5RYDTycFAux-FhjbPTvTI19K03W6fcjZ4MI33Py68LC4hs\" target=\"_blank\" rel=\"noopener\"><strong>\u00a0Learn More \/\u2026<\/strong><\/a><\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc9e369 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"cc9e369\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2cf9e74f e-flex e-con-boxed e-con e-parent\" data-id=\"2cf9e74f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7f06a22e e-con-full e-flex e-con e-child\" data-id=\"7f06a22e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68554533 elementor-widget elementor-widget-image\" data-id=\"68554533\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"360\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/imagebot_12_03_2024-2-1024x576.jpg\" class=\"attachment-large size-large wp-image-5374\" alt=\"Image Credit: IfOnlyCommunications | CYBER Insights, Cybersecurity Journalist, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/imagebot_12_03_2024-2-1024x576.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/imagebot_12_03_2024-2-300x169.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/imagebot_12_03_2024-2-768x432.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/imagebot_12_03_2024-2.jpg 1344w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1bd423e8 e-con-full e-flex e-con e-child\" data-id=\"1bd423e8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dbc4918 elementor-widget elementor-widget-wp-widget-text\" data-id=\"dbc4918\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>2). DIGITAL IDENTITY \u2013 EU PROPOSES THE EU DIGITAL IDENTITY<\/strong>. The\u00a0<strong>EU<\/strong>\u00a0Digital Identity will be available to EU citizens, residents, and businesses who want to identify themselves or provide confirmation of certain personal information. It can be used for both online and offline public and private services across the EU.<\/p>\n<p><em><strong>BENEFITS:<\/strong>\u00a0Operated via digital wallets the\u00a0<strong>EU Digital Identity<\/strong>\u00a0will be a simple and safe way to control how much information you want to share with services that require sharing of information.<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7550b05f elementor-align-center elementor-widget elementor-widget-button\" data-id=\"7550b05f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-57c843e9 e-flex e-con-boxed e-con e-parent\" data-id=\"57c843e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-771929c2 e-con-full e-flex e-con e-child\" data-id=\"771929c2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f1317ce elementor-widget elementor-widget-image\" data-id=\"6f1317ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"360\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_TechyGeek-1024x576.jpg\" class=\"attachment-large size-large wp-image-5183\" alt=\"Image Credit: IfOnlyCommunications| CYBER Insights, CYBER Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_TechyGeek-1024x576.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_TechyGeek-300x169.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_TechyGeek-768x432.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_TechyGeek.jpg 1344w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"> Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6078d918 e-con-full e-flex e-con e-child\" data-id=\"6078d918\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79864889 elementor-widget elementor-widget-wp-widget-text\" data-id=\"79864889\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>3). A MODERN DAY DILEMMA \u2013<\/strong> Wishful thinking doesn\u2019t cut the\u00a0 <strong>Cybersecurity<\/strong>\u00a0mustard in 2024. So the modern day\u00a0<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-the-definition-of-an-sme-in-europe\/\" target=\"_blank\" rel=\"noopener\"><strong>SME<\/strong><\/a>\u00a0dilemma is do you go with old-school thinking and maintain your own<strong>\u00a0SOC<\/strong>\u00a0in-house with your own\u00a0<strong>Cybersecurity<\/strong>\u00a0staff and protocols or do you Outsource the entire operation to a contractor that specialises in\u00a0<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-the-definition-of-an-sme-in-europe\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a>?<\/p>\n<p><em><strong>The SANS 2023 SOC Survey<\/strong>\u00a0looks at the latest capabilities, architecture and technology of the modern security operations center (SOC), including how your security team stacks up against the competition.<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6448b9c3 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6448b9c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.splunk.com\/en_us\/form\/sans-soc-survey.html?utm_campaign=google_emea_tier2_en_search_generic_security&#038;utm_source=google&#038;utm_medium=cpc&#038;utm_content=SANSSOCSurvey_WP&#038;utm_term=security%20operations%20center&#038;_bk=security%20operations%20center&#038;_bt=666763030029&#038;_bm=b&#038;_bn=g&#038;_bg=75654869028&#038;device=c&#038;gad_source=1&#038;gclid=Cj0KCQjw-r-vBhC-ARIsAGgUO2DX3en08FxcYsfIFLxYQr3LIPDuS8lG8J2oLumSmc_NkmTsFnkkrQAaArF0EALw_wcB\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5882ce6a e-flex e-con-boxed e-con e-parent\" data-id=\"5882ce6a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-72240c22 elementor-widget elementor-widget-html\" data-id=\"72240c22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script type=\"text\/javascript\" src=\"https:\/\/creative.prf.hn\/creative\/camref:1101loxy2\/creativeref:1101l50785\"><\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3920c085 e-flex e-con-boxed e-con e-parent\" data-id=\"3920c085\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7279521f e-con-full e-flex e-con e-child\" data-id=\"7279521f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d1f1bc0 elementor-widget elementor-widget-image\" data-id=\"5d1f1bc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"426\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-1024x682.jpg\" class=\"attachment-large size-large wp-image-3368\" alt=\"Image Credit: Florian Pircher\/Pixabay | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/microphone-704255_1280-2.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3dce70f e-con-full e-flex e-con e-child\" data-id=\"3dce70f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2734031d elementor-widget elementor-widget-wp-widget-text\" data-id=\"2734031d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>CYBER VOICE\/PR WIRE | <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/about-cyber_voice-sme-cybersecurity-pr\/\" target=\"_blank\" rel=\"noopener\">POST YOUR NEWS HERE<\/a><\/strong><\/p>\n<p class=\"body-copy\"><strong>CYBER TRAINING:<\/strong>\u00a0<a href=\"https:\/\/www.sans.org\/course-preview\/\" target=\"_blank\" rel=\"noopener\">Test Drive World-Class SANS\u00a0Cyber Security Training <\/a><br \/>\n<strong>GARTNER:\u00a0<\/strong><a href=\"https:\/\/www.gartner.com\/en\/information-technology\/insights\/it-symposium-keynote?utm_campaign=RM_GB_2024_ITAI_C_BB3_SYMTAKEAWAYSAI_RS&amp;utm_medium=email&amp;utm_source=Eloqua&amp;cm_mmc=Eloqua-_-Email-_-LM_RM_GB_2024_ITAI_C_BB3_SYMTAKEAWAYSAI_RS-_-0000\" target=\"_blank\" rel=\"noopener\">Roll out the AI Opportunity Radar to your executive team.<\/a><br \/>\n<strong>VEEAM:<\/strong>\u00a0<a href=\"https:\/\/go.veeam.com\/wp-cyber-resilient-data-recovery-strategy?st=drip&amp;utm_source=drip&amp;utm_medium=email&amp;utm_campaign=pln_coreprod&amp;ccode=pln_coreprod&amp;mkt_tok=ODcwLUxCRy0zMTIAAAGQv-zTxO0iIgjbzzOfUcympJDeB8x1qzL00WKKGi9els_NcnZcFOcB3Xawvo3c5zxPbYiei7Dwl1KisM3btM1TNqEUGDsOQGywOwouyuxMWUKMVvUSz1kj\" target=\"_blank\" rel=\"noopener\">Cybersecurity Best Practices and Hybrid Cloud Resilience.\u00a0<\/a><br \/>\n<strong>SME RESOURCES:<\/strong>\u00a0<a href=\"https:\/\/www.datadoghq.com\/dg\/monitor\/personalized-demo-request\/?utm_source=Nurture&amp;utm_medium=Nurture&amp;utm_campaign=Nurture-202305NewContentDownloads3d_ab&amp;mkt_tok=ODc1LVVWWS02ODUAAAGQ0U2SyBsbJU8A6GvvW9BOMiJLhYbS2tifEPJgWqzsFYWM8N0r11HCntSYKb3IAEDuqWpYW22nWKtEumbrJ-8gZA-0g3u2BVXd5gKG6DjByAQ2jefTZM-5o4fu0A\" target=\"_blank\" rel=\"noopener\">Why Choose Datadog? Full-Stack Observability.\u00a0<\/a><br \/>\n<strong>SPLUNK:<\/strong>\u00a0<a href=\"https:\/\/www.splunk.com\/en_us\/form\/a-cios-guide-to-observability.html?fbclid=IwAR2p2iMbfxcyQ7spXmbpSBeJe6g8I46TTCxu9udSeJsxOjAe2wjqhP_mrKo\" target=\"_blank\" rel=\"noopener\">Best practices for practical observability \u2013 must-read report.<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33c3d619 e-flex e-con-boxed e-con e-parent\" data-id=\"33c3d619\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4b4e1d3d e-con-full e-flex e-con e-child\" data-id=\"4b4e1d3d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1188512f elementor-widget elementor-widget-image\" data-id=\"1188512f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"426\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-1024x682.jpg\" class=\"attachment-large size-large wp-image-3960\" alt=\"Cybersecurity Journalist, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/scam-4126798_1280.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-54ab7328 e-con-full e-flex e-con e-child\" data-id=\"54ab7328\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ea69506 elementor-widget elementor-widget-wp-widget-text\" data-id=\"7ea69506\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>INVESTIGATIONS 2024: <\/strong><\/p>\n<p><strong>1. THE SMALL BUSINESS LOAN SCAM <\/strong>This model of the Small Business Loan Scam started during the Covid Pandemic and true to form the Scammers were offering &#8220;Guaranteed&#8221; <strong>Small Business<\/strong> Loans. Well, I have to report that the Business Loan <strong>Scam<\/strong> is rearing its ugly head. <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">Register Free to read the full Report<\/a><\/p>\n<p><strong>2. PHISHING: The Sextortion scam<\/strong> as it is termed, has raised its ugly head again with a refined Scam for 2024. I first wrote about this nearly six years ago after I received a flurry of emails with the standard copy &amp; paste text. Most <strong>Small Businesses\/ SMEs<\/strong> ignore these threats as not being relevant to business but they would be wrong! <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">Register Free to read the full Report<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-645d427d e-flex e-con-boxed e-con e-parent\" data-id=\"645d427d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6ade1c71 e-con-full e-flex e-con e-child\" data-id=\"6ade1c71\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f8063ea elementor-widget elementor-widget-image\" data-id=\"4f8063ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"400\" height=\"265\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/IF_Kenya_Cropped.png\" class=\"attachment-large size-large wp-image-3101\" alt=\"Cybersecurity Journalist, Daily Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/IF_Kenya_Cropped.png 400w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/IF_Kenya_Cropped-300x199.png 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1469a281 e-con-full e-flex e-con e-child\" data-id=\"1469a281\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b4f918 elementor-widget elementor-widget-wp-widget-text\" data-id=\"7b4f918\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>ABOUT IAIN FRASER \u2013<\/strong> Gibraltar based Accredited Journalist, Authority Writer &amp; Commentator on all aspects of <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-the-definition-of-an-sme-in-europe\/\" target=\"_blank\" rel=\"noopener\"><strong>SME<\/strong><\/a> (Small, Medium Sized Business) Cybersecurity, Latest Threat Intelligence, Scam Alerts and Best Practice Compliance &amp; Mitigation. In addition to Publishing <strong>CYBERInsights<\/strong>, I contribute to 20+ News Sites, Blogs &amp; Digital Magazines.<\/p>\n<p><em>If you need high quality, well-researched content \u2013 Features, Articles, Web Content, Product\/Service Review or Guest Post on any aspect of Business (<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-the-definition-of-an-sme-in-europe\/\" target=\"_blank\" rel=\"noopener\"><strong>SME<\/strong><\/a>) Cybersecurity \u2013 On time, On budget, Every time \u2026\u00a0<strong>then We Should Talk!<\/strong>\u00a0| Email:\u00a0<a href=\"mailto:iain@iainfraser.net\">iain@iainfraser.net<\/a><\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: IfOnlyCommunications Image Credit: IfOnlyCommunications Learn More \/&#8230; Image Credit: IfOnlyCommunications Learn More \/&#8230;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":5900,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[14],"tags":[419],"ppma_author":[505],"class_list":["post-6085","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberinsights","tag-cyberinsights"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_EU_GDPR_Email_1.jpg",1344,756,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_EU_GDPR_Email_1-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_EU_GDPR_Email_1-300x169.jpg",300,169,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_EU_GDPR_Email_1-768x432.jpg",640,360,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_EU_GDPR_Email_1-1024x576.jpg",640,360,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_EU_GDPR_Email_1.jpg",1344,756,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_EU_GDPR_Email_1.jpg",1344,756,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_EU_GDPR_Email_1-1024x576.jpg",1024,576,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/CI_EU_GDPR_Email_1-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" rel=\"category tag\">SMECYBERIINSIGHTS<\/a>","tag_info":"SMECYBERIINSIGHTS","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/6085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=6085"}],"version-history":[{"count":0,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/6085\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/5900"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=6085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=6085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=6085"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=6085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}