{"id":7283,"date":"2024-05-08T07:00:33","date_gmt":"2024-05-08T05:00:33","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=7283"},"modified":"2024-05-09T08:26:40","modified_gmt":"2024-05-09T06:26:40","slug":"cyberinsights-for-080524","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/05\/08\/cyberinsights-for-080524\/","title":{"rendered":"CYBER INSIGHTS: Wednesday 08 May 2024 \u2013 Today\u2019s SME Cybersecurity News &#038; Intelligence"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7283\" class=\"elementor elementor-7283\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1fdd35b3 e-flex e-con-boxed e-con e-parent\" data-id=\"1fdd35b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-60a96608 e-con-full e-flex e-con e-child\" data-id=\"60a96608\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1e7ed elementor-widget elementor-widget-image\" data-id=\"e1e7ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"225\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg\" class=\"attachment-medium size-medium wp-image-5079\" alt=\"Image Credit: IfOnlyCommunications | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity News,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-300x225.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-1024x768.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl-768x576.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/03\/smartmockups_ltgx38rl.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-324e1eb e-con-full e-flex e-con e-child\" data-id=\"324e1eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4340fa98 elementor-widget elementor-widget-wp-widget-text\" data-id=\"4340fa98\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar: Wednesday\u00a0 8th May 2024 at 07:00 CET<\/p>\n<p><strong>CYBER INSIGHTS: The Latest <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;sca_esv=350977eb0947f7bf&amp;sxsrf=ACQVn0-rYmAEbInLOanb9VZn4-wiMXumXw%3A1709712339874&amp;source=hp&amp;ei=0yPoZbGhM_GakdUPj-G_oAM&amp;iflsig=ANes7DEAAAAAZegx4zIh63qA8kSg92IhC_JF7xz151s1&amp;oq=sme+cyber&amp;gs_lp=Egdnd3Mtd2l6IglzbWUgY3liZXIqAggBMgQQIxgnMgQQIxgnMgQQIxgnMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgYQABgWGB5IzCdQAFjlDXAAeACQAQCYAZ8CoAGgDaoBBTAuNS40uAEDyAEA-AEBmAIJoALSDsICChAjGIAEGIoFGCfCAgsQABiABBiKBRiRAsICCxAuGIAEGMcBGNEDwgIKEAAYgAQYigUYQ8ICBRAuGIAEwgIKEAAYgAQYFBiHApgDAJIHBzAuNS4zLjGgB7BS&amp;sclient=gws-wiz#ip=1\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News <\/a><\/strong><strong>&amp; Intelligence &#8230;<\/strong><br \/>\nWritten &amp; Curated By\u00a0<a href=\"https:\/\/www.google.com\/search?q=cybersecurity+journalist&amp;oq=Cybersec&amp;gs_lcrp=EgZjaHJvbWUqCQgAEEUYOxiABDIJCAAQRRg7GIAEMgYIARBFGDsyBwgCEAAYgAQyBggDEEUYQDIGCAQQRRg5MgcIBRAAGIAEMgcIBhAAGIAEMgcIBxAAGIAE0gEJMzc1MmowajE1qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser \u2013 Cybersecurity Journalist,<\/a><br \/>\n<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">IainFRASER.net\/CYBERInsights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=sme+cyber+insights&amp;oq=&amp;gs_lcrp=EgZjaHJvbWUqCQgAECMYJxjqAjIJCAAQIxgnGOoCMgkIARAjGCcY6gIyCQgCECMYJxjqAjIJCAMQIxgnGOoCMgkIBBAjGCcY6gIyCQgFECMYJxjqAjIJCAYQIxgnGOoCMgkIBxAjGCcY6gLSAQkxMDU1ajBqMTWoAgiwAgE&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cyber Insights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=sme+cyber+insights&amp;oq=&amp;gs_lcrp=EgZjaHJvbWUqCQgAECMYJxjqAjIJCAAQIxgnGOoCMgkIARAjGCcY6gIyCQgCECMYJxjqAjIJCAMQIxgnGOoCMgkIBBAuGCcY6gIyDwgFEC4YJxjHARjqAhjRAzIJCAYQIxgnGOoCMgkIBxAuGCcY6gLSAQkxNzYwajBqMTWoAgiwAgE&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Google Indexed on 080524 at 07:50 CET<\/a><\/p>\n<p><em>#SMECyberInsights #SMECybersecurityNews #AI #Phishing #BigTech #Phishing<\/em><\/p>\n<p><strong>Welcome to Today&#8217;s Edition of CYBERInsights <\/strong>&#8211; My Daily Roundup of the Latest European <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;sca_esv=350977eb0947f7bf&amp;sxsrf=ACQVn0-rYmAEbInLOanb9VZn4-wiMXumXw%3A1709712339874&amp;source=hp&amp;ei=0yPoZbGhM_GakdUPj-G_oAM&amp;iflsig=ANes7DEAAAAAZegx4zIh63qA8kSg92IhC_JF7xz151s1&amp;oq=sme+cyber&amp;gs_lp=Egdnd3Mtd2l6IglzbWUgY3liZXIqAggBMgQQIxgnMgQQIxgnMgQQIxgnMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgYQABgWGB5IzCdQAFjlDXAAeACQAQCYAZ8CoAGgDaoBBTAuNS40uAEDyAEA-AEBmAIJoALSDsICChAjGIAEGIoFGCfCAgsQABiABBiKBRiRAsICCxAuGIAEGMcBGNEDwgIKEAAYgAQYigUYQ8ICBRAuGIAEwgIKEAAYgAQYFBiHApgDAJIHBzAuNS4zLjGgB7BS&amp;sclient=gws-wiz#ip=1\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News<\/a> including: 1). AI Powered Phishing 2). Big tech 3). What is Phishing?<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a5d3907 e-flex e-con-boxed e-con e-parent\" data-id=\"5a5d3907\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-50d3e724 elementor-widget elementor-widget-html\" data-id=\"50d3e724\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4557d613 e-flex e-con-boxed e-con e-parent\" data-id=\"4557d613\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3af647e3 e-con-full e-flex e-con e-child\" data-id=\"3af647e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42bd9453 elementor-widget elementor-widget-image\" data-id=\"42bd9453\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/pixabay.com\/users\/deltaworks-37465\/?utm_source=link-attribution&#038;utm_medium=referral&#038;utm_campaign=image&#038;utm_content=7768527\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"426\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_KohjiASAKAWA_Pixabay-1024x682.jpg\" class=\"attachment-large size-large wp-image-7390\" alt=\"Image Credit: DeltaWorks\/Pixabay\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_KohjiASAKAWA_Pixabay-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_KohjiASAKAWA_Pixabay-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_KohjiASAKAWA_Pixabay-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_KohjiASAKAWA_Pixabay.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: DeltaWorks\/Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-138144d9 e-con-full e-flex e-con e-child\" data-id=\"138144d9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-489d88fa elementor-widget elementor-widget-wp-widget-text\" data-id=\"489d88fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>1).\u00a0<\/strong><strong><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-ai-artificial-intelligence\/\" target=\"_blank\" rel=\"noopener\">AI<\/a>: 60% INCREASE IN AI POWERED <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-phishing\/\" target=\"_blank\" rel=\"noopener\">PHISHING<\/a>\u00a0 ASSAULT<\/strong> \u2013 Latest Report Reveals Rapidly Evolving Phishing Landscape, underlining the need to adopt a Zero Trust Architecture with a 60% Increase in AI-Driven Phishing Attacks according to Cloud Security leader <a href=\"https:\/\/www.zscaler.com\/\" target=\"_blank\" rel=\"noopener\"><strong>ZScaler\u00a0<\/strong><\/a>\u2013\u00a0<strong>\u201cVishing\u201d<\/strong> (Voice Phishing) and <strong>Deepfake<\/strong>\u00a0 attacks on the increase with the finance and insurance industry faced 27.8% of overall phishing attacks.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f1c5fff elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6f1c5fff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bcb945 elementor-widget elementor-widget-wp-widget-text\" data-id=\"5bcb945\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>2).\u00a0<\/strong><strong>BIG TECH: EU Targets Big Tech in Digital Markets Act Investigation \u2013<\/strong>\u00a0The European Commission has launched a non-compliance investigation under the Digital Markets Act on a group of so called \u201cBig Tech\u201d firms including Google Play and Apples App Store. The Commission suspects that the measures put in place by these gatekeepers fall short of effective compliance of their obligations under the Digital Markets Act.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-499c6358 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"499c6358\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c686555 elementor-widget elementor-widget-wp-widget-text\" data-id=\"7c686555\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>3). KPI: <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-phishing\/\" target=\"_blank\" rel=\"noopener\">What is Phishing<\/a>? Phishing<\/strong>, a deceptive cybercrime technique, and poses a significant threat to <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a> globally, impacting them financially and operationally. <strong>SME&#8217;s<\/strong> are particularly vulnerable to <strong>Phishing<\/strong> attacks due to their limited resources and often inadequate cybersecurity measures. Cybercriminals exploit the lack of sophisticated IT security infrastructure in <strong>SMEs<\/strong> to launch successful <strong>Phishing<\/strong> campaigns, leading to substantial financial losses and reputational damage.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e57ee19 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"5e57ee19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-phishing\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c0608e e-flex e-con-boxed e-con e-parent\" data-id=\"5c0608e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4db225ac e-con-full e-flex e-con e-child\" data-id=\"4db225ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3afa3594 elementor-widget elementor-widget-image\" data-id=\"3afa3594\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"400\" height=\"265\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/IF_Kenya_Cropped.png\" class=\"attachment-large size-large wp-image-3101\" alt=\"Cybersecurity Journalist, Daily Cyber Insights, SME Cybersecurity,\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/IF_Kenya_Cropped.png 400w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/02\/IF_Kenya_Cropped-300x199.png 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f48421f e-con-full e-flex e-con e-child\" data-id=\"1f48421f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-568765f7 elementor-widget elementor-widget-wp-widget-text\" data-id=\"568765f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>ABOUT IAIN FRASER \u2013<\/strong> I am a Gibraltar based, Accredited Journalist, (*NUJ, IFJ &amp; ONA) Authority Writer, Industry Influencer &amp; Commentator on all aspects of <strong>Cybersecurity<\/strong> [Awareness, Threat Management, Best Practice Compliance &amp; Mitigation] and report throughout Europe.<\/p>\n<p>I also cover the sectors where I have either operational experience or subject matter expert knowledge including: Geopolitics <em>esp.<\/em> Geocrime, Defence Technology, AI, Autonomous Transport &amp; National Security and contribute to a broad range of European facing news channels, blogs and digital magazines as either Guest Feature Writer, Columnist or Consultant Editor. <em>Email: <a href=\"mailto:iain@iainfraser.net\">iain@iainfraser.net<\/a><\/em>\u00a0| <em>LinkedIn Bio: <a href=\"https:\/\/www.linkedin.com\/in\/iainfraserjournalist\/\" target=\"_blank\" rel=\"noopener\">IainFraserJournalist<\/a><\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: IfOnlyCommunications Image Credit: DeltaWorks\/Pixabay Learn More \/&#8230; Learn More \/&#8230; Learn More \/&#8230;<\/p>\n","protected":false},"author":2,"featured_media":7390,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[14],"tags":[419],"ppma_author":[415],"class_list":["post-7283","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberinsights","tag-cyberinsights"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_KohjiASAKAWA_Pixabay.jpg",1280,853,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_KohjiASAKAWA_Pixabay-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_KohjiASAKAWA_Pixabay-300x200.jpg",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_KohjiASAKAWA_Pixabay-768x512.jpg",640,427,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_KohjiASAKAWA_Pixabay-1024x682.jpg",640,426,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_KohjiASAKAWA_Pixabay.jpg",1280,853,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_KohjiASAKAWA_Pixabay.jpg",1280,853,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_KohjiASAKAWA_Pixabay-1024x682.jpg",1024,682,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/Image_KohjiASAKAWA_Pixabay-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist - Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" rel=\"category tag\">SMECYBERIINSIGHTS<\/a>","tag_info":"SMECYBERIINSIGHTS","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/7283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=7283"}],"version-history":[{"count":0,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/7283\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/7390"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=7283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=7283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=7283"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=7283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}