{"id":9171,"date":"2024-06-04T11:06:09","date_gmt":"2024-06-04T09:06:09","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=9171"},"modified":"2024-06-11T19:02:45","modified_gmt":"2024-06-11T17:02:45","slug":"the-paradox-of-share-and-defend","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/06\/04\/the-paradox-of-share-and-defend\/","title":{"rendered":"THREAT INTEL: The Paradox of Share and Defend &#8211; Reactive Measures in a Proactive World"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9171\" class=\"elementor elementor-9171\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b8f65a9 e-flex e-con-boxed e-con e-parent\" data-id=\"4b8f65a9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-36f06e99 elementor-widget elementor-widget-html\" data-id=\"36f06e99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d4da376 e-flex e-con-boxed e-con e-parent\" data-id=\"5d4da376\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7186a6fc e-con-full e-flex e-con e-child\" data-id=\"7186a6fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68d4626b elementor-widget elementor-widget-html\" data-id=\"68d4626b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e3ffd87 elementor-widget elementor-widget-image\" data-id=\"6e3ffd87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/pixabay.com\/users\/jarmoluk-143740\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed-300x200.jpg\" class=\"attachment-medium size-medium wp-image-9177\" alt=\"Image Credit: MichalJARMOLUK\/Pixabay\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: MichalJARMOLUK\/Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a0b314 elementor-widget elementor-widget-image\" data-id=\"7a0b314\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/pixabay.com\/users\/jarmoluk-143740\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"156\" height=\"300\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/1717483341459-156x300.jpg\" class=\"attachment-medium size-medium wp-image-9179\" alt=\"1717483341459\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/1717483341459-156x300.jpg 156w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/1717483341459.jpg 422w\" sizes=\"auto, (max-width: 156px) 100vw, 156px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: MichalJARMOLUK\/Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d4faa45 e-con-full e-flex e-con e-child\" data-id=\"2d4faa45\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-62b3f84 elementor-widget elementor-widget-wp-widget-text\" data-id=\"62b3f84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar: Tuesday, 4 June 2024 at 09:45 CET<\/p>\n<p><strong>CYBER THREAT INTEL: The Paradox of Share and Defend: Reactive Measures in a Proactive World.<\/strong><\/p>\n<p><strong>By <a href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">Andy Jenkinson\u00a0<\/a> &#8211; Group CEO CIP<\/strong><br \/>\n<strong>via: <a href=\"https:\/\/www.google.com\/search?q=cyber+insights&amp;rlz=1C1PRFI_enES1110ES1110&amp;oq=cyber+in&amp;gs_lcrp=EgZjaHJvbWUqDAgAECMYJxiABBiKBTIMCAAQIxgnGIAEGIoFMgYIARBFGDkyBggCEEUYPDIGCAMQRRg8MgYIBBBFGDwyBggFEEUYQTIGCAYQRRhBMgYIBxBFGEGoAgCwAgE&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Cyber Insights<\/a><\/strong><br \/>\n<strong>SME Cybersecurity News<\/strong><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=The+Paradox+of+Share+and+Defend+%E2%80%93+Reactive+Measures+in+a+Proactive+World&amp;sca_esv=8bbf3b779c27648f&amp;sca_upv=1&amp;sxsrf=ADLYWIJln-SaVYF99JN-VHpOJmOQ3pNSyA%3A1717675935823&amp;ei=n6dhZtz7Mf-tkdUPlYXGqQY&amp;ved=0ahUKEwicx_m_-caGAxX_VqQEHZWCMWUQ4dUDCBA&amp;uact=5&amp;oq=The+Paradox+of+Share+and+Defend+%E2%80%93+Reactive+Measures+in+a+Proactive+World&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiSlRoZSBQYXJhZG94IG9mIFNoYXJlIGFuZCBEZWZlbmQg4oCTIFJlYWN0aXZlIE1lYXN1cmVzIGluIGEgUHJvYWN0aXZlIFdvcmxkSABQAFgAcAB4AJABAJgBAKABAKoBALgBA8gBAPgBAZgCAKACAJgDAJIHAKAHAA&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 040624 at 11:50 CET<\/a><\/p>\n<p><em>#CYBERVoice #SMECyberPR <\/em><em>#SMECybersecurityNews #WhitethornShield #InternetSecurity #DNS #PKI #CyberCrime #CyberInsurance<\/em><\/p>\n<p><a href=\"https:\/\/www.google.com\/search?q=The+Paradox+of+Share+and+Defend%3A+Reactive+Measures+in+a+Proactive+World&amp;sca_esv=58b950c9619ab1a8&amp;rlz=1C1PRFI_enES1110ES1110&amp;sxsrf=ADLYWIJuAjb0o5g9eyQwpq9SkhtfWDLpKg%3A1717570432699&amp;ei=gAtgZp35Ke2jkdUP78zfqQM&amp;ved=0ahUKEwiduZG88MOGAxXtUaQEHW_mNzUQ4dUDCBA&amp;uact=5&amp;oq=The+Paradox+of+Share+and+Defend%3A+Reactive+Measures+in+a+Proactive+World&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiR1RoZSBQYXJhZG94IG9mIFNoYXJlIGFuZCBEZWZlbmQ6IFJlYWN0aXZlIE1lYXN1cmVzIGluIGEgUHJvYWN0aXZlIFdvcmxkSABQAFgAcAB4AJABAJgBAKABAKoBALgBA8gBAPgBAZgCAKACAJgDAJIHAKAHAA&amp;sclient=gws-wiz-serp#ip=1\" target=\"_blank\" rel=\"noopener\"><strong>The Paradox of Share and Defend: Reactive Measures in a Proactive World.<\/strong><\/a><\/p>\n<p><strong>The National Cyber Security Centre\u00b4s, (part of <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/gchq\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">GCHQ)<\/a> &#8216;Share and Defend&#8217; program, though ambitious, and we have every right to be flattered by its very existence, harbors a fundamental flaw: its partners\u2019 lack of understanding, and security in the critical areas of Internet Assets and DNS management.<\/strong><\/p>\n<div class=\"feed-shared-update-v2__description-wrapper mr2\">\n<div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--3-lines feed-shared-inline-show-more-text--expanded \" data-artdeco-is-focused=\"true\">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p><span class=\"break-words tvm-parent-container\"><span dir=\"ltr\">Take the partners <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/jisc\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>Jisc<\/strong><\/a> and <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/bt\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">BT Group<\/a><\/strong>, both are completely exposed to cybercrime due to exposed and insecure Internet Assets and DNS. This surely raises pressing questions about the program\u2019s efficacy as both contribute substantially to the UK&#8217;s security exposure.<\/span><\/span><\/p>\n<p><strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/jisc\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Jisc<\/a><\/strong>, responsible for technology and connectivity in educational institutions, and <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/bt\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">BT Group<\/a><\/strong>, managing phone lines for the majority of UK households, inadvertently by default, expose every child and household (unknowingly) to significant cyber risks.<\/p>\n<p>Their demonstrable vulnerabilities in managing their own Internet Assets and DNS undermine the very essence of what &#8216;Share and Defend&#8217; aims to achieve.<\/p>\n<p>This paradox is troubling. How can a program be expected to secure national cyber infrastructure when its foundational partners struggle with basic security principles?<\/p>\n<p>This situation casts doubt on whether &#8216;Share and Defend&#8217; can be more than a reactive platform. Instead of preemptively fortifying defenses, it risks merely responding to breaches and partial information after the damage is done.<\/p>\n<p>In a landscape where proactive defense is paramount, relying on entities with a track record of security lapses to lead the charge is a perilous strategy. The NCSC and UK Government would be wise to reevaluate their approach, ensuring that the partners are not only contributors but exemplars of robust cybersecurity practices.<\/p>\n<p>Only then can we hope that &#8216;Share and Defend&#8217; transforms from a reactive measure into a proactive bulwark against cyber threats.<\/p>\n<p><em>FBI Cyber Division |\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/fbi\/posts\/?feedView=all\" target=\"_blank\" rel=\"noopener\">Federal Bureau of Investigation<\/a> (FBI) |<a href=\"https:\/\/www.linkedin.com\/company\/the-white-house\/\" target=\"_blank\" rel=\"noopener\">\u00a0The White House<\/a> | <a href=\"https:\/\/www.linkedin.com\/company\/ncscc\/\" target=\"_blank\" rel=\"noopener\">National Cybersecurity Coordination Center<\/a> (NCSCC)<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78d69d17 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"78d69d17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e546de0 elementor-widget elementor-widget-wp-widget-text\" data-id=\"6e546de0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong><span lang=\"en-GB\">About Andy Jenkinson<\/span><\/strong><\/p>\n<p><strong><span lang=\"en-GB\">Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech &amp; Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset &amp; DNS Vulnerabilities.<\/span><\/strong><\/p>\n<p>Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years\u2019 experience<br \/>\nas a hands-on lateral thinking CEO, coach, and leader. A \u2018big deal\u2019 business accelerator, and<br \/>\ninspirational, lateral thinker, Andy has crafted, created, and been responsible for delivering<br \/>\n100\u2019s \u00a3 millions of projects within the Cyber, Technical, Risk and Compliance markets for<br \/>\nsome of the world\u2019s largest, leading organisations. Andy has a demonstrable track record<br \/>\nof largescale technical delivery and management within many sectors including the<br \/>\nProfessional, Managed, and Financial Services.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27aae436 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"27aae436\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-59b6b9a2 e-flex e-con-boxed e-con e-parent\" data-id=\"59b6b9a2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1855d9cd elementor-widget elementor-widget-html\" data-id=\"1855d9cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-95f345c e-flex e-con-boxed e-con e-parent\" data-id=\"95f345c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3b3a8a6f e-con-full e-flex e-con e-child\" data-id=\"3b3a8a6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4783cc8d elementor-widget elementor-widget-html\" data-id=\"4783cc8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39f9021e elementor-widget elementor-widget-image\" data-id=\"39f9021e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/smartmockups_ltgx2hla-300x200.jpg\" class=\"attachment-medium size-medium wp-image-9075\" alt=\"Iain FRASER | Cybersecurity Journalist, Authority Writer &amp; Publisher CYBERInsights\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/smartmockups_ltgx2hla-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/smartmockups_ltgx2hla-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/smartmockups_ltgx2hla-768x511.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/elementor\/thumbs\/smartmockups_ltgx2hla-qoypuqj38vrt1cge5h0fveunnrqeixbgx7854flc8o.jpg 450w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/smartmockups_ltgx2hla.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ef218ec e-con-full e-flex e-con e-child\" data-id=\"5ef218ec\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-20c27e22 elementor-widget elementor-widget-wp-widget-text\" data-id=\"20c27e22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><a href=\"https:\/\/docs.google.com\/presentation\/d\/e\/2PACX-1vTqVsw0fG2FiGp8UjWt2GHInxCLWWw41rZd5nkmOBwUctASkzr7Wu5y5scEVsaVrhDQ2gjkMOZBbV5n\/pub?start=true&amp;loop=false&amp;delayms=5000&amp;slide=id.p1\" target=\"_blank\" rel=\"noopener\"><strong>ABOUT CYBER VOICE | SME CYBER PR<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/docs.google.com\/presentation\/d\/e\/2PACX-1vTqVsw0fG2FiGp8UjWt2GHInxCLWWw41rZd5nkmOBwUctASkzr7Wu5y5scEVsaVrhDQ2gjkMOZBbV5n\/pub?start=true&amp;loop=false&amp;delayms=5000&amp;slide=id.p1\" target=\"_blank\" rel=\"noopener\"><strong>CYBERVoice<\/strong><\/a> provides direct, immediate, highly cost-effective access to our Proprietary Subscriber base* of 132,000*+ Named &amp; Profiled (PECR, GDPR &amp; DKIM Compliant) Owners, Partners &amp; Directors of <strong>SMEs<\/strong> throughout <strong>Europe &amp; the UK<\/strong>.<\/p>\n<p><a href=\"https:\/\/docs.google.com\/presentation\/d\/e\/2PACX-1vTqVsw0fG2FiGp8UjWt2GHInxCLWWw41rZd5nkmOBwUctASkzr7Wu5y5scEVsaVrhDQ2gjkMOZBbV5n\/pub?start=true&amp;loop=false&amp;delayms=5000&amp;slide=id.p1\" target=\"_blank\" rel=\"noopener\"><strong>CYBERVoice<\/strong><\/a> is available with varying User Options from Single Release to bi-Annual &amp; Unlimited Annual Campaigns available all delivering outstanding ROI! <strong><a href=\"mailto:cyberinsights@iainfraser.net\">Post Your First Release FREE<\/a>! <\/strong><\/p>\n<p>#SMECybersecurity #CyberVoice #SMECyberPR<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: MichalJARMOLUK\/Pixabay Image Credit: MichalJARMOLUK\/Pixabay Learn More \/&#8230; Learn More \/&#8230; Image Credit: IfOnlyCommunications<\/p>\n","protected":false},"author":1,"featured_media":9177,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[440],"tags":[439],"ppma_author":[505],"class_list":["post-9171","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberthreat-intel","tag-cyberthreat-intel"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed.jpg",1280,853,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed-300x200.jpg",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed-768x512.jpg",640,427,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed-1024x682.jpg",640,426,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed.jpg",1280,853,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed.jpg",1280,853,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed-1024x682.jpg",1024,682,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" rel=\"category tag\">SME CYBER\/THREAT INTEL<\/a>","tag_info":"SME CYBER\/THREAT INTEL","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/9171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=9171"}],"version-history":[{"count":0,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/9171\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/9177"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=9171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=9171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=9171"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=9171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}