{"id":14488,"date":"2025-04-22T17:27:37","date_gmt":"2025-04-22T17:27:37","guid":{"rendered":"https:\/\/intelliworx.co\/uk\/?page_id=14488"},"modified":"2025-04-29T02:30:48","modified_gmt":"2025-04-29T02:30:48","slug":"secure-steps-your-path-to-cybersecurity","status":"publish","type":"page","link":"https:\/\/intelliworx.co\/uk\/secure-steps-your-path-to-cybersecurity\/","title":{"rendered":"Secure Steps: Your Path to Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"14488\" class=\"elementor elementor-14488\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-53d56c0 e-flex e-con-boxed e-con e-parent\" data-id=\"53d56c0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-adfea70 e-con-full e-flex e-con e-child\" data-id=\"adfea70\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-259b797 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"259b797\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Secure Steps<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a041c2 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"4a041c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Safeguarding Business Integrity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7566f22 elementor-widget__width-initial elementor-widget-tablet__width-initial animated-slow elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"7566f22\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity isn\u2019t just about ticking boxes \u2013 it\u2019s about staying one step ahead. The digital landscape is full of rising threats, but with proactive strategies, you can outsmart them. Turning defence into opportunity doesn\u2019t just shield your organisation, it empowers you to lead the charge and leave competitors trailing behind.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b6d989 elementor-widget__width-initial animated-slow elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"6b6d989\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Understanding the Basics<\/strong><br \/>Cyber threats are becoming increasingly sophisticated, but understanding the key risks can help you stay prepared. Here are common types of attacks you should know about:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-261d827 animated-slow elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"261d827\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8424019 e-con-full e-flex e-con e-child\" data-id=\"8424019\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-dc2846f e-con-full e-flex e-con e-child\" data-id=\"dc2846f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1598c31 elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"1598c31\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_1598c31\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"teenyicon ti-envelope\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Spear Phishing <\/h3>\t\t\t\t<p>Email phishing is a broad attempt to deceive recipients into clicking malicious links or providing sensitive information. <br><br> Spear phishing on the other hand is a targeted attempt to deceive a specific individual or organization with sophisticated emails tailored to the target.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-038878a elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"038878a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_038878a\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"teenyicon ti-id\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Whaling <\/h3>\t\t\t\t<p>Whaling is a social engineering attack that targets high-level executives or other high-profile individuals in order to steal sensitive information or financial data.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15a790c elementor-align-center elementor-invisible elementor-widget elementor-widget-ld_button\" data-id=\"15a790c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"ld_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<a \n\t\t\t\thref=\"https:\/\/intelliworx.activehosted.com\/content\/pq8W8\/2025\/04\/16\/41f22ce9-9b7d-4e67-a1eb-0d09b67aa4d1.pdf\" target=\"_blank\"class=\"elementor-button btn btn-solid btn-xsm btn-icon-shaped btn-has-label\"\t\t\t>\n\t\t\t\t\t\t\t\t\t<span data-text=\"Download the Guide Now\" class=\"btn-txt\">\n\t\t\t\t\t\tDownload the Guide Now\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee8dd66 e-con-full e-flex e-con e-child\" data-id=\"ee8dd66\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-136d962 elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"136d962\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_136d962\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"feather icon-phone-call\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Vishing <\/h3>\t\t\t\t<p>Vishing is a social engineering attack that uses phone calls to trick victims into revealing sensitive information.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eee8b75 animated-slow elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"eee8b75\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:800}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_eee8b75\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"teenyicon ti-mobile\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Smishing <\/h3>\t\t\t\t<p>Smishing is a social engineering attack that uses text messages to trick victims into revealing sensitive information.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a852e3c animated-slow elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"a852e3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:1000}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_a852e3c\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"teenyicon ti-laptop\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Pharming <\/h3>\t\t\t\t<p>Pharming is a social engineering attack that redirects users to fraudulent websites resembling the legitimate site, aiming to trick them into entering personal information for unauthorized access. These attacks are ever evolving, especially with AI<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-299a177 e-flex e-con-boxed e-con e-parent\" data-id=\"299a177\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7f6759b e-con-full e-flex e-con e-child\" data-id=\"7f6759b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0007087 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"0007087\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Phishing Works<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8b6f0c9 e-con-full e-flex e-con e-child\" data-id=\"8b6f0c9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-45dd5f9 e-con-full e-flex e-con e-child\" data-id=\"45dd5f9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7572e35 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"7572e35\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Social engineering is an attack vector that relies on human interaction to manipulate people into giving up sensitive information <br \/>or taking actions that compromise security. Social engineers use a variety of human-based attacks which include phishing.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-12db8e6 e-con-full e-flex e-con e-child\" data-id=\"12db8e6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8a5d2df elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"8a5d2df\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_8a5d2df\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Select the bait <\/h3>\t\t\t\t<p>Threat actors pose as trusted entities (e.g colleagues or reputable organisations) to deceive victims into sharing sensitive information or downloading malware through enticing email subject lines, such as alerts or\ninformation requests.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb8fac4 elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"eb8fac4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_eb8fac4\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Set the hook <\/h3>\t\t\t\t<p>Threat actors use a variety of techniques to trick users into clicking on malicious links or opening infected attachments. These techniques can be very effective, as even a single bite can lead to successful exploitation.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7410f7d elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"7410f7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_7410f7d\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Reel in the catch of the day <\/h3>\t\t\t\t<p>The threat actor successfully exploits a victim when an email bypasses network or endpoint protections and the victim responds with valuable information or interacts with malicious links and attachments, enabling the theft of sensitive data or compromising the endpoint with disguised malware.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd92574 elementor-invisible elementor-widget elementor-widget-ld_button\" data-id=\"cd92574\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"ld_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<a \n\t\t\t\thref=\"https:\/\/intelliworx.activehosted.com\/content\/pq8W8\/2025\/04\/16\/41f22ce9-9b7d-4e67-a1eb-0d09b67aa4d1.pdf\" target=\"_blank\"class=\"elementor-button btn btn-solid btn-xsm btn-icon-shaped btn-has-label\"\t\t\t>\n\t\t\t\t\t\t\t\t\t<span data-text=\"Access Your Free Guide\" class=\"btn-txt\">\n\t\t\t\t\t\tAccess Your Free Guide\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-18c778f e-con-full e-flex e-con e-child\" data-id=\"18c778f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2fc70e5 animated-slow elementor-invisible elementor-widget elementor-widget-image\" data-id=\"2fc70e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"661\" height=\"1024\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 661 1024&#039;%2F%3E\" class=\"attachment-large size-large wp-image-14493 ld-lazyload\" alt=\"\" data-src=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/iStock-1470607326-1-661x1024.jpg\" data-srcset=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/iStock-1470607326-1-661x1024.jpg 661w, https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/iStock-1470607326-1-194x300.jpg 194w, https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/iStock-1470607326-1.jpg 913w\" data-sizes=\"(max-width: 661px) 100vw, 661px\" data-aspect=\"0.6455078125\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d019ddb e-flex e-con-boxed e-con e-parent\" data-id=\"d019ddb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1b0bde7 e-con-full e-flex e-con e-child\" data-id=\"1b0bde7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-863c94d e-con-full e-flex e-con e-child\" data-id=\"863c94d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da73589 animated-slow elementor-invisible elementor-widget elementor-widget-image\" data-id=\"da73589\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"725\" height=\"782\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 725 782&#039;%2F%3E\" class=\"attachment-large size-large wp-image-14530 ld-lazyload\" alt=\"\" data-src=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/the-anatomy-of-phishing-email-1.png\" data-srcset=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/the-anatomy-of-phishing-email-1.png 725w, https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/the-anatomy-of-phishing-email-1-278x300.png 278w\" data-sizes=\"(max-width: 725px) 100vw, 725px\" data-aspect=\"0.927109974425\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d4214b0 e-con-full e-flex e-con e-child\" data-id=\"d4214b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-26b2e4d e-con-full e-flex e-con e-child\" data-id=\"26b2e4d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88d98ce elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"88d98ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What happens if you click on a link in a phishing email?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-674ff3e elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"674ff3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_674ff3e\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"far fa-credit-card\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Identity Theft <\/h3>\t\t\t\t<p>When you click on malicious links or open infected attachments in emails from unknown senders, a cybercriminal can have access to your personal information, which can be used to commit identity theft, such as opening credit card accounts, taking \nout loans, or filing fraudulent tax returns.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0baa8cb elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"0baa8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_0baa8cb\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"remixicon ri-bug-line\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Malware Infection <\/h3>\t\t\t\t<p>When recipients unknowingly click on malicious links or download infected attachments, this can lead to installation of malware on their devices. Once the malware is installed, it can compromise the security of \nthe system, steal data, or allow unauthorized access to the victim\u2019s device and network.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-001f19a elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"001f19a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_001f19a\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"remixicon ri-coins-line\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Business Disruption, Revenue Loss, and \nReputation Damage <\/h3>\t\t\t\t<p>When employees fall victim to deceptive emails and unintentionally divulge sensitive company information or credentials to cybercriminals, the company becomes vulnerable to data breaches, financial theft, or unauthorised access to critical systems. This can result to serious financial losses, reputational damage, and significant operational disruptions.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f9a607f e-flex e-con-boxed e-con e-parent\" data-id=\"f9a607f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-da79f1f e-con-full e-flex e-con e-child\" data-id=\"da79f1f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a05d6c animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"4a05d6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Whaling Attacks Happen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fd239c8 e-flex e-con-boxed e-con e-parent\" data-id=\"fd239c8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1bad9cc e-con-full e-flex e-con e-child\" data-id=\"1bad9cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0ce6e9b e-con-full e-flex e-con e-child\" data-id=\"0ce6e9b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-32e6a3c e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"32e6a3c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;zoomIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t<div class=\"elementor-element elementor-element-e0a9df3 e-con-full e-flex e-con e-child\" data-id=\"e0a9df3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-706fef4 elementor-widget elementor-widget-heading\" data-id=\"706fef4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Impersonation<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1c8ca4 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"b1c8ca4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"far fa-window-close\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-def96a3 e-con-full e-flex e-con e-child\" data-id=\"def96a3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9bf753e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"9bf753e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e675874 elementor-widget elementor-widget-text-editor\" data-id=\"e675874\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Hackers may impersonate high-value individuals to convince lower-level employees to act quickly.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d5fbee e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"7d5fbee\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;zoomIn&quot;,&quot;animation_delay&quot;:600}\">\n\t\t<div class=\"elementor-element elementor-element-42bec6f e-con-full e-flex e-con e-child\" data-id=\"42bec6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b55b64 elementor-widget elementor-widget-heading\" data-id=\"1b55b64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">High-value targets<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efb11f6 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"efb11f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"far fa-window-close\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-75c3790 e-con-full e-flex e-con e-child\" data-id=\"75c3790\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5db43f8 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5db43f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f56ac3b elementor-widget elementor-widget-text-editor\" data-id=\"f56ac3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Hackers target CEOs, COOs, and company presidents who may have direct access to credentials or funds.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9ca570a e-con-full e-flex e-con e-child\" data-id=\"9ca570a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2742d6b e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"2742d6b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;,&quot;animation&quot;:&quot;zoomIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t<div class=\"elementor-element elementor-element-bc7364b e-con-full e-flex e-con e-child\" data-id=\"bc7364b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69a9bbe elementor-widget-mobile__width-initial elementor-widget elementor-widget-heading\" data-id=\"69a9bbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Infected links, attachments or landing pages<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-450b172 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"450b172\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"far fa-window-close\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e37d5f9 e-con-full e-flex e-con e-child\" data-id=\"e37d5f9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f6a418a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f6a418a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8962533 elementor-widget elementor-widget-text-editor\" data-id=\"8962533\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Embedded in the body of a text message or spoofed email, hackers deposit malware onto vulnerable devices.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e214b15 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"e214b15\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;,&quot;animation&quot;:&quot;zoomIn&quot;,&quot;animation_delay&quot;:800}\">\n\t\t<div class=\"elementor-element elementor-element-db9f4fe e-con-full e-flex e-con e-child\" data-id=\"db9f4fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3803da0 elementor-widget elementor-widget-heading\" data-id=\"3803da0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Spoofed or urgent emails<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d0e79f elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"1d0e79f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"far fa-window-close\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3f27843 e-con-full e-flex e-con e-child\" data-id=\"3f27843\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-09e4c05 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"09e4c05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57b19ec elementor-widget elementor-widget-text-editor\" data-id=\"57b19ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>These look almost identical to trusted emails from well-known brands or organisations which hackers use to ask for immediate action from the recipient.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b8e0e83 e-flex e-con-boxed e-con e-parent\" data-id=\"b8e0e83\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b2e50da e-con-full e-flex e-con e-child\" data-id=\"b2e50da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c150256 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"c150256\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vishing Attack Mechanism<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-79df24b e-con-full e-flex e-con e-child\" data-id=\"79df24b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9dbbeb0 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"9dbbeb0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;zoomIn&quot;,&quot;animation_delay&quot;:600}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-49bd595 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"49bd595\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-number-3\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac7da2f elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ac7da2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f0afb7 elementor-widget elementor-widget-text-editor\" data-id=\"5f0afb7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>They pose as a <strong>legitimate <\/strong><strong>authority<\/strong> to steal sensitive or financial data<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-039363f elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"039363f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"teenyicon ti-bank\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7a4c2c0 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"7a4c2c0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;zoomIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-60d97e7 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"60d97e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-number-2\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1177ac1 elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1177ac1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d54029 elementor-widget elementor-widget-text-editor\" data-id=\"3d54029\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>They <strong>spoof caller ID <\/strong>and start calling numbers<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15a5370 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"15a5370\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"far fa-keyboard\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e86d640 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"e86d640\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;zoomIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eb189ba elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"eb189ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-number-1\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e96f55d elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e96f55d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5aacf6b elementor-widget elementor-widget-text-editor\" data-id=\"5aacf6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Criminals <strong>harvest phone numbers<\/strong> of potential victims by war dialing or hacking<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2c792c elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"d2c792c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"feather icon-phone-call\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ffdbcba e-flex e-con-boxed e-con e-parent\" data-id=\"ffdbcba\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b6520b6 e-con-full e-flex e-con e-child\" data-id=\"b6520b6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b0462be e-con-full e-flex e-con e-child\" data-id=\"b0462be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8787e90 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"8787e90\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Beware of Smishing<\/strong> (SMS phishing)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a880be2 e-con-full e-flex e-con e-child\" data-id=\"a880be2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a3211e0 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"a3211e0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;zoomIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c2b288 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"4c2b288\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-number-1\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f048ce3 elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f048ce3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b664cc1 elementor-widget elementor-widget-text-editor\" data-id=\"b664cc1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>First, the attacker <strong>sends a message<\/strong> containing a malicious link.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e975c75 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"e975c75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"feather icon-link\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2b76b0e e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"2b76b0e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;zoomIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-18de5db elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"18de5db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-number-2\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c47443e elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c47443e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d948ba elementor-widget elementor-widget-text-editor\" data-id=\"0d948ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Then the user <strong>opens the text<\/strong>, clicks the link, and gives away private data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c2d1e8 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8c2d1e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-cursor-line\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-967fca2 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"967fca2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;zoomIn&quot;,&quot;animation_delay&quot;:600}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c533e0 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"3c533e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-number-3\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e77d3b5 elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e77d3b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42d8373 elementor-widget elementor-widget-text-editor\" data-id=\"42d8373\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Lastly, the data is used to <strong>commit fraud<\/strong> or for profit making.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1636196 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"1636196\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"teenyicon ti-credit-card\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-acda5b9 e-flex e-con-boxed e-con e-parent\" data-id=\"acda5b9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e38b18f e-con-full e-flex e-con e-child\" data-id=\"e38b18f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8484dcf animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"8484dcf\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pharming Explained<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3f2d18c e-flex e-con-boxed e-con e-parent\" data-id=\"3f2d18c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7280469 e-con-full e-flex e-con e-child\" data-id=\"7280469\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c84f0a3 e-con-full e-flex e-con e-child\" data-id=\"c84f0a3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c629104 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"c629104\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"289\" height=\"247\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 289 247&#039;%2F%3E\" class=\"attachment-large size-large wp-image-14532 ld-lazyload\" alt=\"\" data-src=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/step-1.png\" data-aspect=\"1.17004048583\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d551b22 elementor-widget__width-initial animated-slow elementor-view-default elementor-invisible elementor-widget elementor-widget-icon\" data-id=\"d551b22\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"feather icon-arrow-right\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4b42925 e-con-full e-flex e-con e-child\" data-id=\"4b42925\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f7f6c0f elementor-invisible elementor-widget elementor-widget-image\" data-id=\"f7f6c0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"286\" height=\"251\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 286 251&#039;%2F%3E\" class=\"attachment-large size-large wp-image-14533 ld-lazyload\" alt=\"\" data-src=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/step-2.png\" data-aspect=\"1.13944223108\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cab7f95 elementor-widget__width-initial animated-slow elementor-view-default elementor-invisible elementor-widget elementor-widget-icon\" data-id=\"cab7f95\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"feather icon-arrow-right\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d5cfb14 e-con-full e-flex e-con e-child\" data-id=\"d5cfb14\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f6922c3 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"f6922c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"284\" height=\"249\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 284 249&#039;%2F%3E\" class=\"attachment-large size-large wp-image-14534 ld-lazyload\" alt=\"\" data-src=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/step-3.png\" data-aspect=\"1.140562249\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2194247 elementor-widget__width-initial animated-slow elementor-view-default elementor-invisible elementor-widget elementor-widget-icon\" data-id=\"2194247\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"feather icon-arrow-right\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c6326c6 e-con-full e-flex e-con e-child\" data-id=\"c6326c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec46fe4 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"ec46fe4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:800}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"470\" height=\"309\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 470 309&#039;%2F%3E\" class=\"attachment-large size-large wp-image-14535 ld-lazyload\" alt=\"\" data-src=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/laptop.png\" data-srcset=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/laptop.png 470w, https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/laptop-300x197.png 300w\" data-sizes=\"(max-width: 470px) 100vw, 470px\" data-aspect=\"1.52103559871\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28b05b4 e-flex e-con-boxed e-con e-parent\" data-id=\"28b05b4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f0373f7 e-con-full e-flex e-con e-child\" data-id=\"f0373f7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-658084f elementor-widget__width-initial animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"658084f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity by Numbers<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43e7a10 animated-slow elementor-widget-divider--separator-type-pattern elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"43e7a10\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\" style=\"--divider-pattern-url: url(&quot;data:image\/svg+xml,%3Csvg xmlns=&#039;http:\/\/www.w3.org\/2000\/svg&#039; preserveAspectRatio=&#039;none&#039; overflow=&#039;visible&#039; height=&#039;100%&#039; viewBox=&#039;0 0 24 24&#039; fill=&#039;none&#039; stroke=&#039;black&#039; stroke-width=&#039;1&#039; stroke-linecap=&#039;square&#039; stroke-miterlimit=&#039;10&#039;%3E%3Cpath d=&#039;M0,6c6,0,6,13,12,13S18,6,24,6&#039;\/%3E%3C\/svg%3E&quot;);\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6aeb68f e-con-full e-flex e-con e-child\" data-id=\"6aeb68f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-91c13f7 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"91c13f7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t<div class=\"elementor-element elementor-element-6a35f96 e-con-full e-flex e-con e-child\" data-id=\"6a35f96\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61c1f39 elementor-widget elementor-widget-heading\" data-id=\"61c1f39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How common are cyber attacks?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79ff01c elementor-widget elementor-widget-heading\" data-id=\"79ff01c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3.4bn daily<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eccb8f6 elementor-widget elementor-widget-text-editor\" data-id=\"eccb8f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishing is the most common form of cybercrime globally, with an estimated 3.4 billion spam emails sent every day\u00b9<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd819dd elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bd819dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d1ae7fb e-con-full e-flex e-con e-child\" data-id=\"d1ae7fb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f0d2cf elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"1f0d2cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Google blocks \n100 million phishing \nemails daily \nworldwide\u00b2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26853aa elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"26853aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"172\" height=\"143\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 172 143&#039;%2F%3E\" class=\"attachment-large size-large wp-image-14536 ld-lazyload\" alt=\"\" data-src=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/envelope.png\" data-aspect=\"1.2027972028\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68f7957 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"68f7957\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7a57111 e-con-full e-flex e-con e-child\" data-id=\"7a57111\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-efaa767 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"efaa767\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-globe\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d57bd99 elementor-widget elementor-widget-heading\" data-id=\"d57bd99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">23%<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-964e708 e-con-full e-flex e-con e-child\" data-id=\"964e708\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ac62ef elementor-widget elementor-widget-text-editor\" data-id=\"1ac62ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>of phishing attacks worldwide were directed toward financial institutions\u00b3<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b5899c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3b5899c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ee8236 elementor-widget__width-initial elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"7ee8236\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6411bd9 e-con-full e-flex e-con e-child\" data-id=\"6411bd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2eb9870 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"2eb9870\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t<div class=\"elementor-element elementor-element-2b03afe e-con-full e-flex e-con e-child\" data-id=\"2b03afe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b2dbfa elementor-widget elementor-widget-heading\" data-id=\"7b2dbfa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00a3\u00a3\u00a3\u2019s<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bc65e2 elementor-widget elementor-widget-text-editor\" data-id=\"0bc65e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Each phishing attack costs corporations \u00a33.98 million, on <br \/>average\u2074<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e184c38 elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e184c38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b881d3e e-con-full e-flex e-con e-child\" data-id=\"b881d3e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd13765 elementor-widget elementor-widget-text-editor\" data-id=\"dd13765\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The average cost of the most <br \/>disruptive breach in the UK in the <br \/>past 12 months was approximately <br \/>\u00a31,205 for businesses\u2075<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b144e8 elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1b144e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e7c29c3 e-con-full e-flex e-con e-child\" data-id=\"e7c29c3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-488e1f3 elementor-widget elementor-widget-text-editor\" data-id=\"488e1f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the past year, 43% of UK businesses and 30% of charities reported experiencing a cyber <br \/>security breach or attack. This equates to approximately 612,000 <br \/>businesses\u2075<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c64f4b elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2c64f4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-54941ff e-con-full e-flex e-con e-child\" data-id=\"54941ff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e46ac36 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"e46ac36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Google and Facebook <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03056b7 elementor-widget elementor-widget-text-editor\" data-id=\"03056b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>were scammed out of \u00a375.5 million by fake invoice emails\u2076<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02a1a39 elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"02a1a39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6697709 e-con-full e-flex e-con e-child\" data-id=\"6697709\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a123664 elementor-widget elementor-widget-heading\" data-id=\"a123664\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">By 2028<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe87678 elementor-widget elementor-widget-text-editor\" data-id=\"fe87678\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>the cost of cybercrime worldwide, which includes phishing scams, will reach \u00a310.7 trillion\u2077<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fc0be4 elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"5fc0be4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d367c1 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"1d367c1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:600}\">\n\t\t<div class=\"elementor-element elementor-element-04ca588 e-con-full e-flex e-con e-child\" data-id=\"04ca588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c812c5c e-con-full e-flex e-con e-child\" data-id=\"c812c5c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51482ac elementor-widget elementor-widget-heading\" data-id=\"51482ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing is a major problem in the UK<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-96174d4 e-con-full e-flex e-con e-child\" data-id=\"96174d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9598f3e elementor-widget elementor-widget-heading\" data-id=\"9598f3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">85%<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c724c9 elementor-widget elementor-widget-text-editor\" data-id=\"3c724c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>of UK businesses were affected by <br \/>phishing in the past year\u2075<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff70fc9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ff70fc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-65f7254 e-con-full e-flex e-con e-child\" data-id=\"65f7254\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9075f40 elementor-widget elementor-widget-heading\" data-id=\"9075f40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">83%<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd62e29 elementor-widget elementor-widget-text-editor\" data-id=\"bd62e29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>of organisations that suffered a cyberattack in the past year said that it was caused by phishing<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b6662 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a7b6662\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6106e8d e-con-full e-flex e-con e-child\" data-id=\"6106e8d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ae437f7 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"ae437f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_2\" viewBox=\"0 0 367.01 348.41\"><defs><style>      .cls-1 {        fill: none;        stroke: #29abe2;        stroke-miterlimit: 10;        stroke-width: 11.57px;      }    <\/style><\/defs><g id=\"Layer_1-2\" data-name=\"Layer_1\"><g><g><path class=\"cls-1\" d=\"M224.57,156.27c0,80.52.26,125.2-8.44,186.35h-65.25c-8.7-61.15-8.44-105.83-8.44-186.35\"><\/path><path class=\"cls-1\" d=\"M142.44,227.89h0s-10.97,0-10.97,0c-11.67,0-21.12-9.46-21.12-21.12v-81.86h0c.18-.15,24.17-20.64,73.16-20.64s72.9,20.41,73.16,20.64v81.86c0,11.67-9.46,21.12-21.12,21.12h-10.98\"><\/path><line class=\"cls-1\" x1=\"183.5\" y1=\"341.02\" x2=\"183.5\" y2=\"240.57\"><\/line><path class=\"cls-1\" d=\"M215.81,39.91c0,21.64-14.25,38.63-31.82,38.63s-31.82-17-31.82-38.63,14.25-34.12,31.82-34.12,31.82,12.48,31.82,34.12Z\"><\/path><\/g><g><path class=\"cls-1\" d=\"M109.89,247.88c0,35.47-2.41,58.85-7.37,93.69h-59.67c-7.95-55.91-7.72-96.78-7.72-170.41\"><\/path><path class=\"cls-1\" d=\"M35.14,236.65h0s-10.04,0-10.04,0c-10.67,0-19.32-8.65-19.32-19.32v-74.86h0c.17-.14,22.1-18.87,66.9-18.87h12.56\"><\/path><line class=\"cls-1\" x1=\"72.69\" y1=\"340.32\" x2=\"72.69\" y2=\"248.24\"><\/line><path class=\"cls-1\" d=\"M102.23,62.49c0,19.79-13.03,35.33-29.1,35.33s-29.1-15.54-29.1-35.33,13.03-31.2,29.1-31.2,29.1,11.41,29.1,31.2Z\"><\/path><\/g><g><path class=\"cls-1\" d=\"M257.12,247.88c0,35.47,2.41,58.85,7.37,93.69h59.67c7.95-55.91,7.72-96.78,7.72-170.41\"><\/path><path class=\"cls-1\" d=\"M331.87,236.65h0s10.04,0,10.04,0c10.67,0,19.32-8.65,19.32-19.32v-74.86h0c-.17-.14-22.1-18.87-66.9-18.87h-13.09\"><\/path><line class=\"cls-1\" x1=\"294.32\" y1=\"340.32\" x2=\"294.32\" y2=\"248.24\"><\/line><path class=\"cls-1\" d=\"M264.78,62.49c0,19.79,13.03,35.33,29.1,35.33s29.1-15.54,29.1-35.33-13.03-31.2-29.1-31.2-29.1,11.41-29.1,31.2Z\"><\/path><\/g><\/g><\/g><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b7870b elementor-widget elementor-widget-text-editor\" data-id=\"9b7870b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Half of employees in these organisations said they had received a phishing message in the previous month<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7171527 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7171527\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f57525 elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8f57525\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4e1de42 e-con-full e-flex e-con e-child\" data-id=\"4e1de42\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-33ac50b e-con-full e-flex e-con e-child\" data-id=\"33ac50b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e5cc60 elementor-widget elementor-widget-heading\" data-id=\"4e5cc60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How UK organisations deal with cybersecurity failures<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-349a4b3 e-con-full e-flex e-con e-child\" data-id=\"349a4b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d237440 elementor-widget elementor-widget-heading\" data-id=\"d237440\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">77%<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e043d3 elementor-widget elementor-widget-text-editor\" data-id=\"7e043d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>of UK organisations punish employees who interact with genuine or simulated phishing attacks<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bbdd082 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bbdd082\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-16ab13e e-con-full e-flex e-con e-child\" data-id=\"16ab13e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-64c986f elementor-widget elementor-widget-heading\" data-id=\"64c986f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">84%<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30442c9 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"30442c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>of CISOs in the UK believe their companies are at high risk of a material cyberattack\u2078<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-871f5c4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"871f5c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5da68f1 e-con-full e-flex e-con e-child\" data-id=\"5da68f1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4dd06b1 elementor-widget elementor-widget-heading\" data-id=\"4dd06b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">29%<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-569dc88 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"569dc88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>of UK organisations terminate employees who interact with phishing attacks<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-18f6513 e-con-full e-flex e-con e-child\" data-id=\"18f6513\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b0c8800 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"b0c8800\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Source: itgovernance.co.uk\/blog\/51-must-know-phishing-statistics-for-2023<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e4d0b4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6e4d0b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-70e094c e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"70e094c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:800}\">\n\t\t<div class=\"elementor-element elementor-element-92a266d e-con-full e-flex e-con e-child\" data-id=\"92a266d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f958297 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"f958297\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/earthweb.com\/how-many-phishing-emails-are-sent-daily\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">1. https:\/\/earthweb.com\/how-many-phishing-emails-are-sent-daily<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.digitaltrends.com\/computing\/google-ai-blocks-100-million-spam-messages-daily\/\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">2. https:\/\/www.digitaltrends.com\/computing\/google-ai-blocks-100-million-spam-messages-daily\/<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.statista.com\/statistics\/266161\/websites-most-affected-by-phishing\/\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">3. https:\/\/www.statista.com\/statistics\/266161\/websites-most-affected-by-phishing\/<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.techopedia.com\/phishing-statistics\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">4. https:\/\/www.techopedia.com\/phishing-statistics<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cbd4022 elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_button\" data-id=\"cbd4022\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"ld_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<a \n\t\t\t\thref=\"https:\/\/intelliworx.activehosted.com\/content\/pq8W8\/2025\/04\/16\/41f22ce9-9b7d-4e67-a1eb-0d09b67aa4d1.pdf\" target=\"_blank\"class=\"elementor-button btn btn-solid btn-xsm btn-icon-shaped btn-has-label\"\t\t\t>\n\t\t\t\t\t\t\t\t\t<span data-text=\"Download the Guide Now\" class=\"btn-txt\">\n\t\t\t\t\t\tDownload the Guide Now\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0ff8ec2 e-con-full e-flex e-con e-child\" data-id=\"0ff8ec2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46d5643 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"46d5643\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2025\/cyber-security-breaches-survey-2025\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">5. https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2025\/cyber-security-breaches-survey-2025<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.cnbc.com\/2019\/03\/27\/phishing-email-scam-stole-100-million-from-facebook-and-google.html\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">6. https:\/\/www.cnbc.com\/2019\/03\/27\/phishing-email-scam-stole-100-million-from-facebook-and-google.html<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.statista.com\/forecasts\/1280009\/cost-cybercrime-worldwide\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">7. https:\/\/www.statista.com\/forecasts\/1280009\/cost-cybercrime-worldwide<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.statista.com\/topics\/8131\/cyber-crime-and-companies-in-the-uk\/\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">8. https:\/\/www.statista.com\/topics\/8131\/cyber-crime-and-companies-in-the-uk\/<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-83fc1af e-flex e-con-boxed e-con e-parent\" data-id=\"83fc1af\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dab6a17 e-con-full e-flex e-con e-child\" data-id=\"dab6a17\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0261e6d animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"0261e6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to Handle a Successful Phishing Attack<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a4cdfa2 e-con-full e-flex e-con e-child\" data-id=\"a4cdfa2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a933e8 elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"3a933e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_3a933e8\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"  data-shape-border=\"1\" >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"remixicon ri-number-1\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<p><b>Engage your IT support<\/b> or a trusted service provider to handle the phishing attack.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-002378d elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"002378d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_002378d\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"  data-shape-border=\"1\" >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"remixicon ri-number-2\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<p><b>Identify the breach source<\/b> and involve users while fostering a culture of \n openness and security awareness.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9dcc115 elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"9dcc115\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_9dcc115\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"  data-shape-border=\"1\" >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"remixicon ri-number-3\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<p><b>Alert your business banks<\/b> and update financial credentials, if necessary.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e58bde elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"7e58bde\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:800}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_7e58bde\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"  data-shape-border=\"1\" >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"remixicon ri-number-4\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<p><b>Conduct clean-up<\/b> by changing passwords for accounts using similar login information as the stolen one.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a2e3c8 elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"0a2e3c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:1000}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_0a2e3c8\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"  data-shape-border=\"1\" >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"remixicon ri-number-5\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<p><b>Utilise the incident<\/b> as a learning opportunity for your team, offering security training and resources to improve your company\u2019s defenses against future attacks.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98c4da9 elementor-invisible elementor-widget elementor-widget-ld_button\" data-id=\"98c4da9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"ld_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<a \n\t\t\t\thref=\"https:\/\/intelliworx.activehosted.com\/content\/pq8W8\/2025\/04\/16\/41f22ce9-9b7d-4e67-a1eb-0d09b67aa4d1.pdf\" target=\"_blank\"class=\"elementor-button btn btn-solid btn-xsm btn-icon-shaped btn-has-label\"\t\t\t>\n\t\t\t\t\t\t\t\t\t<span data-text=\"Access Your Free Guide\" class=\"btn-txt\">\n\t\t\t\t\t\tAccess Your Free Guide\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-de6225b e-flex e-con-boxed e-con e-parent\" data-id=\"de6225b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2dcb183 e-con-full e-flex e-con e-child\" data-id=\"2dcb183\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-bac7371 e-con-full animated-slow e-flex elementor-invisible e-con e-child\" data-id=\"bac7371\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInDown&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ffd2d2f elementor-widget elementor-widget-heading\" data-id=\"ffd2d2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Building a Cyber Resilient Modern Workplace:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c66113 elementor-widget elementor-widget-heading\" data-id=\"7c66113\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Essential Cyber Hygiene Practices<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-293e614 e-con-full e-flex e-con e-child\" data-id=\"293e614\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f2873cb e-con-full e-flex e-con e-child\" data-id=\"f2873cb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df87d63 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"df87d63\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyberattacks aren\u2019t a question of \u2018if\u2019 but \u2018when\u2019. That\u2019s why cyber resilience \u2013 the ability to prepare for, adapt to, and recover from attacks \u2013 is essential for every business. Today\u2019s hyper\u0002connected workplaces demand a proactive approach to security. By building resilience, you gain customer trust, protect your reputation, and keep critical systems running smoothly.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70a8946 elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"70a8946\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_70a8946\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-wrap align-items-center iconbox-inline iconbox-icon-shaped iconbox-circle\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-num-1\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Multi-Factor Authentication (MFA) <\/h3>\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<p>This adds an extra layer of security beyond passwords.<br><br> Implement Azure Active Directory (Azure AD) Multi-Factor Authentication to significantly strengthen login security.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad40bcb elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"ad40bcb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_ad40bcb\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-wrap align-items-center iconbox-inline iconbox-icon-shaped iconbox-circle\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-num-2\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Zero Trust Principles <\/h3>\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<p>This approach emphasises continuous verification of user and device identity before granting access, minimising privileges, and assuming a potential breach exists.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-069454e e-con-full e-flex e-con e-child\" data-id=\"069454e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8575ccc elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"8575ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Verify Explicitly:<\/strong> Utilise Azure AD Conditional Access to enforce multi-factor authentication and device compliance checks before granting access.<\/p><p><strong>Grant Least Privilege:<\/strong> Leverage Azure AD Privileged Access Management to control <br \/>access to critical resources and minimise the attack surface.<\/p><p><strong>Assume Breach:<\/strong> Implement Microsoft Defender for Endpoint and Microsoft Sentinel for continuous threat detection, investigation, <br \/>and response.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60c2661 elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"60c2661\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:800}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_60c2661\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-wrap align-items-center iconbox-inline iconbox-icon-shaped iconbox-circle\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-num-3\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >XDR and Anti-Malware <\/h3>\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<p>These proactive tools continuously scan for threats, detect suspicious activity, and block malware, providing valuable security insights for \nfurther analysis and response.<br><br>Utilise Microsoft Defender for Endpoint, a comprehensive XDR solution that detects, investigates, and responds to threats across your endpoints.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bee2862 e-con-full e-flex e-con e-child\" data-id=\"bee2862\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4866685 elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"4866685\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:1000}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_4866685\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-wrap align-items-center iconbox-inline iconbox-icon-shaped iconbox-circle\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-num-4\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Software Updates <\/h3>\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<p>Regularly updating firmware, operating systems, and applications is crucial to patch vulnerabilities exploited by attackers. <br><br> Microsoft Endpoint Manager allows for \ncentralised management and deployment of security updates across devices.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1370b9 elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"f1370b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:1200}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_f1370b9\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-wrap align-items-center iconbox-inline iconbox-icon-shaped iconbox-circle\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-num-5\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Data Protection <\/h3>\t\t\t\t\n\t\t\t\t<div class=\"contents \">\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<p>Identifying your critical data, its location, and current security measures allows you to implement appropriate safeguards to protect sensitive information.<br><br> Leverage Microsoft Information Protection (MIP) to classify, label, and protect sensitive data across platforms.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4deeac7 elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_button\" data-id=\"4deeac7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"ld_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<a \n\t\t\t\thref=\"https:\/\/intelliworx.activehosted.com\/content\/pq8W8\/2025\/04\/16\/41f22ce9-9b7d-4e67-a1eb-0d09b67aa4d1.pdf\" target=\"_blank\"class=\"elementor-button btn btn-solid btn-xsm btn-icon-shaped btn-has-label\"\t\t\t>\n\t\t\t\t\t\t\t\t\t<span data-text=\"Don\u2019t Wait \u2013 Get the Guide Now\" class=\"btn-txt\">\n\t\t\t\t\t\tDon\u2019t Wait \u2013 Get the Guide Now\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aaf3a32 e-flex e-con-boxed e-con e-parent\" data-id=\"aaf3a32\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-07648e6 e-con-full e-flex e-con e-child\" data-id=\"07648e6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2edf8c7 animated-slow elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"2edf8c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Microsoft 365:<\/strong> Secure Your Business, <br \/>Focus on Success<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3173194 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"3173194\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The modern workplace demands secure and efficient tools that empower teams to collaborate seamlessly, regardless of location. Microsoft 365 delivers a comprehensive suite of cloud-based applications that cater to this evolving landscape.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2ac94ac e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"2ac94ac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f53e732 elementor-widget elementor-widget-text-editor\" data-id=\"f53e732\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>Microsoft Teams: <span style=\"color: #00ADEE\";>The Secure Hub of Collaboration<\/span><\/strong>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8e34af6 e-con-full e-flex e-con e-child\" data-id=\"8e34af6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c6205fc e-con-full e-flex e-con e-child\" data-id=\"c6205fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f5eee72 elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"f5eee72\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_f5eee72\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-wrap align-items-center iconbox-inline\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"remixicon ri-focus-3-line\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Stay Focused <\/h3>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<p><\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b049b1 elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"5b049b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;_animation_delay&quot;:800}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_5b049b1\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-wrap align-items-center iconbox-inline\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"remixicon ri-chat-1-line\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Secure your Chats <\/h3>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<p><\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e45ee8 elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"4e45ee8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:1000}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_4e45ee8\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-wrap align-items-center iconbox-inline\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"teenyicon ti-bulb-on\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Make Decisions Faster <\/h3>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<p><\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7879b83 elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"7879b83\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:1200}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_7879b83\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-wrap align-items-center iconbox-inline\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"teenyicon ti-text-document-alt\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Identity and Access \nManagement <\/h3>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<p><\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6854aca elementor-align-left elementor-invisible elementor-widget elementor-widget-ld_icon_box\" data-id=\"6854aca\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:1400}\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_6854aca\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-wrap align-items-center iconbox-inline\"   >\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"teenyicon ti-shield-tick\"><\/i><\/div><\/div>\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Information \nProtection <\/h3>\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<p><\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bb2fae2 e-con-full e-flex e-con e-child\" data-id=\"bb2fae2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46036f8 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"46036f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Say goodbye to distractions. Customised notifications prioritise what truly matters, keeping your team on track with ease.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3e8a9e elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"c3e8a9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:800}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Whether it\u2019s private messaging or brainstorming in a group, Teams encrypts your conversations, so your ideas stay protected.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a094661 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"a094661\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:1000}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>No more lengthy meetings. Share ideas, collaborate, and decide with speed and confidence to keep things moving.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32eee1f elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"32eee1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:1200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Protect users\u2019 identities and control access to valuable resources based on risk level.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-abe9299 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"abe9299\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:1400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ensure documents and email are seen only by authorised people.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3bf8dfd e-flex e-con-boxed e-con e-parent\" data-id=\"3bf8dfd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9e21a8e e-con-full e-flex e-con e-child\" data-id=\"9e21a8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-01e7a07 e-con-full e-flex e-con e-child\" data-id=\"01e7a07\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c29598f elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"c29598f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Your Move. <br> Take the Next Step<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-435094f elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"435094f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At Intelliworx, we can help you and your team fight phishing and other cyberattacks every day.<\/p><p><span class=\"TextRun SCXW206270929 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW206270929 BCX8\">Join us for an exclusive <\/span><span class=\"NormalTextRun SCXW206270929 BCX8\">webinar<\/span><span class=\"NormalTextRun SCXW206270929 BCX8\">, designed specifically to help you <\/span><span class=\"NormalTextRun SCXW206270929 BCX8\">get ahead of <\/span><span class=\"NormalTextRun SCXW206270929 BCX8\">digital threats<\/span><span class=\"NormalTextRun SCXW206270929 BCX8\"> and secure your business confidently<\/span><span class=\"NormalTextRun SCXW206270929 BCX8\">.<\/span><span class=\"NormalTextRun SCXW206270929 BCX8\">\u00a0<\/span><\/span><span class=\"EOP SCXW206270929 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-864210e elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-invisible elementor-widget elementor-widget-icon-list\" data-id=\"864210e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-calendar-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">When: 11th June<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-clock\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">12:30 pm \u2013 1:30 pm BST<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9fc48c elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"d9fc48c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Contact us at <strong><a href=\"mailto:hello@intelliworx.co\">hello@intelliworx.co<\/a><\/strong><br \/>Visit <strong><a href=\"https:\/\/intelliworx.co\/uk\/contact\">https:\/\/intelliworx.co\/uk\/contact<\/a><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e269124 e-con-full animated-slow e-flex elementor-invisible e-con e-child\" data-id=\"e269124\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9957119 elementor-widget elementor-widget-html\" data-id=\"9957119\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"_form_75\"><\/div><script src=\"https:\/\/intelliworx.activehosted.com\/f\/embed.php?id=75\" charset=\"utf-8\"><\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Secure Steps Safeguarding Business Integrity Cybersecurity isn\u2019t just about ticking boxes \u2013 it\u2019s about staying one step ahead. The digital landscape is full of rising threats, but with proactive strategies, you can outsmart them. Turning defence into opportunity doesn\u2019t just shield your organisation, it empowers you to lead the charge and leave competitors trailing behind. [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":14491,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-14488","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Guide for UK Businesses | Intelliworx<\/title>\n<meta name=\"description\" content=\"Discover essential cybersecurity practices to protect your business from phishing, malware, and data breaches. Learn how Intelliworx helps UK organisations build a resilient modern workplace.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/intelliworx.co\/uk\/secure-steps-your-path-to-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Guide for UK Businesses | Intelliworx\" \/>\n<meta property=\"og:description\" content=\"Discover essential cybersecurity practices to protect your business from phishing, malware, and data breaches. Learn how Intelliworx helps UK organisations build a resilient modern workplace.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/intelliworx.co\/uk\/secure-steps-your-path-to-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Intelliworx\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IntelliworxGlobal\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-29T02:30:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/security-bg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1980\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Guide for UK Businesses | Intelliworx","description":"Discover essential cybersecurity practices to protect your business from phishing, malware, and data breaches. Learn how Intelliworx helps UK organisations build a resilient modern workplace.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/intelliworx.co\/uk\/secure-steps-your-path-to-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Guide for UK Businesses | Intelliworx","og_description":"Discover essential cybersecurity practices to protect your business from phishing, malware, and data breaches. Learn how Intelliworx helps UK organisations build a resilient modern workplace.","og_url":"https:\/\/intelliworx.co\/uk\/secure-steps-your-path-to-cybersecurity\/","og_site_name":"Intelliworx","article_publisher":"https:\/\/www.facebook.com\/IntelliworxGlobal","article_modified_time":"2025-04-29T02:30:48+00:00","og_image":[{"width":1980,"height":720,"url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/security-bg.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/intelliworx.co\/uk\/secure-steps-your-path-to-cybersecurity\/","url":"https:\/\/intelliworx.co\/uk\/secure-steps-your-path-to-cybersecurity\/","name":"Cybersecurity Guide for UK Businesses | Intelliworx","isPartOf":{"@id":"https:\/\/intelliworx.co\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/intelliworx.co\/uk\/secure-steps-your-path-to-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/intelliworx.co\/uk\/secure-steps-your-path-to-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/security-bg.jpg","datePublished":"2025-04-22T17:27:37+00:00","dateModified":"2025-04-29T02:30:48+00:00","description":"Discover essential cybersecurity practices to protect your business from phishing, malware, and data breaches. Learn how Intelliworx helps UK organisations build a resilient modern workplace.","breadcrumb":{"@id":"https:\/\/intelliworx.co\/uk\/secure-steps-your-path-to-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/intelliworx.co\/uk\/secure-steps-your-path-to-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intelliworx.co\/uk\/secure-steps-your-path-to-cybersecurity\/#primaryimage","url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/security-bg.jpg","contentUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2025\/04\/security-bg.jpg","width":1980,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/intelliworx.co\/uk\/secure-steps-your-path-to-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/intelliworx.co\/uk\/"},{"@type":"ListItem","position":2,"name":"Secure Steps: Your Path to Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/intelliworx.co\/uk\/#website","url":"https:\/\/intelliworx.co\/uk\/","name":"Intelliworx","description":"Managed IT Services","publisher":{"@id":"https:\/\/intelliworx.co\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/intelliworx.co\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/intelliworx.co\/uk\/#organization","name":"Intelliworx","alternateName":"INTELLIWORX","url":"https:\/\/intelliworx.co\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intelliworx.co\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/07\/INX-Logo-colour.png","contentUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/07\/INX-Logo-colour.png","width":600,"height":90,"caption":"Intelliworx"},"image":{"@id":"https:\/\/intelliworx.co\/uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IntelliworxGlobal","https:\/\/www.linkedin.com\/company\/intelliworx\/"]}]}},"_links":{"self":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/pages\/14488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/comments?post=14488"}],"version-history":[{"count":0,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/pages\/14488\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/media\/14491"}],"wp:attachment":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/media?parent=14488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}