{"id":1733,"date":"2026-01-23T08:54:34","date_gmt":"2026-01-23T08:54:34","guid":{"rendered":"https:\/\/sod-it.co.uk\/?p=1733"},"modified":"2026-01-20T13:57:41","modified_gmt":"2026-01-20T13:57:41","slug":"modern-threats-hiding-in-plain-sight-when-your-people-become-the-target","status":"publish","type":"post","link":"https:\/\/sod-it.co.uk\/dev-2024\/modern-threats-hiding-in-plain-sight-when-your-people-become-the-target\/","title":{"rendered":"Modern Threats Hiding in Plain Sight: When Your People Become the Target"},"content":{"rendered":"<p data-start=\"362\" data-end=\"470\">As we outline in our latest eBook, the biggest risk to your business might not be a dodgy link or an outdated firewall\u2014it could be your people.<\/p>\n<p data-start=\"472\" data-end=\"731\">In 2026, cybercrime isn\u2019t about brute force. It\u2019s about manipulation. It\u2019s about using AI to mimic real people. It\u2019s about tricking employees into giving access without ever realising they\u2019ve done it. And it\u2019s happening to businesses of every size, every day.<\/p>\n<h3 data-start=\"733\" data-end=\"764\"><strong data-start=\"737\" data-end=\"764\">AI Has Changed the Game<\/strong><\/h3>\n<p data-start=\"766\" data-end=\"830\">You\u2019ve heard of ChatGPT. Now imagine it\u2019s working <em data-start=\"816\" data-end=\"825\">against<\/em> you.<\/p>\n<p data-start=\"832\" data-end=\"1059\">Tools like <strong data-start=\"843\" data-end=\"854\">SpamGPT<\/strong> are already in use by cybercriminals. This AI-powered platform helps attackers generate realistic phishing emails, mimic internal company language, and automate high-volume scams that bypass most filters.<\/p>\n<p data-start=\"1061\" data-end=\"1211\">It works like a marketing platform\u2014only instead of promoting a product, it\u2019s delivering deception. And it doesn\u2019t need a skilled hacker to operate it.<\/p>\n<p data-start=\"1213\" data-end=\"1440\">The result? AI-written emails that <em data-start=\"1248\" data-end=\"1254\">look<\/em> exactly like they\u2019re from your finance director. Malicious pop-ups that <em data-start=\"1327\" data-end=\"1333\">feel<\/em> like they\u2019re from Microsoft. Image files that secretly harvest login details. And they\u2019re getting through.<\/p>\n<h3 data-start=\"1442\" data-end=\"1478\"><strong data-start=\"1446\" data-end=\"1478\">People Are the New Perimeter<\/strong><\/h3>\n<p data-start=\"1480\" data-end=\"1598\">In a world of remote work, cloud apps, and instant communication, the traditional security perimeter no longer exists.<\/p>\n<p data-start=\"1600\" data-end=\"1763\">Attackers know this. That\u2019s why they focus on your staff. They look for emotion\u2014curiosity, stress, trust, urgency\u2014and strike at the moment someone\u2019s guard is down.<\/p>\n<p data-start=\"1765\" data-end=\"1880\">It\u2019s no longer about who has the best firewall. It\u2019s about who has trained their people to stop, think, and verify.<\/p>\n<ul data-start=\"1882\" data-end=\"2215\">\n<li data-start=\"1882\" data-end=\"2002\">\n<p data-start=\"1884\" data-end=\"2002\">89% of businesses reported seeing at least one sophisticated attack targeting collaboration tools like Teams or Slack.<\/p>\n<\/li>\n<li data-start=\"2003\" data-end=\"2117\">\n<p data-start=\"2005\" data-end=\"2117\">A single session token, sold on a dark forum, can give an attacker full access to your company\u2019s chat and files.<\/p>\n<\/li>\n<li data-start=\"2118\" data-end=\"2215\">\n<p data-start=\"2120\" data-end=\"2215\">Fake MFA failures. Click-to-fix popups. Fake invoices. All common. All increasingly convincing.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"2217\" data-end=\"2255\"><strong data-start=\"2221\" data-end=\"2255\">Training is No Longer Optional<\/strong><\/h3>\n<p data-start=\"2257\" data-end=\"2382\">87% of companies say they train staff on cyber threats\u2014but 33% still worry those same staff would fall for a phishing attack.<\/p>\n<p data-start=\"2384\" data-end=\"2485\">Why? Because not all training is equal. And most businesses still treat it as a box-ticking exercise.<\/p>\n<p data-start=\"2487\" data-end=\"2523\">Modern awareness training has to be:<\/p>\n<ul data-start=\"2525\" data-end=\"2617\">\n<li data-start=\"2525\" data-end=\"2534\">\n<p data-start=\"2527\" data-end=\"2534\">Ongoing<\/p>\n<\/li>\n<li data-start=\"2535\" data-end=\"2551\">\n<p data-start=\"2537\" data-end=\"2551\">Scenario-based<\/p>\n<\/li>\n<li data-start=\"2552\" data-end=\"2590\">\n<p data-start=\"2554\" data-end=\"2590\">Reinforced with phishing simulations<\/p>\n<\/li>\n<li data-start=\"2591\" data-end=\"2617\">\n<p data-start=\"2593\" data-end=\"2617\">Backed by expert support<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"2619\" data-end=\"2734\">Because the reality is this: <strong data-start=\"2648\" data-end=\"2682\">every business will be tested.<\/strong> The question is whether your team is ready to pass.<\/p>\n<h3 data-start=\"2736\" data-end=\"2767\"><strong data-start=\"2740\" data-end=\"2767\">What This Means for You<\/strong><\/h3>\n<ul data-start=\"2769\" data-end=\"2979\">\n<li data-start=\"2769\" data-end=\"2827\">\n<p data-start=\"2771\" data-end=\"2827\"><strong data-start=\"2771\" data-end=\"2799\">Your staff need support.<\/strong> Not blame. Culture matters.<\/p>\n<\/li>\n<li data-start=\"2828\" data-end=\"2909\">\n<p data-start=\"2830\" data-end=\"2909\"><strong data-start=\"2830\" data-end=\"2854\">You need visibility.<\/strong> Real-time monitoring helps spot what your staff can\u2019t.<\/p>\n<\/li>\n<li data-start=\"2910\" data-end=\"2979\">\n<p data-start=\"2912\" data-end=\"2979\"><strong data-start=\"2912\" data-end=\"2937\">You need partnership.<\/strong> Cybersecurity is no longer a solo effort.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"2981\" data-end=\"3050\">Cyber threats don\u2019t take breaks. They evolve. So should your defence.<\/p>\n<hr data-start=\"3052\" data-end=\"3055\" \/>\n<p data-start=\"3057\" data-end=\"3080\"><strong data-start=\"3057\" data-end=\"3080\">How SOD-IT Can Help<\/strong><\/p>\n<p data-start=\"3082\" data-end=\"3205\">We provide managed cyber protection that keeps your team trained, your systems monitored, and your business protected\u201424\/7.<\/p>\n<p data-start=\"3207\" data-end=\"3222\">We\u2019ll help you:<\/p>\n<ul data-start=\"3223\" data-end=\"3396\">\n<li data-start=\"3223\" data-end=\"3269\">\n<p data-start=\"3225\" data-end=\"3269\">Implement ongoing staff awareness programmes<\/p>\n<\/li>\n<li data-start=\"3270\" data-end=\"3324\">\n<p data-start=\"3272\" data-end=\"3324\">Detect unusual behaviour before it becomes a problem<\/p>\n<\/li>\n<li data-start=\"3325\" data-end=\"3396\">\n<p data-start=\"3327\" data-end=\"3396\">Align the right security tools to how your business actually operates<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"3398\" data-end=\"3510\">Because good security isn\u2019t just for enterprise giants. It\u2019s for every business that wants to grow without fear.<\/p>\n<p data-start=\"3512\" data-end=\"3598\">\ud83d\udcde 0141 488 1533<br data-start=\"3528\" data-end=\"3531\" \/>\ud83c\udf10 <a class=\"decorated-link\" href=\"https:\/\/sod-it.co.uk\" target=\"_new\" rel=\"noopener\" data-start=\"3534\" data-end=\"3574\">www.sod-it.co.uk<\/a><br data-start=\"3574\" data-end=\"3577\" \/>\ud83d\udce7 <a class=\"decorated-link cursor-pointer\" rel=\"noopener\" data-start=\"3580\" data-end=\"3598\">inbox@sod-it.co.uk<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we outline in our latest eBook, the biggest risk to your business might not be a dodgy link or &hellip; <a href=\"https:\/\/sod-it.co.uk\/dev-2024\/modern-threats-hiding-in-plain-sight-when-your-people-become-the-target\/\">Continued<\/a><\/p>\n","protected":false},"author":3,"featured_media":1734,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,8],"tags":[],"class_list":["post-1733","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Modern Threats Hiding in Plain Sight: When Your People Become the Target - Business IT Support | Glasgow | Ayrshire<\/title>\n<meta name=\"description\" content=\"In a blog based on our latest eBook, we outline the modern threats to your business from malware and viruses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sod-it.co.uk\/dev-2024\/modern-threats-hiding-in-plain-sight-when-your-people-become-the-target\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Modern Threats Hiding in Plain Sight: When Your People Become the Target - Business IT Support | Glasgow | Ayrshire\" \/>\n<meta property=\"og:description\" content=\"In a blog based on our latest eBook, we outline the modern threats to your business from malware and viruses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sod-it.co.uk\/dev-2024\/modern-threats-hiding-in-plain-sight-when-your-people-become-the-target\/\" \/>\n<meta property=\"og:site_name\" content=\"Business IT Support | Glasgow | Ayrshire\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-23T08:54:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-20T13:57:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sod-it.co.uk\/dev-2024\/wp-content\/uploads\/2026\/01\/SOD-IT-Modern-Threats-eBook-Mockup-1024x688.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"688\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Tom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sod-it.co.uk\/dev-2024\/modern-threats-hiding-in-plain-sight-when-your-people-become-the-target\/\",\"url\":\"https:\/\/sod-it.co.uk\/dev-2024\/modern-threats-hiding-in-plain-sight-when-your-people-become-the-target\/\",\"name\":\"Modern Threats Hiding in Plain Sight: When Your People Become the Target - Business IT Support | Glasgow | Ayrshire\",\"isPartOf\":{\"@id\":\"https:\/\/sod-it.co.uk\/#website\"},\"datePublished\":\"2026-01-23T08:54:34+00:00\",\"dateModified\":\"2026-01-20T13:57:41+00:00\",\"author\":{\"@id\":\"https:\/\/sod-it.co.uk\/#\/schema\/person\/0bf7af38f15e6e168eca5c22f7dc1d22\"},\"description\":\"In a blog based on our latest eBook, we outline the modern threats to your business from malware and viruses.\",\"breadcrumb\":{\"@id\":\"https:\/\/sod-it.co.uk\/dev-2024\/modern-threats-hiding-in-plain-sight-when-your-people-become-the-target\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sod-it.co.uk\/dev-2024\/modern-threats-hiding-in-plain-sight-when-your-people-become-the-target\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sod-it.co.uk\/dev-2024\/modern-threats-hiding-in-plain-sight-when-your-people-become-the-target\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sod-it.co.uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Modern Threats Hiding in Plain Sight: When Your People Become the Target\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sod-it.co.uk\/#website\",\"url\":\"https:\/\/sod-it.co.uk\/\",\"name\":\"Business IT Support | Glasgow | Ayrshire\",\"description\":\"Business IT Support | Glasgow | Ayrshire\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sod-it.co.uk\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sod-it.co.uk\/#\/schema\/person\/0bf7af38f15e6e168eca5c22f7dc1d22\",\"name\":\"Tom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/sod-it.co.uk\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/56939cbe2274601eecdbd0aa89308fb71190dbe9e8f7fd52142de083f78055fb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/56939cbe2274601eecdbd0aa89308fb71190dbe9e8f7fd52142de083f78055fb?s=96&d=mm&r=g\",\"caption\":\"Tom\"},\"url\":\"https:\/\/sod-it.co.uk\/dev-2024\/author\/tom-wilde\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Modern Threats Hiding in Plain Sight: When Your People Become the Target - Business IT Support | Glasgow | Ayrshire","description":"In a blog based on our latest eBook, we outline the modern threats to your business from malware and viruses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sod-it.co.uk\/dev-2024\/modern-threats-hiding-in-plain-sight-when-your-people-become-the-target\/","og_locale":"en_GB","og_type":"article","og_title":"Modern Threats Hiding in Plain Sight: When Your People Become the Target - Business IT Support | Glasgow | Ayrshire","og_description":"In a blog based on our latest eBook, we outline the modern threats to your business from malware and viruses.","og_url":"https:\/\/sod-it.co.uk\/dev-2024\/modern-threats-hiding-in-plain-sight-when-your-people-become-the-target\/","og_site_name":"Business IT Support | Glasgow | Ayrshire","article_published_time":"2026-01-23T08:54:34+00:00","article_modified_time":"2026-01-20T13:57:41+00:00","og_image":[{"width":1024,"height":688,"url":"https:\/\/sod-it.co.uk\/dev-2024\/wp-content\/uploads\/2026\/01\/SOD-IT-Modern-Threats-eBook-Mockup-1024x688.png","type":"image\/png"}],"author":"Tom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tom","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sod-it.co.uk\/dev-2024\/modern-threats-hiding-in-plain-sight-when-your-people-become-the-target\/","url":"https:\/\/sod-it.co.uk\/dev-2024\/modern-threats-hiding-in-plain-sight-when-your-people-become-the-target\/","name":"Modern Threats Hiding in Plain Sight: When Your People Become the Target - Business IT Support | Glasgow | Ayrshire","isPartOf":{"@id":"https:\/\/sod-it.co.uk\/#website"},"datePublished":"2026-01-23T08:54:34+00:00","dateModified":"2026-01-20T13:57:41+00:00","author":{"@id":"https:\/\/sod-it.co.uk\/#\/schema\/person\/0bf7af38f15e6e168eca5c22f7dc1d22"},"description":"In a blog based on our latest eBook, we outline the modern threats to your business from malware and viruses.","breadcrumb":{"@id":"https:\/\/sod-it.co.uk\/dev-2024\/modern-threats-hiding-in-plain-sight-when-your-people-become-the-target\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sod-it.co.uk\/dev-2024\/modern-threats-hiding-in-plain-sight-when-your-people-become-the-target\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sod-it.co.uk\/dev-2024\/modern-threats-hiding-in-plain-sight-when-your-people-become-the-target\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sod-it.co.uk\/"},{"@type":"ListItem","position":2,"name":"Modern Threats Hiding in Plain Sight: When Your People Become the Target"}]},{"@type":"WebSite","@id":"https:\/\/sod-it.co.uk\/#website","url":"https:\/\/sod-it.co.uk\/","name":"Business IT Support | Glasgow | Ayrshire","description":"Business IT Support | Glasgow | Ayrshire","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sod-it.co.uk\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/sod-it.co.uk\/#\/schema\/person\/0bf7af38f15e6e168eca5c22f7dc1d22","name":"Tom","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/sod-it.co.uk\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/56939cbe2274601eecdbd0aa89308fb71190dbe9e8f7fd52142de083f78055fb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/56939cbe2274601eecdbd0aa89308fb71190dbe9e8f7fd52142de083f78055fb?s=96&d=mm&r=g","caption":"Tom"},"url":"https:\/\/sod-it.co.uk\/dev-2024\/author\/tom-wilde\/"}]}},"_links":{"self":[{"href":"https:\/\/sod-it.co.uk\/dev-2024\/wp-json\/wp\/v2\/posts\/1733","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sod-it.co.uk\/dev-2024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sod-it.co.uk\/dev-2024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sod-it.co.uk\/dev-2024\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/sod-it.co.uk\/dev-2024\/wp-json\/wp\/v2\/comments?post=1733"}],"version-history":[{"count":1,"href":"https:\/\/sod-it.co.uk\/dev-2024\/wp-json\/wp\/v2\/posts\/1733\/revisions"}],"predecessor-version":[{"id":1735,"href":"https:\/\/sod-it.co.uk\/dev-2024\/wp-json\/wp\/v2\/posts\/1733\/revisions\/1735"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sod-it.co.uk\/dev-2024\/wp-json\/wp\/v2\/media\/1734"}],"wp:attachment":[{"href":"https:\/\/sod-it.co.uk\/dev-2024\/wp-json\/wp\/v2\/media?parent=1733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sod-it.co.uk\/dev-2024\/wp-json\/wp\/v2\/categories?post=1733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sod-it.co.uk\/dev-2024\/wp-json\/wp\/v2\/tags?post=1733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}