{"id":136,"date":"2025-09-17T15:47:09","date_gmt":"2025-09-17T05:47:09","guid":{"rendered":"https:\/\/qld.cybersafebusiness.au\/?post_type=tribe_events&#038;p=136"},"modified":"2025-09-23T17:10:40","modified_gmt":"2025-09-23T07:10:40","slug":"series-1-the-top-5-cyber-threats-facing-small-businesses-today","status":"publish","type":"tribe_events","link":"https:\/\/qld.cybersafebusiness.au\/index.php\/event\/series-1-the-top-5-cyber-threats-facing-small-businesses-today\/","title":{"rendered":"Series 1 \u2013 The Top 5 Cyber Threats Facing Small Businesses Today"},"content":{"rendered":"<p>In this series, you will learn common tactics threat actors use and how to spot them before damage is done.<\/p>\n<p><strong>This event is using Microsoft Teams. Adding the event to the calendar will not provide you the webinar session link.<\/strong><\/p>\n<p><strong>You must click <a href=\"https:\/\/events.teams.microsoft.com\/event\/d8a992d0-b8bf-4e6c-81a7-6ee8f25220fc@de5740e2-5b7d-4cbc-988b-ad4a3288d282\" target=\"_blank\" rel=\"noopener\">here<\/a> to register and receive the session code for the webinar <\/strong><\/p>\n<p><strong>Or <\/strong><\/p>\n<p><strong>Copy &amp; paste below link to your favourite Internet browser:<\/strong><\/p>\n<p><a href=\"https:\/\/events.teams.microsoft.com\/event\/d8a992d0-b8bf-4e6c-81a7-6ee8f25220fc@de5740e2-5b7d-4cbc-988b-ad4a3288d282\" target=\"_blank\" rel=\"noopener\">https:\/\/events.teams.microsoft.com\/event\/d8a992d0-b8bf-4e6c-81a7-6ee8f25220fc@de5740e2-5b7d-4cbc-988b-ad4a3288d282<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this series, you will learn common tactics threat actors use and how to spot them before damage is done. This event is using Microsoft Teams. Adding the event to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":199,"template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[27],"class_list":["post-136","tribe_events","type-tribe_events","status-publish","has-post-thumbnail","hentry","tribe_events_cat-webinar","cat_webinar"],"_links":{"self":[{"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/tribe_events\/136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":11,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/tribe_events\/136\/revisions"}],"predecessor-version":[{"id":480,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/tribe_events\/136\/revisions\/480"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/media\/199"}],"wp:attachment":[{"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/media?parent=136"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/tags?post=136"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/qld.cybersafebusiness.au\/index.php\/wp-json\/wp\/v2\/tribe_events_cat?post=136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}