{"id":5339,"date":"2025-09-26T09:10:15","date_gmt":"2025-09-26T08:10:15","guid":{"rendered":"https:\/\/amtivo.com\/uk\/standards\/\/\/\/"},"modified":"2026-02-11T13:15:15","modified_gmt":"2026-02-11T13:15:15","slug":"sme-cyber-security-guide","status":"publish","type":"standard-post-filter","link":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/guides\/sme-cyber-security-guide\/","title":{"rendered":"Ultimate SME Cyber Security Guide &#8211; Protecting Your Business"},"content":{"rendered":"<p>With <a href=\"https:\/\/www.ramsac.com\/wp-content\/uploads\/2025\/04\/Whitepaper-Cybersecurity-threats-facing-UK-SMEs-in-2025-2.pdf\" target=\"_blank\" rel=\"noopener\"><em>41% of UK SMEs reporting financial losses due to fraud, with an average loss of \u00a34,000 per incident<\/em><\/a>, the need for robust cyber security measures has never been more critical. What might be the impact if your business were hacked? How would you cope if you lost all of your data or access to key systems?<\/p>\r\n<p>Strengthening cyber security measures is vital for small and medium-sized businesses in every industry. Read about the essential tools and insights that support the protection of digital assets.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Understanding the Cyber Threat Landscape<\/h2>\r\n<p>Common threats include <strong>hacking<\/strong> (exploiting known vulnerabilities in internet-connected devices), <strong>phishing<\/strong> (tricking users into installing malicious applications) and <strong>password guessing<\/strong>.<\/p>\r\n<p>Over 43% of businesses \u2013 which equates to approximately 612,000 organisations \u2013 have faced a cyber security breach in the last 12 months, with 42% of small businesses affected by phishing attacks, according to <a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2025\/cyber-security-breaches-survey-2025\" target=\"_blank\" rel=\"noopener\"><em>the government\u2019s 2025 Cyber Security Breaches Survey<\/em><\/a>.<\/p>\r\n<p>In recent years, cyber attacks have become increasingly common and sophisticated, posing a significant threat to UK businesses. For example, in May 2024, <a href=\"https:\/\/feeds.bbci.co.uk\/news\/articles\/c2vv141pv8po\" target=\"_blank\" rel=\"noopener\">The Billericay School in Essex suffered a major cyber attack<\/a> that compromised sensitive student and parent data and forced a temporary school closure.<\/p>\r\n<p>Cyber threats can:<\/p>\r\n<ul>\r\n\t<li>Infect systems with malware to damage, disrupt, and gain unauthorised access.<\/li>\r\n\t<li>Overload a website with DDoS (Denial of Service) to flood and target the bandwidth and resources of an organisation\u2019s systems.<\/li>\r\n\t<li>Manipulate employees into divulging confidential information for fraudulent purposes.<\/li>\r\n\t<li>Exploit weaknesses in an organisation\u2019s systems.<\/li>\r\n<\/ul>\r\n<p>As businesses continue to experience thousands of cyber attacks a day, it\u2019s clear that cyber security must be a priority for every business owner. Regardless of how complex these attacks might be, they can have considerable negative and reputational implications for the organisation involved.<\/p>\r\n<p><a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/the-biggest-cyberattacks-by-year\/\" rel=\"noopener\">Read about the latest cyber attacks in the UK<\/a>.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>The Ultimate SME Cyber Security Checklist<\/h2>\r\n<p>One of the biggest mistakes smaller organisations can make is to assume that because their turnover is modest or their operation is small, cyber criminals will go elsewhere. However, ransomware attackers are just as interested in SMEs as larger companies.<\/p>\r\n<p>Ransomware always targets backups, and penetration tests can be a good way to look for weaknesses in this layer of defence. To minimise the chances of becoming a cyber crime statistic, organisations could consider the following:<\/p>\r\n<div class=\"dcf-overflow-x-auto\" tabindex=\"0\">\r\n<table class=\"dcf-table dcf-table-bordered dcf-table-striped dcf-w-100%\" style=\"font-family: Montserrat;\">\r\n<thead>\r\n<tr>\r\n<th scope=\"col\">\r\n<p><strong>Action<\/strong><\/p>\r\n<\/th>\r\n<th scope=\"col\">\r\n<p><strong>Importance and impact<\/strong><\/p>\r\n<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><strong>Start with employees<\/strong><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nImportance and impact\r\n\">\r\n<p>An organisation\u2019s first line of vulnerability and defence is its employees. One of the most common ways malware gets a foothold is when someone opens an infected document or clicks on a link. The conventional solution is <a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/training\/cyber-security-course-awareness-training\/\" rel=\"noopener\">cyber security training<\/a> to recognise and avoid phishing emails. Having a designated cyber security officer (CSO) can also be hugely beneficial.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><strong>Have secure Wi-Fi networks<\/strong><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nImportance and impact\r\n\">\r\n<p>One thing businesses can do is to create secure Wi-Fi networks. Never have an internet connection that\u2019s open to the public.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><strong>Turn on firewalls and have a robust antivirus<\/strong><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nImportance and impact\r\n\">\r\n<p>Firewalls are like the gatekeepers for network\u2019s traffic, both in and out. Organisations should keep on top of firewall and antivirus updates.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><strong>Use good password practices<\/strong><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nImportance and impact\r\n\">\r\n<p>Strong passwords and separate accounts on personal devices are key safeguards against security risks. Non-dictionary words are the strongest. If possible, enable multi factor authentication (MFA).<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><strong>Always back up your data<\/strong><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nImportance and impact\r\n\">\r\n<p>Ransomware does exactly what you think it does: it holds data hostage. Recovery typically relies on wiping affected systems and restoring from backups.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><strong>Detect attacks<\/strong><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nImportance and impact\r\n\">\r\n<p>Most SMEs rely on an endpoint security product or antivirus to pick up an issue. However, even the best antivirus can\u2019t detect all attacks, or at least detect them before damage is done. For that reason, organisations might explore endpoint security that employs some form of application micro-isolation to prevent the spread of infections.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><strong>Managed detection and response (MDR)<\/strong><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nImportance and impact\r\n\">\r\n<p>Even when attacks are detected, it\u2019s often difficult to respond to them before the problem has spread. This is basically threat detection integrated with rapid response, remediation, and, if necessary, forensic incident investigation.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><strong>Test defences, including backup<\/strong><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nImportance and impact\r\n\">\r\n<p>By far, the biggest problem in SME cyber security is that companies don\u2019t know their vulnerabilities and weaknesses because they\u2019ve never looked for them. A second approach is to carry out a basic penetration test (a simulated attack to find vulnerabilities).<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><strong>Turn on multi-factor authentication<\/strong><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nImportance and impact\r\n\">\r\n<p>Password attacks mean that no password is reliable without an additional factor such as an app-generated passcode, push authentication, or a hardware token.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><strong>Implement strong email security practices<\/strong><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nImportance and impact\r\n\">\r\n<p>Email is not the only security vulnerability facing SMEs due to threats like phishing and malware. Using robust spam filters and encryption, and regularly updating email security protocols can protect sensitive information. Additionally, buying email security as a specific service means a service provider takes care of the complex aspects of keeping emails secure.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><strong>Secure privileged servers<\/strong><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nImportance and impact\r\n\">\r\n<p>The phrase\u2019 attack surface\u2019 is frequently used in the current cyber security discussion. Anything requiring an external login should be considered risky.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><strong>Segment the network<\/strong><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nImportance and impact\r\n\">\r\n<p>If attackers get inside the network, the first thing they look to do is move sideways to access other devices, systems, or sensitive areas within the network. By creating separate segments, if an attacker gains access to one part of the network, their movement is restricted.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><strong>Patch vulnerabilities<\/strong><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nImportance and impact\r\n\">\r\n<p>Patch management has been best practice for years, but it\u2019s not always as simple as it looks. SMEs have two options, the most expensive of which is to ask a managed security service provider (MSSP) to carry out this service.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><strong>Dispose of old equipment<\/strong><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nImportance and impact\r\n\">\r\n<p>Small businesses are often told to update old equipment and software because they can be security risks. However, it\u2019s not always easy to know which things are considered outdated.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<p>These practical steps can help to protect a business from common threats and align closely with the standards set by the <a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/\" rel=\"noopener\">Cyber Essentials scheme<\/a>, which provides a structured approach to implementing these essential security measures.<\/p>\r\n<p>Read more about how <a href=\"\/uk\/standards\/iso-27001\/\">ISO 27001<\/a> could support your business.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Why SMEs Should Implement Cyber Essentials<\/h2>\r\n<p><a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/\" rel=\"noopener\">Cyber Essentials<\/a> is a government-backed initiative launched by the Department for Business, Innovation, and Skills in 2014. It was developed with the Information Security Forum (ISF), the Information Assurance for Small and Medium Enterprises Consortium (IASME), and the British Standards Institution (BSI) to provide organisations \u2013 especially SMEs \u2013 with a set of controls to help guard against prevalent cyber threats by pinpointing vulnerabilities and reducing the chances of cyber attacks.<\/p>\r\n<p>Cyber Essentials guides businesses through assessing and improving their cyber security measures. Certification requires the implementation of essential security controls, including boundary firewalls, secure configurations, access control, malware protection, and patch management.<\/p>\r\n<p>It is particularly appropriate for SMEs thanks to the following:<\/p>\r\n<ul>\r\n\t<li><strong>Affordability:<\/strong>\u00a0It offers a cost-effective way to implement essential cyber security measures and avoid the costly repercussions of cyber attacks without the need for large-scale investments. Achieving<a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/certification\/\" rel=\"noopener\"> Cyber Essentials certification<\/a> can often lead to reduced premiums on cyber insurance, providing both financial savings and better security coverage.<\/li>\r\n\t<li><strong>Simplicity:<\/strong>\u00a0Cyber Essentials is straightforward, making it accessible for businesses that may not have extensive in-house IT expertise.<\/li>\r\n\t<li><strong>Relevance:<\/strong>\u00a0Cyber criminals often target SMES due to perceived weaker defences, and Cyber Essentials helps address this vulnerability. It also supports data protection obligations under the UK and EU GDPR frameworks.<\/li>\r\n\t<li><strong>Efficiency:<\/strong>\u00a0As Cyber Essentials certification helps to protect an organisation against 80% of the most common types of cyberattacks, it also helps you reduce the risk of business disruption due to downtime.<\/li>\r\n\t<li><strong>Business opportunities:<\/strong> Achieving certification can lead to new business opportunities as it demonstrates that an organisation works in a safe and secure digital environment. It can also open doors to government contracts and partnerships that require a demonstrated commitment to cyber security. For instance, Cyber Essentials certification is specifically required by the Ministry of Defence and many local authorities.<\/li>\r\n<\/ul>\r\n<p><a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/\" rel=\"noopener\">Read more about Cyber Essentials<\/a>.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Which Types of SMEs Can Benefit from Cyber Essentials?<\/h2>\r\n<p><a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/\" rel=\"noopener\">Cyber Essentials<\/a> provides essential cyber security measures that can significantly enhance the security of small and medium-sized businesses, including the following:<\/p>\r\n<ol>\r\n\t<li><strong>Professional Services:<\/strong>\u00a0Protect sensitive client information in law, accounting, and consulting firms, maintaining confidentiality and compliance.<\/li>\r\n\t<li><strong>Healthcare Providers:<\/strong>\u00a0Safeguard patient records, ensuring compliance with data protection regulations and maintaining patient trust.<\/li>\r\n\t<li><strong>Tech Startups:<\/strong>\u00a0Secure digital assets and intellectual property, building credibility and trust with partners and investors.<\/li>\r\n\t<li><strong>Retailers:<\/strong>\u00a0Secure customer data and payment systems, enhancing trust and protecting against breaches.<\/li>\r\n\t<li><strong>Nonprofits:<\/strong>\u00a0Protect donor information and enhance cybersecurity on a tight budget, maintaining operational integrity.<\/li>\r\n<\/ol>\r\n<p><a href=\"https:\/\/amtivo.com\/uk\/case-studies\/cms-supatrak\/\" rel=\"noopener\">Read our case study: CMS Supatrak turned to British Assessment Bureau for their Cyber Essentials Certification.<\/a><\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Get Cyber Essentials Certification for Your SME<\/h2>\r\n<p>Get started on your journey to <a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/certification\/\" rel=\"noopener\">Cyber Essentials<\/a> and <a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials-plus\/certification\/\" rel=\"noopener\">Cyber Essentials Plus certification<\/a> for your business with British Assessment Bureau.<\/p>\r\n<p>Also consider <a href=\"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/certification\/\" rel=\"noopener\">ISO 27001 certification<\/a> to support your business in establishing an efficient Information Security Management System (ISMS).<\/p>\r\n<p><a href=\"https:\/\/amtivo.com\/uk\/certification-quote\/\" rel=\"noopener\">Request a quote<\/a> today or <a href=\"https:\/\/amtivo.com\/uk\/contact-us\/\" rel=\"noopener\">contact our team<\/a> to discuss your needs.<\/p>","protected":false},"excerpt":{"rendered":"Boost your SME&#8217;s cyber security with our essential guide. Achieve Cyber Essentials certification to protect assets and benefit from new opportunities.","protected":false},"author":24,"featured_media":10948,"template":"","meta":{"_acf_changed":false,"_searchwp_excluded":"","footnotes":""},"standard-post-categories":[78],"standard-post-tags":[91,32],"class_list":["post-5339","standard-post-filter","type-standard-post-filter","status-publish","has-post-thumbnail","hentry","standard-post-categories-guides","standard-post-tags-iso-27001","standard-post-tags-cyber-essentials"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SME Cyber Security Guide - Protecting Your Business<\/title>\n<meta name=\"description\" content=\"Boost your SME&#039;s cyber security with our essential guide. Achieve Cyber Essentials certification to protect assets and benefit from new opportunities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/guides\/sme-cyber-security-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ultimate SME Cyber Security Guide - Protecting Your Business\" \/>\n<meta property=\"og:description\" content=\"Boost your SME&#039;s cyber security with our essential guide. Achieve Cyber Essentials certification to protect assets and benefit from new opportunities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/guides\/sme-cyber-security-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"Amtivo UK\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-11T13:15:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2026\/02\/Guide-Thumbnail.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"367\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SME Cyber Security Guide - Protecting Your Business","description":"Boost your SME's cyber security with our essential guide. Achieve Cyber Essentials certification to protect assets and benefit from new opportunities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/guides\/sme-cyber-security-guide\/","og_locale":"en_GB","og_type":"article","og_title":"Ultimate SME Cyber Security Guide - Protecting Your Business","og_description":"Boost your SME's cyber security with our essential guide. Achieve Cyber Essentials certification to protect assets and benefit from new opportunities.","og_url":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/guides\/sme-cyber-security-guide\/","og_site_name":"Amtivo UK","article_modified_time":"2026-02-11T13:15:15+00:00","og_image":[{"width":600,"height":367,"url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2026\/02\/Guide-Thumbnail.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg","twitter_misc":{"Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/guides\/sme-cyber-security-guide\/","url":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/guides\/sme-cyber-security-guide\/","name":"SME Cyber Security Guide - Protecting Your Business","isPartOf":{"@id":"https:\/\/amtivo.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/guides\/sme-cyber-security-guide\/#primaryimage"},"image":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/guides\/sme-cyber-security-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2026\/02\/Guide-Thumbnail.png","datePublished":"2025-09-26T08:10:15+00:00","dateModified":"2026-02-11T13:15:15+00:00","description":"Boost your SME's cyber security with our essential guide. Achieve Cyber Essentials certification to protect assets and benefit from new opportunities.","breadcrumb":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/guides\/sme-cyber-security-guide\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/guides\/sme-cyber-security-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/guides\/sme-cyber-security-guide\/#primaryimage","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2026\/02\/Guide-Thumbnail.png","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2026\/02\/Guide-Thumbnail.png","width":600,"height":367,"caption":"Guide - Amtivo"},{"@type":"BreadcrumbList","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/guides\/sme-cyber-security-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amtivo.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Standards","item":"https:\/\/amtivo.com\/uk\/standards\/"},{"@type":"ListItem","position":3,"name":"Cyber Essentials","item":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/"},{"@type":"ListItem","position":4,"name":"Guides","item":"https:\/\/amtivo.com\/uk\/standards\/guides\/"},{"@type":"ListItem","position":5,"name":"Ultimate SME Cyber Security Guide &#8211; Protecting Your Business"}]},{"@type":"WebSite","@id":"https:\/\/amtivo.com\/uk\/#website","url":"https:\/\/amtivo.com\/uk\/","name":"Amtivo","description":"","publisher":{"@id":"https:\/\/amtivo.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amtivo.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/amtivo.com\/uk\/#organization","name":"Amtivo","url":"https:\/\/amtivo.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","width":371,"height":203,"caption":"Amtivo"},"image":{"@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/5339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter"}],"about":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/types\/standard-post-filter"}],"author":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/users\/24"}],"version-history":[{"count":16,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/5339\/revisions"}],"predecessor-version":[{"id":7249,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/5339\/revisions\/7249"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media\/10948"}],"wp:attachment":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media?parent=5339"}],"wp:term":[{"taxonomy":"standard-post-categories","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-categories?post=5339"},{"taxonomy":"standard-post-tags","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-tags?post=5339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}