{"id":23554,"date":"2025-06-06T09:00:51","date_gmt":"2025-06-06T07:00:51","guid":{"rendered":"https:\/\/digitalschoolofmarketing.co.za\/?p=23554"},"modified":"2025-05-29T12:24:02","modified_gmt":"2025-05-29T10:24:02","slug":"phishing-and-social-engineering-in-cyber-security","status":"publish","type":"post","link":"https:\/\/digitalschoolofmarketing.co.za\/cyber-security-blog\/phishing-and-social-engineering-in-cyber-security\/","title":{"rendered":"Understanding Phishing and Social Engineering in Cybersecurity"},"content":{"rendered":"<section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_3-1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>In an increasingly digital world, cyber security\u00a0 is becoming increasingly crucial. And yet, as firms pour money into firewalls, encryption, and sophisticated AI-powered defence systems, one form of attack cannot be easily stopped by any technology: social engineering. Through manipulation, deception and psychological manipulation, social engineering attacks persuade individuals to disclose data or perform actions that then can be used to their\u2002detriment. At the centre of this strategy is phishing, the most effective\u2002and harmful social engineering technique in today\u2019s cyber security landscape.<\/p>\n<p>There are many different phishing attacks \u2014 fake emails, fake login pages, and urgent messages from your impersonated higher-ups \u2014 but they all take advantage of the same weakness: human behaviour. And while malware or brute-force hacks break\u2002into your system, phishing doesn\u2019t have to. It gets someone to open\u2002the door. That makes it one of the most significant threats in cyberspace, as it targets both individuals and networks.<\/p>\n<h2><strong>What Is Social Engineering in Cyber security?<\/strong><\/h2>\n<p>Social engineering is the art of deceiving people into divulging personal information or granting access. In <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cyber security,<\/a> it refers to attacks that rely more on human behaviour than on technical weaknesses. Instead of hacking firewalls or finding holes in code, social engineering attackers exploit people\u2019s good nature and psychology to lower their guard, using deception and a sense of urgency to manipulate their victims.<\/p>\n<p>Examples of Social Engineering in Cyber-Security: The most common types of social engineering\u2002are:<\/p>\n<ul>\n<li>Phishing: Malicious email or messaging intended to steal credentials or install malware.<\/li>\n<li>Vishing: Phishing using voice, frequently with fake tech-support or bank representatives.<\/li>\n<li>Smishing: Phishing through text messages to get users to tap malicious links or provide personal information.<\/li>\n<li>Pretending:\u2002Inventing a story or persona to persuade a target to provide information.<\/li>\n<li>Baiting: Dropping infected physical media (e.g., USB sticks) or offering digital downloads (ransomware) using the hopes that people will pick them up (considering Kevin Spacey picked them up, it\u2019s a safe bet).<\/li>\n<\/ul>\n<p>These techniques typically masquerade as familiar entities, such as banks, colleagues, or government departments, to foster a sense of credibility. Social engineering&#8217;s success in the cyber security realm relies heavily on human frailty: ignorance, anxiety, panic, or a desire for status.<\/p>\n<p>Social engineering is like a bad relationship, and it\u2019s\u2002complicated. Attackers can learn from how users behave, adjust to new technology, and even customise their messaging. Some are even turning to artificial intelligence to devise more convincing phishing emails against their victims.<\/p>\n<p>Cyber security\u00a0 teams need to understand that while firewalls and software are essential, people are the real\u2002first line of defence. Teaching users to verify, running verification, and creating scepticism are all invaluable strategies for mitigating\u2002social engineering. In a good cyber security\u00a0 culture, people don\u2019t just learn how to use tools; they are given the time to question what arrives in their mailbox, on their screen, or over the phone line.<\/p>\n<h2><strong>Phishing: The Most Common Social Engineering Attack<\/strong><\/h2>\n<p>Phishing is\u2002the most common and costly social engineering attack in <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cyber security.<\/a> Likely, since more than 90% of attacks originate from phishing emails, it is the weapon of choice for many organisations. These attacks are structured to appear genuine, whether that means they resemble official correspondence from banks, service providers, or company leadership, and are designed to fool the recipient into clicking on a malicious link, opening a malware payload attachment, or entering account details on a fake website.<\/p>\n<p>Different\u2002Types of Phishing in Cyber security:<\/p>\n<ul>\n<li>Email Phishing: Ground\u2002and pound email spam to thousands of people in the faint hope that some will fall for it.<\/li>\n<li>Spear\u2002Phishing: This is a targeted spear phishing that is crafted for an individual or an organisation.<\/li>\n<li>C-Suite: Phishing of high-level\u2002executives with sensitive system access.<\/li>\n<li>Clone Phishing: Attackers use an authentic email sent to a recipient, including the victim, but with tampered or malicious URLs\/attachments.<\/li>\n<\/ul>\n<p>Phishing attacks usually use\u2002some urgency \u2014 \u201cYour account has been compromised\u201d or \u201cImmediate action required.\u201d These psychological tricks increase the likelihood that someone will act spontaneously, thereby circumventing normal security measures.<\/p>\n<p>For\u2002cyber security\u00a0 professionals, detecting and preventing cyberthreats is, as always, a multilayered process:<\/p>\n<ul>\n<li>Spam Filters:\u2002Keeping unsolicited messages out of your inbox.<\/li>\n<li>Email Authentication Protocols: Making\u2002Sure the Sender Is Who They Claim to Be.<\/li>\n<li>User Education: Training users on how to identify phishing indicators, such as unusual sender addresses, unexpected links, and poor grammar.<\/li>\n<li>Simulated Phishing Tests:\u2002Conducting internal tests to keep employees on their toes.<\/li>\n<\/ul>\n<p>Phishing isn\u2019t disappearing\u2013it\u2019s becoming more complex. While assailants leverage machine learning to devise more customised attacks, it is up to cyber security management to be one step ahead with\u2002a renewed defence and continuous learning. The more users understand about phishing, the better they can prevent\u2002it.<\/p>\n<h2><strong>Defence Strategies Against Social Engineering in Cyber security<\/strong><\/h2>\n<p>Although we need technical measures to secure our systems, the defence against social engineering also requires techniques that put humans at the centre. Because\u2002trust and behaviour are exploited in such attacks, protecting an enterprise requires not just infrastructure, but also awareness and protocols for response.<\/p>\n<p>Core Defence Strategies:<\/p>\n<p>User Training and Awareness<\/p>\n<p>Education is the first and most critical line of defence\u2002in <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cyber security.<\/a> Staff and user awareness of how social engineering operates\u2002and being able to recognise it are key. Frequent training, hands-on exercises, and information\u2002about new phishing techniques help users stay vigilant.<\/p>\n<p>Two-Factor (Or More) Authentication (2FA) or\u2002Multi-Factor Authentication (MFA)<\/p>\n<p>Even if malicious actors successfully phish for login credentials, MFA\u2002could prevent access. And demanding a second form of verification (such as a code sent to your mobile device) does add a vital layer of protection.<\/p>\n<p>Access\u2002Control and Least Privilege<\/p>\n<p>Role-based access to sensitive data should be restricted. Least privilege access \u2013 Cyber security should implement least privilege access to ensure that a user only has access to what they need.<\/p>\n<p>Incident Response Plans<\/p>\n<p>Companies need to have well-defined, practised policies in place for\u2002what happens when they suspect a social engineering or phishing attack. This response involves taking compromised devices offline, notifying cyber security personnel, and recovering from clean backups.<\/p>\n<p>Email and\u2002Endpoint Protection Products<\/p>\n<p>More sophisticated cyber security management can also quickly filter out and isolate suspicious emails, as well as watch for signs of compromise in endpoint behaviour. Sandboxing, for instance, can verify links and attachments before they reach the user.<\/p>\n<p>Safeguarding against social\u2002engineering is a responsibility shared by all in the information security industry. Where people, process, and technology are well-aligned, organisations can effectively repel even the sneakiest of attacks.<\/p>\n<h2><strong>Building a Culture of Cyber security Awareness<\/strong><\/h2>\n<p>Technology alone can\u2019t fix the social engineering\u2002problem. Building a culture of <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cyber security<\/a> is particularly important for the millennial generation, but it should be ingrained in everyone\u2019s mindset at every organisation. This culture change requires steady leadership, plain-spoken communication, and practical tools, allowing people to do the right thing every day.<\/p>\n<p>Three Important Steps\u2002for Bringing Awareness:<\/p>\n<p>Employee Mindset: Staff must take security drills as seriously as they do evacuation drills. Employees are more likely to take it seriously when leadership makes a point to emphasise its importance.<\/p>\n<p>Regular Training: Cyber security\u2002is not a \u201cone and done. Regular training sessions and real-world simulations help maintain a fresh awareness.<\/p>\n<p>Communication: Inform employees that they can report suspicious messages without fear of retaliation. A mature cyber security culture allows for\u2002learning from failures.<\/p>\n<p>Security\u2002Champions: Identify people in each team who can act as contacts for security questions and guidance.<\/p>\n<p>Gamification and Rewards: Transform Security into a Game. Provide incentives or token rewards for those who report phishing or who are caught by fake attacks.<\/p>\n<p>Cyber security culture is also about integrating security into your daily work processes. From onboarding to performance reviews, it\u2019s a matter of security becoming an integral part of how employees understand success in their role.<\/p>\n<p>In today\u2019s environment of threats, every employee is a\u2002target, and by the same token, every employee is a defence. Organisations increase the success rate of phishing and social engineering by enabling an active, educated, and fearless team.<\/p>\n<h2><strong>Conclusion <\/strong><\/h2>\n<p>Phishing and social\u2002engineering are two of the most devastating and widespread security threats in the cyber world. Instead of relying on a technical glitch that can be easily fixed, the techniques prey on human psychology \u2014 the trust, fear, curiosity, and impatience that can lead to a security mistake. That makes them uniquely\u2002effective and uniquely challenging to stop.<\/p>\n<p>A good understanding of not only how phishing is conducted, but also the broader context of social engineering and the defence mechanisms, is essential for building strong <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cyber security.<\/a> However, defence does not end with firewalls or antivirus software. It applies to all the ordinary things we do, to the decisions we make, and to the habits we form.<\/p>\n<h2><strong><a href=\"https:\/\/digitalschoolofmarketing.co.za\/contact-us\/\">GET IN TOUCH WITH THE DIGITAL SCHOOL OF MARKETING<\/a><\/strong><\/h2>\n<p>Equip yourself with the essential skills to protect digital assets and maintain consumer trust by enrolling in the\u00a0<a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">Cyber Security Course<\/a>\u00a0at the\u00a0<a href=\"https:\/\/digitalschoolofmarketing.co.za\/\">Digital School of Marketing<\/a>. Join us today to become a leader in the dynamic field of cybersecurity.<\/p>\n<p><a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\"><img loading=\"lazy\" decoding=\"async\" class=\"entered lazyloaded aligncenter wp-image-20852 size-full\" src=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security.jpg\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg 600w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-300x48.jpg 300w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-1024x164.jpg 1024w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-768x123.jpg 768w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security.jpg 1250w\" alt=\"DSM Digital School of Marketing - Cyber Security\" width=\"1250\" height=\"200\" data-lazy-srcset=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg 600w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-300x48.jpg 300w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-1024x164.jpg 1024w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-768x123.jpg 768w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security.jpg 1250w\" data-lazy-sizes=\"(max-width: 600px) 100vw, 600px\" data-lazy-src=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg\" data-ll-status=\"loaded\" \/><\/a><\/p>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3>Frequently Asked Questions<\/h3>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"w-tabs style_default switch_click accordion has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"f3e8\"><button class=\"w-tabs-section-header\" aria-controls=\"content-f3e8\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">What is cyber security management?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-f3e8\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Cyber security\u00a0 involves protecting digital systems, data, and networks by implementing effective policies, tools, and strategies. It spans threat detection, incident response, employee training, and ongoing risk assessment. In the science of phishing and social engineering, cyber security enables users to identify scams and systems to defend themselves. Enabling a robust cyber security t framework that allows companies to reduce the number of breaches, respond to incidents quickly, and create an environment of digital awareness.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"e7c9\"><button class=\"w-tabs-section-header\" aria-controls=\"content-e7c9\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">How does cyber security prevent phishing attacks?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-e7c9\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Cyber security reduces phishing attacks through a\u2002mixture of user education and technical protections. Email filtering, web link scanning, and multi-factor authentication minimise technical risks, and ongoing training teaches employees how\u2002to spot suspicious emails. Security control also understands how to act quickly to contain and remediate phishing attempts. As threats are tracked and protocols are revised based on new attack trends, cyber security provides a proactive strategy to mitigate the risk of\u2002users being fooled by fraudulent messages.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"ybae\"><button class=\"w-tabs-section-header\" aria-controls=\"content-ybae\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">What\u2019s the role of training in cyber security?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-ybae\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Training is a critical part of managing cyber security and ensuring that employees are prepared to recognise threats like phishing and social engineering. Human error is typically the weakest link in a security strategy, so informing users about red flags, such as phishing links, urgent requests, and unknown attachments, can prevent a breach. Regular workshops that simulate phishing exercises, along with updated resources, should be part of cyber security management programs. \u201cWhen members of staff are trained to think critically and adhere to verification protocols, they serve as a powerful first line\u2002of defence.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"gf2b\"><button class=\"w-tabs-section-header\" aria-controls=\"content-gf2b\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">What are the common signs of phishing emails in cyber security ?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-gf2b\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Usual signs include unknown senders, incorrect grammar, aggressive or threatening language, and misaligned URLs. Cyber security emphasises the importance of recognising these red flags and teaches users to verify messages before clicking on any links or entering their login credentials. Many companies utilise email security tools that can flag or quarantine suspicious emails, but human judgment remains critical. A good cyber security environment also reinforces cautious practices and defines what to do if someone believes they have been phished.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"k251\"><button class=\"w-tabs-section-header\" aria-controls=\"content-k251\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">How does social engineering differ from other cyber threats?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-k251\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Social engineering differs from traditional computer threats, such as malware, spyware, and brute force, which focus on the web, system, and network of your computer system. It leverages trust, urgency\u2002and curiosity to deceive users into compromising their sensitive data or system access. Cyber security mitigates risk by combining human awareness with technical controls, such as user-restricted access rights, strong authentication, and incident response plans. And since social engineering evades traditional security measures, managing cyber risk must involve a focus on mental defence \u2014 training humans to spot manipulation and proceed with caution.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"d526\"><button class=\"w-tabs-section-header\" aria-controls=\"content-d526\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">Why is cyber security essential for businesses?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-d526\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Cyber security safeguards businesses from hazards that could result in data breaches, financial loss, and\u2002damage to their brand reputation. Phishing and social engineering attacks are especially insidious because they exploit human behaviour rather than system vulnerabilities. Policing cyber security involves a layered approach that encompasses firewalls, encryption, user education, and incident response planning. Supports industry regulation compliance and responds to new\u2002threats quickly. Without\u2002it, a single phishing attack could expose the entire organisation.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_medium\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-btn-wrapper align_justify\"><a class=\"w-btn us-btn-style_2\" href=\"#enquiry\"><span class=\"w-btn-label\">Enquire Today<\/span><\/a><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Blog Categories<\/span><\/span><\/h3><div class=\"wpb_text_column us_custom_5cd26a65\"><div class=\"wpb_wrapper\"><ul>\n<li class=\"cat-item cat-item-1\"><a href=\"\/blog\/content-marketing\/\">Content Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/digital-marketing\/\">Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/cyber-security-blog\/\">Cyber Security<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/graphic-design-blog\/\">Graphic Design<\/a><\/li>\n<li class=\"cat-item cat-item-3\"><a href=\"\/blog\/public-relations\/\">Public Relations<\/a><\/li>\n<li class=\"cat-item cat-item-4\"><a href=\"\/blog\/seo\/\">SEO<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/blog\/social-media-marketing\/\">Social Media Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/blog\/web-design-blog\/\">Web Design<\/a><\/li>\n<\/ul>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">You might also like<\/span><\/span><\/h3><div class=\"w-html\"><ul><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/social-media-marketing-blog\/zero-moment-of-truth-benefit-social-media-marketing\/\" rel=\"bookmark\">Use the Zero Moment of Truth to Benefit your Social Media Marketing<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/digital-marketing-blog\/your-complete-guide-to-ppc-marketing-basic\/\" rel=\"bookmark\">Your Complete Guide to PPC Marketing Basics. Find out more.<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/blog\/you-can-convey-a-lot-of-meaning-with-just-one-graphic\/\" rel=\"bookmark\">You Can Convey a Lot Of Meaning With Just One Graphic<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/digital-marketing-blog\/would-you-make-a-great-marketing-manager\/\" rel=\"bookmark\">Would you make a great marketing manager?<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/in-the-press\/win-with-bona-magazine-and-the-digital-school-of-marketing\/\" rel=\"bookmark\">Win with Bona Magazine and the Digital School of Marketing<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/in-the-press\/win-a-digital-marketing-course-valued-at-r12-000\/\" rel=\"bookmark\">Win a Digital Marketing Course Valued at  R12 000<\/a><\/li><\/ul><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Top Selling COurses<\/span><\/span><\/h3><div class=\"wpb_text_column us_custom_5cd26a65\"><div class=\"wpb_wrapper\"><ul>\n<li class=\"cat-item cat-item-1\"><a href=\"\/courses\/digital-marketing-course\/\">Intermediate Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/courses\/advanced-digital-marketing-course\/\">Advanced Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-3\"><a href=\"\/courses\/social-media-marketing-course\/\">Intermediate Social media marketing<\/a><\/li>\n<li class=\"cat-item cat-item-4\"><a href=\"\/courses\/digital-brand-management-course\/\">Brand Management<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/courses\/graphic-design-course\/\">Basic Graphic Design<\/a><\/li>\n<li class=\"cat-item cat-item-6\"><a href=\"\/courses\/advanced-graphic-design-course\/\">Advanced Graphic design<\/a><\/li>\n<li class=\"cat-item cat-item-7\"><a href=\"\/courses\/national-certificate-of-advertising\/\">National Certificate of Advertising<\/a><\/li>\n<li class=\"cat-item cat-item-8\"><a href=\"\/courses\/national-diploma-of-copywriting-course\/\">National Diploma of Copyrighting<\/a><\/li>\n<\/ul>\n<\/div><\/div>\n<\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":950,"featured_media":23564,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[771],"tags":[],"class_list":["post-23554","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/posts\/23554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/users\/950"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/comments?post=23554"}],"version-history":[{"count":1,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/posts\/23554\/revisions"}],"predecessor-version":[{"id":23565,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/posts\/23554\/revisions\/23565"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/media\/23564"}],"wp:attachment":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/media?parent=23554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/categories?post=23554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/tags?post=23554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}