{"id":76090,"date":"2026-04-01T15:28:35","date_gmt":"2026-04-01T13:28:35","guid":{"rendered":"https:\/\/www.sage.com\/en-za\/blog\/?p=76090"},"modified":"2026-04-01T15:28:37","modified_gmt":"2026-04-01T13:28:37","slug":"ai-cyber-security","status":"publish","type":"post","link":"https:\/\/www.sage.com\/en-za\/blog\/ai-cyber-security\/","title":{"rendered":"AI Is accelerating familiar attacks: What\u2019s changing, and how leaders should respond"},"content":{"rendered":"<header class=\"entry-header has-dark-background-color entry-header--standard entry-header--has-illustration entry-header--has-illustration--standard\">\n\t<div class=\"container\">\n\t\t<div class=\"entry-header__row row align-center\">\n\t\t\t<div class=\"col col-lg-7 col-xlg-6 entry-header__content\">\n\t\t\t\t\t\t\t<div class=\"component component-single-header\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"entry-header__misc text--subtitle text--uppercase text--small\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.sage.com\/en-za\/blog\/category\/technology-innovation\/\" class=\"entry-header__link\">Technology &amp; Innovation<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"entry-title-wrapper\">\n\t\t\t\t\t<h1 class=\"entry-title\">\n\t\t\t\t\t\tAI Is accelerating familiar attacks: What\u2019s changing, and how leaders should respond\t\t\t\t\t<\/h1>\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<p class=\"entry-header__description\">\n\t\t\t\t\t\tThe cyber threat hasn&#8217;t changed. The speed has. Here&#8217;s a practical 90-day plan to strengthen your defences before it matters.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"single-post-details container\">\n\t\t<div class=\"col\">\n\t\t\t<span class=\"posted-on \"><time class=\"entry-date published\" datetime=\"2026-04-01T15:28:35+02:00\">April 1, 2026<\/time><\/span><span class=\"reading-time\"> min read<\/span>\n\t\t<button\n\t\t\ttype=\"button\"\n\t\t\tclass=\"social-share-button button button--icon button--secondary js-social-share-button\"\n\t\t\tdata-share-title=\"AI Is accelerating familiar attacks: What\u2019s changing, and how leaders should respond\"\n\t\t\tdata-share-url=\"https:\/\/www.sage.com\/en-za\/blog\/ai-cyber-security\/\"\n\t\t\tdata-share-text=\"Please read this interesting article\"\n\t\t>\n\t\t\t<span class=\"social-share-button__share-label\">Share<\/span>\n\t\t\t<span class=\"social-share-button__copy-label\" hidden>Copy Link<\/span>\n\t\t\t<span class=\"social-share-button__copy-tooltip\" aria-hidden=\"true\" hidden>Copied<\/span>\n\t\t<\/button>\n\n\t\t\t\t<\/div>\n\t<\/div>\n\t<\/header>\n\n\n\n<div class=\"wp-block-post-author has-dark-background-color alignfull\">\n\t<div class=\"container\">\n\t\t<div class=\"col\">\n\t\t\t\t\t\t\t<div class=\"co-authors\">\n\t\t\t\t\t\n\t\t<div class=\"entry-author-wrapper\">\n\t\t\t<a class=\"entry-author\" href=\"https:\/\/www.sage.com\/en-za\/blog\/author\/marekbanas\/\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"40\" height=\"40\" src=\"https:\/\/www.sage.com\/en-za\/blog\/wp-content\/uploads\/sites\/9\/2026\/03\/marekbanas-350x350.jpg\" class=\"entry-author__image\" alt=\"Marek Banas\" srcset=\"https:\/\/www.sage.com\/en-za\/blog\/wp-content\/uploads\/sites\/9\/2026\/03\/marekbanas-350x350.jpg 350w, https:\/\/www.sage.com\/en-za\/blog\/wp-content\/uploads\/sites\/9\/2026\/03\/marekbanas.jpg 600w\" sizes=\"auto, (max-width: 40px) 100vw, 40px\" \/>\t\t\t\t<span class=\"entry-author__name\">Marek Banas<\/span>\n\t\t\t<\/a>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<p>Artificial intelligence is not creating a completely new class of cyber threat. <\/p>\n\n\n\n<p>What it\u2019s doing is making familiar attacks faster to launch, easier to tailor, and harder to stop in time.<\/p>\n\n\n\n<p>That distinction matters.<\/p>\n\n\n\n<p>For years, organisations have dealt with <a href=\"https:\/\/www.sage.com\/en-za\/blog\/phishing-why-trusting-your-gut-matters\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing<\/a>, social engineering, account compromise, vulnerability exploitation, and ransomware. <\/p>\n\n\n\n<p>None of that\u2019s new. <\/p>\n\n\n\n<p>What has changed is the pace. Tasks that once took attackers hours or days can now be completed in minutes, sometimes at scale, and often with very little effort.<\/p>\n\n\n\n<p>That shift is easy to underestimate. <\/p>\n\n\n\n<p>The real issue is not that attackers have suddenly become more inventive. It\u2019s that they no longer need to be slow.<\/p>\n\n\n\n<p>For <a href=\"https:\/\/www.sage.com\/en-za\/blog\/turn-your-employees-into-cyber-security-champions\/\" target=\"_blank\" rel=\"noreferrer noopener\">leadership teams<\/a>, this changes the security conversation. <\/p>\n\n\n\n<p>The challenge is no longer just whether an organisation has the right controls on paper. <\/p>\n\n\n\n<p>It\u2019s whether the business can detect, decide, and respond quickly enough when routine weaknesses are exploited at machine speed.<\/p>\n\n\n\n<p>That\u2019s what we discuss in this article, as follows:<\/p>\n\n\n<?xml encoding=\"utf-8\" ?><div class=\"wp-block-yoast-seo-table-of-contents yoast-table-of-contents\"><ul><li><a href=\"#h-the-threat-is-familiar-but-the-tempo-is-not\" data-level=\"2\">The threat is familiar but the tempo is not<\/a><\/li><li><a href=\"#h-why-many-organisations-are-still-exposed\" data-level=\"2\">Why many organisations are still exposed<\/a><\/li><li><a href=\"#h-what-leaders-need-to-understand-now\" data-level=\"2\">What leaders need to understand now<\/a><\/li><li><a href=\"#h-a-practical-30-60-90-day-response-plan-for-small-and-medium-sized-businesses\" data-level=\"2\">A practical 30-, 60-, 90-day response plan for small and medium-sized businesses<\/a><\/li><li><a href=\"#h-final-thoughts-the-real-takeaway\" data-level=\"2\">Final thoughts: The real takeaway<\/a><\/li><\/ul><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-threat-is-familiar-but-the-tempo-is-not\">The threat is familiar but the tempo is not<\/h2>\n\n\n\n<p>AI helps attackers automate parts of the attack chain that used to require time, patience, and manual work.<\/p>\n\n\n\n<p>That can include researching a company\u2019s structure, identifying senior employees, generating convincing phishing emails, analysing public data for useful context, scanning for weaknesses, and testing different approaches before choosing the one most likely to succeed.<\/p>\n\n\n\n<p>The underlying tactics are well established. The difference now is execution.<\/p>\n\n\n\n<p>A phishing email no longer has to be generic, badly written, or sent in bulk to be dangerous. <\/p>\n\n\n\n<p>It can be targeted, credible, and written in the tone a recipient expects. <\/p>\n\n\n\n<p>Reconnaissance no longer depends on someone manually piecing together information over several hours. Public data, company websites, social media, and digital footprints can be analysed far more quickly.<\/p>\n\n\n\n<p>This is where the pressure builds for defenders. When attackers can move faster, security teams have less time to notice what is happening, understand the risk, and contain it before damage spreads.<\/p>\n\n\n\n<div class=\"single-cta\">\n\t<div class=\"single-cta__positioner\">\n\t\t<div class=\"single-cta__wrapper has-dark-background-color\">\n\t\t\t<div class=\"single-cta__content\">\n\t\t\t\t\t\t\t\t<h2 class=\"single-cta__title h3\">Explore Sage trust and security<\/h2>\n\n\t\t\t\t\t\t\t\t\t<div class=\"single-cta__description\">\n\t\t\t\t\t\t<p><!-- wp:paragraph --><\/p>\n<p>Trust is the foundation of good security and our customer relations. <\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Learn how we safeguard your security, value your privacy, and uphold the highest standards of data ethics.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"https:\/\/www.sage.com\/en-za\/trust-security\/\"\n\t\t\t\t\t\tclass=\"single-cta__button button button--primary\"\n\t\t\t\t\t\t\t\t\t\t\t\t\tid=\"cta-id-75167\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-button-location=\"cta_box\"\n\t\t\t\t\t\t\t\t\t\t\t>Learn more<\/a>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<img decoding=\"async\" width=\"1214\" height=\"810\" src=\"https:\/\/www.sage.com\/en-za\/blog\/wp-content\/uploads\/sites\/9\/2023\/09\/GettyImages-842849562-1214x810.jpg\" class=\"single-cta__image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sage.com\/en-za\/blog\/wp-content\/uploads\/sites\/9\/2023\/09\/GettyImages-842849562-1214x810.jpg 1214w\" sizes=\"auto, (min-width: 48em) 33vw, 100vw\" \/>\t\t\t<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-many-organisations-are-still-exposed\">Why many organisations are still exposed<\/h2>\n\n\n\n<p>A lot of security programmes were built for a slower operating environment.<\/p>\n\n\n\n<p>They rely on periodic reviews, annual training, delayed patching cycles, fragmented ownership, and incident response processes that look fine in a policy document but have never really been tested under pressure. <\/p>\n\n\n\n<p>That may have been tolerable when attack preparation was slower and campaigns took more time to develop.<\/p>\n\n\n\n<p>It\u2019s far less tolerable now.<\/p>\n\n\n\n<p>AI has not made every attacker more advanced, but it has made many attacks more efficient. <\/p>\n\n\n\n<p>That creates strain in places where businesses are often weakest: decision-making, coordination, and speed of execution.<\/p>\n\n\n\n<p>Three issues tend to show up quickly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-governance-falls-behind-reality\">1. Governance falls behind reality<\/h3>\n\n\n\n<p>Organisations adopt new tools, new workflows, and new ways of sharing information faster than they update policy, oversight, or risk ownership. <\/p>\n\n\n\n<p>That creates exposure, especially when leaders do not have a clear view of how AI is being used across the business.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-basic-weaknesses-stay-open-for-too-long\">2. Basic weaknesses stay open for too long<\/h3>\n\n\n\n<p>Unpatched systems, weak authentication, excessive access rights, and poor email discipline remain common. <\/p>\n\n\n\n<p>These are not new failures, but they become more dangerous when attackers can identify and exploit them faster.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-response-is-often-too-slow\">3. Response is often too slow<\/h3>\n\n\n\n<p>In many businesses, the attacker can now move faster than the internal chain of escalation. <\/p>\n\n\n\n<p>By the time the right people are informed, the problem may already have spread.<\/p>\n\n\n\n<p>That\u2019s why this is not only a technical issue.<\/p>\n\n\n\n<p>It\u2019s a leadership issue. Security resilience depends on whether the organisation is set up to act quickly, not simply whether it has bought the latest tool.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-leaders-need-to-understand-now\">What leaders need to understand now<\/h2>\n\n\n\n<p>There are three realities worth keeping in view.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>AI lowers the cost of attack<\/strong>. Capabilities that once required time, specialist skill, or a larger criminal operation are becoming more accessible. That broadens the field of adversaries.<\/li>\n\n\n\n<li><strong>Volume will increase<\/strong>. When parts of the attack process can be automated, criminals can run more campaigns, test more variations, and look for easier wins.<\/li>\n\n\n\n<li><strong>Prepared organisations have an advantage<\/strong>. When attacks accelerate, the businesses that perform best are usually not the ones with the longest list of tools. They are the ones with clear ownership, strong basics, and a rehearsed response.<\/li>\n<\/ol>\n\n\n\n<p>That last point is important. Leaders do not need to panic, and they do not need to treat every development in AI as a reason to rebuild their security strategy from scratch. <\/p>\n\n\n\n<p>They do need to recognise that speed now matters more than ever, and that slow decisions create risk.<\/p>\n\n\n\n<div class=\"single-cta\">\n\t<div class=\"single-cta__positioner\">\n\t\t<div class=\"single-cta__wrapper has-dark-background-color\">\n\t\t\t<div class=\"single-cta__content\">\n\t\t\t\t\t\t\t\t<h2 class=\"single-cta__title h3\">Explore Sage trust and security<\/h2>\n\n\t\t\t\t\t\t\t\t\t<div class=\"single-cta__description\">\n\t\t\t\t\t\t<p><!-- wp:paragraph --><\/p>\n<p>Trust is the foundation of good security and our customer relations. <\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Learn how we safeguard your security, value your privacy, and uphold the highest standards of data ethics.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"https:\/\/www.sage.com\/en-za\/trust-security\/\"\n\t\t\t\t\t\tclass=\"single-cta__button button button--primary\"\n\t\t\t\t\t\t\t\t\t\t\t\t\tid=\"cta-id-75167\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-button-location=\"cta_box\"\n\t\t\t\t\t\t\t\t\t\t\t>Learn more<\/a>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<img decoding=\"async\" width=\"1214\" height=\"810\" src=\"https:\/\/www.sage.com\/en-za\/blog\/wp-content\/uploads\/sites\/9\/2023\/09\/GettyImages-842849562-1214x810.jpg\" class=\"single-cta__image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sage.com\/en-za\/blog\/wp-content\/uploads\/sites\/9\/2023\/09\/GettyImages-842849562-1214x810.jpg 1214w\" sizes=\"auto, (min-width: 48em) 33vw, 100vw\" \/>\t\t\t<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-a-practical-30-60-90-day-response-plan-for-small-and-medium-sized-businesses\">A practical 30-, 60-, 90-day response plan for small and medium-sized businesses<\/h2>\n\n\n\n<p>For small and mid-sized businesses, the response does not need to begin with complexity.<\/p>\n\n\n\n<p>In most cases, the biggest gains come from tightening the basics, clarifying ownership, and improving response discipline.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-within-30-days-reduce-the-obvious-exposure\">Within 30 days:Reduce the obvious exposure<\/h3>\n\n\n\n<p>Most cyber incidents affecting small and medium-sized businesses still start with familiar weaknesses. <\/p>\n\n\n\n<p>An employee account is compromised. A phishing email is opened. A device is unpatched. Access rights are broader than they should be. <\/p>\n\n\n\n<p>AI does not change those fundamentals. It simply helps attackers move through them faster.<\/p>\n\n\n\n<p>In the first 30 days, leaders should focus on the controls that reduce the most common forms of exposure.<\/p>\n\n\n\n<p>Priorities should include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enabling multi-factor authentication for email, remote access, and finance systems<\/li>\n\n\n\n<li>Applying software updates across operating systems and key business applications<\/li>\n\n\n\n<li>Checking that backups are in place, protected, and can actually be restored<\/li>\n\n\n\n<li>Reviewing administrative privileges and removing unnecessary access.<\/li>\n<\/ul>\n\n\n\n<p>These are not sophisticated measures, but they remain some of the most effective. <\/p>\n\n\n\n<p>For many organisations, they also deliver the fastest reduction in risk.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-within-60-days-improve-staff-awareness-and-reporting\">Within 60 days: Improve staff awareness and reporting<\/h3>\n\n\n\n<p>Employees remain one of the most common entry points for attackers, particularly in phishing and social engineering campaigns. <\/p>\n\n\n\n<p>AI is making those attacks more convincing. <\/p>\n\n\n\n<p>Messages are more fluent, more tailored, and less likely to contain the errors that people once relied on as warning signs.<\/p>\n\n\n\n<p>That means awareness training needs to be practical, not performative.<\/p>\n\n\n\n<p>Within 60 days, organisations should make sure employees know what suspicious requests look like, when to stop and question them, and how to report concerns quickly.<\/p>\n\n\n\n<p>Priorities should include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Short, practical awareness training based on realistic examples<\/li>\n\n\n\n<li>A clear route for reporting suspicious emails, links, or requests<\/li>\n\n\n\n<li>Reinforcement from managers that fast reporting matters<\/li>\n\n\n\n<li>A no-blame culture that encourages people to speak up early, even if they may have made a mistake.<\/li>\n<\/ul>\n\n\n\n<p>That last point is often underestimated. In many incidents, early reporting is the difference between a contained problem and a serious disruption.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-within-90-days-be-ready-to-respond-at-speed\">Within 90 days: Be ready to respond at speed<\/h3>\n\n\n\n<p>Even well-run organisations will not prevent every incident. <\/p>\n\n\n\n<p>The question is how quickly they can contain one.<\/p>\n\n\n\n<p>By 90 days, leadership should make sure there is a simple response structure in place. <\/p>\n\n\n\n<p>It does not need to be over-engineered, but it does need to be clear.<\/p>\n\n\n\n<p>That should include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Naming the person responsible for coordinating incident response<\/li>\n\n\n\n<li>Identifying the systems and data that matter most to business continuity<\/li>\n\n\n\n<li>Keeping contact details for internal decision-makers, IT providers, insurers, and legal advisers easy to access<\/li>\n\n\n\n<li>Running a tabletop exercise based on a realistic phishing or ransomware scenario.<\/li>\n<\/ul>\n\n\n\n<p>This kind of preparation is not about theatre. It\u2019s about reducing hesitation. <\/p>\n\n\n\n<p>When an incident happens, teams need enough clarity to act without wasting valuable time deciding who owns what.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-final-thoughts-the-real-takeaway\">Final thoughts: The real takeaway<\/h2>\n\n\n\n<p>AI is not redefining cyber risk from the ground up. <\/p>\n\n\n\n<p>It\u2019s accelerating the threats businesses already face, and exposing the cost of being slow.<\/p>\n\n\n\n<p>For small and mid-sized businesses, that\u2019s a useful message because it keeps the response grounded. <\/p>\n\n\n\n<p>The priority is not to chase every new headline. It\u2019s to strengthen the fundamentals, close common gaps, improve reporting, and rehearse response.<\/p>\n\n\n\n<p>Organisations that do those things well will be in a far better position to deal with the reality of AI-assisted attacks. <\/p>\n\n\n\n<p>Not because they can predict every threat, but because they can react faster when it matters.<\/p>\n\n\n\n<p>In the current environment, that\u2019s what resilience increasingly looks like.<\/p>\n\n\n\n<div class=\"single-cta\">\n\t<div class=\"single-cta__positioner\">\n\t\t<div class=\"single-cta__wrapper has-dark-background-color\">\n\t\t\t<div class=\"single-cta__content\">\n\t\t\t\t\t\t\t\t<h2 class=\"single-cta__title h3\">Explore Sage trust and security<\/h2>\n\n\t\t\t\t\t\t\t\t\t<div class=\"single-cta__description\">\n\t\t\t\t\t\t<p><!-- wp:paragraph --><\/p>\n<p>Trust is the foundation of good security and our customer relations. <\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Learn how we safeguard your security, value your privacy, and uphold the highest standards of data ethics.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"https:\/\/www.sage.com\/en-za\/trust-security\/\"\n\t\t\t\t\t\tclass=\"single-cta__button button button--primary\"\n\t\t\t\t\t\t\t\t\t\t\t\t\tid=\"cta-id-75167\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-button-location=\"cta_box\"\n\t\t\t\t\t\t\t\t\t\t\t>Learn more<\/a>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<img decoding=\"async\" width=\"1214\" height=\"810\" src=\"https:\/\/www.sage.com\/en-za\/blog\/wp-content\/uploads\/sites\/9\/2023\/09\/GettyImages-842849562-1214x810.jpg\" class=\"single-cta__image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sage.com\/en-za\/blog\/wp-content\/uploads\/sites\/9\/2023\/09\/GettyImages-842849562-1214x810.jpg 1214w\" sizes=\"auto, (min-width: 48em) 33vw, 100vw\" \/>\t\t\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The cyber threat hasn&#8217;t changed. The speed has. Here&#8217;s a practical 90-day plan to strengthen your defences before it matters.<\/p>\n","protected":false},"author":1914,"featured_media":71284,"menu_order":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_sage_video":false,"post_featured_image_hide":false,"sage_hide_published_date":false,"sage_hide_read_time":false,"sage_hide_share_buttons":false,"footnotes":""},"categories":[28],"tags":[161,166,209],"business_type":[2,3,5],"lilypad":[],"context":[],"industry":[],"persona":[6,12,16],"imagine_tag":[53,84,397,85,86],"coauthors":[561],"class_list":["post-76090","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology-innovation","tag-artificial-intelligence","tag-business-management","tag-staying-competitive","business_type-small-business","business_type-medium-business","business_type-accountants"],"sage_meta":{"region":"en-za","author_name":"Marek Banas","featured_image":"https:\/\/www.sage.com\/en-za\/blog\/wp-content\/uploads\/sites\/9\/2023\/09\/GettyImages-549776535.jpg","imagine_tags":{"53":"Business management","84":"Midsized business","397":"Sage AI","85":"Small business","86":"Start up business"}},"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Sage Advice South Africa","distributor_original_site_url":"https:\/\/www.sage.com\/en-za\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/posts\/76090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/users\/1914"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/comments?post=76090"}],"version-history":[{"count":3,"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/posts\/76090\/revisions"}],"predecessor-version":[{"id":76096,"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/posts\/76090\/revisions\/76096"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/media\/71284"}],"wp:attachment":[{"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/media?parent=76090"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/categories?post=76090"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/tags?post=76090"},{"taxonomy":"business_type","embeddable":true,"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/business_type?post=76090"},{"taxonomy":"lilypad","embeddable":true,"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/lilypad?post=76090"},{"taxonomy":"context","embeddable":true,"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/context?post=76090"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/industry?post=76090"},{"taxonomy":"persona","embeddable":true,"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/persona?post=76090"},{"taxonomy":"imagine_tag","embeddable":true,"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/imagine_tag?post=76090"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.sage.com\/en-za\/blog\/api\/wp\/v2\/coauthors?post=76090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}