{"id":6733,"date":"2020-12-23T11:56:10","date_gmt":"2020-12-23T11:56:10","guid":{"rendered":"https:\/\/cybersmart.com\/?p=6733"},"modified":"2021-10-08T10:54:25","modified_gmt":"2021-10-08T10:54:25","slug":"the-top-cybersecurity-trends-of-2020-how-did-we-do","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/","title":{"rendered":"The top cybersecurity trends of 2020: how did we do?"},"content":{"rendered":"

The leaves have well and truly fallen, it\u2019s bitterly cold, and Christmas is just around the corner. This can mean only one thing. It\u2019s that very special time of year when every business releases a \u2018things to look out for\u2019 or \u2018top ten trends\u2019 post for the year ahead \u2013 cue jokes about identikit blog posts.<\/span>
\n<\/span>
\n<\/span>So, we thought we would do something a little different this year. Rather than repeat last year\u2019s <\/span>guide to cybersecurity trends for SMEs<\/span>, we thought we\u2019d look back at how we did. Where were we right on the money? And what are we eating a hefty portion of festive humble pie over? <\/span>
\n<\/span>
\n<\/span>Of course, the elephant in the room is the COVID-19 pandemic, an event virtually no one predicted. And its effects will keep cropping up throughout this blog.\u00a0<\/span><\/b><\/p>\n

1. Increased use of AI to launch and defend against attacks<\/b><\/b><\/h3>\n

First up, AI. Back in January, we discussed the likelihood of cybercriminals increasing their use of automated attacks in 2020. We cited cybersecurity and AI expert, Justin Fier of Darktrace who predicted \u201cAI won\u2019t just make attacks faster or smarter. We likely can\u2019t even fathom the way that AI will transform attacks or be leveraged by malicious actors. What we do know is that with AI attacks on the horizon, AI defences will be critical as well.\u201d<\/span><\/p>\n

How we did<\/b><\/h4>\n

We\u2019d like to think we were pretty spot on with this one. AI attacks continue to plague the nightmares of security professionals. A September 2020 study from <\/span>Forrester<\/span><\/a> found <\/span>that 88% of security professionals expect AI-driven attacks will soon become mainstream.<\/span><\/p>\n

88% of security professionals expect AI-driven attacks will soon become mainstream.\u00a0<\/span><\/p><\/blockquote>\n

What\u2019s more, there were several high-profile attacks using AI in 2020. The spear-phishing (more on that later) <\/span>attack on COVID-19 vaccine supply chains <\/span><\/a>is thought to have been carried out using an AI. Meanwhile, both the <\/span>Vancouver Metro system <\/span><\/a>and the <\/span>Argentine <\/span><\/a>government suffered highly coordinated ransomware attacks, thought to be backed by an AI.\u00a0<\/span><\/p>\n

While you don\u2019t have to be Nostrodamus to predict that as AI technology becomes more widely available attacks will increase, it\u2019s clear that it has become a rapidly growing threat. So much so that <\/span>Europol issued a warning<\/span><\/a> earlier this year that cybercriminals now have both the expertise and tools to use AI regularly.\u00a0<\/span><\/p>\n

It\u2019s in this environment that we\u2019re continuing our research into using AI and machine learning for cybersecurity defences.<\/span><\/p>\n

2. Spear phishing: phishing attacks get personal<\/b><\/h3>\n

Spear phishing is the practice of sending out highly targeted, personalised emails to company employees and executives in a specific business, rather than a generic attack sent to thousands of random email addresses. Once clicked, these emails infect the user\u2019s computer or device with malware.\u00a0<\/span><\/p>\n

We predicted this type of attack would become more common in 2020, as cybercriminals learned to target time-poor executives and undertrained employees.\u00a0<\/span><\/p>\n

How we did\u00a0<\/b><\/h4>\n

While our instinct was good, we couldn\u2019t have predicted just how prevalent spear-phishing attacks would become in 2020. There were many high profile attacks, including Twitter<\/span>, but most alarming was, of course, the attack on COVID-19 vaccine supply chains we mentioned earlier.\u00a0<\/span><\/p>\n

And there were plenty more breaches that didn\u2019t make the front pages. According to <\/span>a report from the Anti Phishing Working Group<\/span><\/a>, the average loss to organisations from business email compromise (or spear-phishing) attacks in the second quarter of 2020 was $80,183 (\u00a359,353). Even more alarmingly, that figure represents a $54,000 (\u00a339,972) on the first quarter of this year, almost perfectly mirroring the global switch to remote working due to the pandemic.<\/span><\/p>\n

The average loss to organisations from spear-phishing attacks in the second quarter of 2020 was $80,183 (\u00a359,353)
\n<\/span><\/p><\/blockquote>\n

You can find out more about how to switch to remote working safely in our <\/span>latest ebook.<\/a><\/span><\/p>\n

3. Organisations are adopting more data encryption<\/b><\/h3>\n

At the beginning of 2020, we were confident this year would be <\/span>encryption\u2019s<\/span><\/a> time to shine at last. We hoped that the tool would finally gain widespread adoption, helping businesses to shut down most cyberattacks before they start. And we based this prediction on the 2019 Global Encryption Trends Study which revealed its use grew from 41% to 47% of organisations last year.\u00a0<\/span><\/p>\n

How we did\u00a0<\/b><\/h4>\n

Sadly, our hopes of encryption taking the business world by storm in 2020 proved unfounded. It\u2019s not all bad. Adoption has increased: <\/span>Entrust\u2019s 2020 Global Encryption Trends Study<\/span><\/a> lists 48% of businesses as having encryption strategy \u2018applied consistently across their enterprise\u2019.<\/span>
\n<\/span>
\n<\/span>However, a 1% increase to 48% isn\u2019t widespread adoption, nor is it nearly enough. Encryption is the simplest step a business can take towards protection from cyber threats.\u00a0 Improving the cyber health of our society depends on its adoption everywhere. Here\u2019s hoping 2021 will be better.<\/span><\/p>\n

Start 2021 right. Protect your business from 98.5% of security threats by getting Cyber Essentials certified.<\/a><\/h3>\n

4. Robotic Process Automation (RPA)<\/b><\/h3>\n

Of all the things on this list, Robotic Process Automation (RPA) is the one most likely to spark the imagination. So, was 2020 the year that businesses started automating in earnest and transferring tasks to our new robot masters?<\/span>
\n<\/span>
\n<\/span>How we did\u00a0<\/b><\/p>\n

In short, no. RPA did continue to grow in popularity, with its market revenues projected to have surpassed <\/span>$2.9 billion worldwide<\/span><\/a> this year. And it will probably continue to do so \u2013 <\/span>Grand View Research predicts<\/span><\/a> a 40.6% annual growth rate in adoption between now and 2027.
\n<\/span>
\n<\/span>However, the firms using RPA tend to be at that enterprise end of the scale. RPA is expensive and we\u2019re a long way from it being affordable for smaller businesses. So, for the time being at least, the robots aren\u2019t coming to an SME near you.\u00a0<\/span><\/p>\n

5. The next wave of GDPR fines is on its way<\/b>\u00a0<\/span><\/h3>\n

2019 was the year that regulators began to really flex their muscles on GDPR, doling out fines to some of the World\u2019s largest corporations. So, naturally, we expected 2020 to deliver more of the same.\u00a0<\/span><\/p>\n

How we did\u00a0<\/b><\/h4>\n

If anything, we underestimated this one. 2020 has been a bonanza of GDPR fines. First, <\/span>Google was fined \u00a344 million<\/span><\/a> by French regulator CNIL for its breach of GDPR rules \u2013 by far the biggest fine we\u2019ve seen yet. Then retailer H&M was hit with a \u00a331.5 million fine by German regulators. <\/span>
\n<\/span>
\n<\/span>These were just the two highest-profile cases. Over 220 fines were handed out for GDPR violations in the <\/span>
first ten months of 2020<\/span><\/a>, totalling more than \u00a3158 million. On top of this, July 2020 saw the highest number of fines issued in a single month since the GDPR was introduced.<\/span><\/p>\n

July 2020 saw the highest number of fines issued in a single month since the GDPR was introduced.<\/span><\/p><\/blockquote>\n

So it\u2019s clear that 2020 has been the year that regulators across Europe rolled up their sleeves and got tough on GDPR. Despite this, only 20% of US, UK, and EU companies are fully GDPR compliant. And, with all the uncertainty surrounding <\/span>GDPR and Brexit,<\/span><\/a> we expect 2021 to continue in the same vein.\u00a0\u00a0<\/span><\/p>\n

6. Greater threats to cloud security\u00a0<\/b><\/h3>\n

The cloud is relatively old news by now, with most businesses moving away from using physical servers sometime in the last decade. However, knowledge of how to properly secure data in a cloud has lagged far behind adoption for a while now. So we predicted 2020 would be the year that hackers began to exploit the cloud\u2019s vulnerabilities.\u00a0<\/span><\/p>\n

How we did\u00a0<\/b><\/h4>\n

Although cloud data breaches have been a feature of the technology since its inception, 2020 will go down as the year that businesses became much more conscious of the risks. A <\/span>report from Ermetic<\/span><\/a>, published in July 2020, revealed that 80% of firms surveyed have suffered some form of cloud data breach in the previous 18 months.\u00a0<\/span><\/p>\n

This is reflected in the number of high profile breaches we\u2019ve seen this year, with Mariott, MGM and video conferencing software Zoom all suffering data hacks. <\/span>
\n<\/b><\/p>\n

7. 5G and IoT devices on the rise<\/b><\/h3>\n

Everyone in the tech sector has been predicting the rise of 5G and IoT devices for a long time now. Were you to delve deep into your internet history, we\u2019re confident you\u2019d find it on many end-of-year predictions lists as far back as 2016. With that in mind, was this the year that 5G finally arrived on the scene?<\/span>
\n<\/span><\/p>\n

How we did\u00a0<\/b><\/h4>\n

Let\u2019s tackle 5G first. Unlike previous years, 2020 really did see the rollout of 5G, at least partly. Despite the controversy and political power struggles caused by the UK deciding to <\/span>ban Chinese firm Huawei<\/span><\/a>, 5G networks are now available in some locations across the UK. We\u2019re still a long way from a nationwide rollout and the technology comes with <\/span>problems <\/span><\/a>to be ironed out, but the first shoots of a 5G-backed nation are there and growing.\u00a0<\/span><\/p>\n

As for IoT devices, they continued their inevitable march to ubiquity. Experts estimate that the <\/span>number of active IoT devices installed in 2020 reached 31 billion<\/span><\/a>. This represents an 8 billion rise from 2019 and many are predicting a similar increase in 2021.<\/span><\/p>\n

8. The cybersecurity skills gap<\/b><\/h3>\n

The Department for Digital Culture, Media and Sport (DCMS) defines the cybersecurity skills gap as businesses \u2018lacking staff with the technical, incident response and governance skills needed to manage their cybersecurity.\u2019 And it\u2019s been a growing problem in the UK and across much of the world ever since businesses began to move their operations online. <\/span>
\n<\/span>
\n<\/span>We thought that it would become one of the defining trends of 2020. Were we right?\u00a0<\/span><\/p>\n

How we did\u00a0<\/b><\/h4>\n

The cybersecurity gap is hard to assess in a period as limited as one year. The situation certainly didn\u2019t improve much in 2020 but it\u2019s hard to say whether it got any worse. The UK government did at least try to promote jobs in the sector, even if <\/span>the execution was crass and very poorly judged<\/span><\/a>. <\/span>
\n<\/span>
\n<\/span>However, real change in this area is likely to take years, if not decades. So for the meantime, small businesses are best served by trying to find ways around the talent shortage. For more on that, check out our October <\/span>
blog on the subject.<\/span><\/a><\/p>\n

10. Employee training for threat awareness<\/h3>\n

Last on our list, threat awareness training for employees. One of the biggest trends sweeping cybersecurity in the last few years has been a growing realisation that employees have an active role to play in keeping their workplaces safe. Let\u2019s consider how that developed in 2020.\u00a0<\/span><\/p>\n

How we did<\/b><\/h4>\n

Like a lot of things on this list, employee awareness has been heavily influenced by the COVID-19 pandemic. As many businesses were forced to work remotely, with employees using their own networks and devices to access company data, good <\/span>cyber hygiene<\/span><\/a> has become more important than ever. As a result, we\u2019ve seen more and more businesses taking staff training seriously.<\/span>
\n<\/span>
\n<\/span>Meanwhile, we\u2019ve been busy doing what we can to help. We\u2019re all set to release a brand new set of interactive cybersecurity training modules, downloadable through the CyberSmart platform. It\u2019s our hope this will help make 2021 a little more cyber secure than 2020.<\/span><\/p>\n

 <\/p>\n

All in all, we\u2019re happy with our predictions for 2020. There was a lot we couldn\u2019t have foreseen and some of the trends we predicted didn\u2019t take off quite as expected. But, on the whole, 2020 saw some big steps towards increased cyber awareness and hygiene in the UK. Stay tuned for more of the same in 2021.\u00a0<\/span><\/p>\n

Looking to improve your cybersecurity but not sure where to begin? Start 2021 the right way, by getting <\/span>certified in Cyber Essentials<\/span><\/a>, the UK government scheme that covers all the fundamentals of cyber hygiene.<\/span><\/p>\n

\"CTA<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

The leaves have well and truly fallen, it\u2019s bitterly cold, and Christmas is just around the corner. This can mean only one thing. It\u2019s that very special time of year…<\/p>\n","protected":false},"author":8,"featured_media":6938,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4,11],"tags":[198,199,103,9,150,83,101,16,153],"yoast_head":"\nThe top cybersecurity trends of 2020: how did we do? - CyberSmart<\/title>\n<meta name=\"description\" content=\"How did our predictions for the top cybersecurity trends of 2020 work out? What did we get right and where were we way off the mark?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The top cybersecurity trends of 2020: how did we do? - CyberSmart\" \/>\n<meta property=\"og:description\" content=\"How did our predictions for the top cybersecurity trends of 2020 work out? What did we get right and where were we way off the mark?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSmart\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-23T11:56:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-08T10:54:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/12\/Social_Images-17.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rob S\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:site\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rob S\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/\"},\"author\":{\"name\":\"Rob S\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff\"},\"headline\":\"The top cybersecurity trends of 2020: how did we do?\",\"datePublished\":\"2020-12-23T11:56:10+00:00\",\"dateModified\":\"2021-10-08T10:54:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/\"},\"wordCount\":1916,\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/12\/Social_Images-17.jpg\",\"keywords\":[\"2020\",\"Automation\",\"cyber attack\",\"Cyber Essentials\",\"cyber threats\",\"cybersecurity\",\"small business\",\"SMEs\",\"spear phishing\"],\"articleSection\":[\"Blog\",\"Cyber Security 101\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/\",\"url\":\"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/\",\"name\":\"The top cybersecurity trends of 2020: how did we do? - CyberSmart\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/12\/Social_Images-17.jpg\",\"datePublished\":\"2020-12-23T11:56:10+00:00\",\"dateModified\":\"2021-10-08T10:54:25+00:00\",\"description\":\"How did our predictions for the top cybersecurity trends of 2020 work out? What did we get right and where were we way off the mark?\",\"breadcrumb\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/#primaryimage\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/12\/Social_Images-17.jpg\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/12\/Social_Images-17.jpg\",\"width\":1200,\"height\":627,\"caption\":\"Cybersecurity trends of 2020\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cybersmart.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The top cybersecurity trends of 2020: how did we do?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"name\":\"CyberSmart\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\",\"name\":\"CyberSmart\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"width\":990,\"height\":1006,\"caption\":\"CyberSmart\"},\"image\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\",\"https:\/\/twitter.com\/CyberSmartUK\",\"https:\/\/www.instagram.com\/cybersmart.uk\/\",\"https:\/\/www.linkedin.com\/company\/be-cybersmart\",\"https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff\",\"name\":\"Rob S\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g\",\"caption\":\"Rob S\"},\"url\":\"https:\/\/cybersmart.com\/author\/rob-s\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The top cybersecurity trends of 2020: how did we do? - CyberSmart","description":"How did our predictions for the top cybersecurity trends of 2020 work out? What did we get right and where were we way off the mark?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/","og_locale":"en_US","og_type":"article","og_title":"The top cybersecurity trends of 2020: how did we do? - CyberSmart","og_description":"How did our predictions for the top cybersecurity trends of 2020 work out? What did we get right and where were we way off the mark?","og_url":"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/","og_site_name":"CyberSmart","article_publisher":"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","article_published_time":"2020-12-23T11:56:10+00:00","article_modified_time":"2021-10-08T10:54:25+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/12\/Social_Images-17.jpg","type":"image\/jpeg"}],"author":"Rob S","twitter_card":"summary_large_image","twitter_creator":"@CyberSmartUK","twitter_site":"@CyberSmartUK","twitter_misc":{"Written by":"Rob S","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/#article","isPartOf":{"@id":"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/"},"author":{"name":"Rob S","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff"},"headline":"The top cybersecurity trends of 2020: how did we do?","datePublished":"2020-12-23T11:56:10+00:00","dateModified":"2021-10-08T10:54:25+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/"},"wordCount":1916,"publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/12\/Social_Images-17.jpg","keywords":["2020","Automation","cyber attack","Cyber Essentials","cyber threats","cybersecurity","small business","SMEs","spear phishing"],"articleSection":["Blog","Cyber Security 101"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/","url":"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/","name":"The top cybersecurity trends of 2020: how did we do? - CyberSmart","isPartOf":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/#primaryimage"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/12\/Social_Images-17.jpg","datePublished":"2020-12-23T11:56:10+00:00","dateModified":"2021-10-08T10:54:25+00:00","description":"How did our predictions for the top cybersecurity trends of 2020 work out? What did we get right and where were we way off the mark?","breadcrumb":{"@id":"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/#primaryimage","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/12\/Social_Images-17.jpg","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/12\/Social_Images-17.jpg","width":1200,"height":627,"caption":"Cybersecurity trends of 2020"},{"@type":"BreadcrumbList","@id":"https:\/\/cybersmart.com\/blog\/the-top-cybersecurity-trends-of-2020-how-did-we-do\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cybersmart.com\/"},{"@type":"ListItem","position":2,"name":"The top cybersecurity trends of 2020: how did we do?"}]},{"@type":"WebSite","@id":"https:\/\/cybersmartcom.wpengine.com\/#website","url":"https:\/\/cybersmartcom.wpengine.com\/","name":"CyberSmart","description":"","publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cybersmartcom.wpengine.com\/#organization","name":"CyberSmart","url":"https:\/\/cybersmartcom.wpengine.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","width":990,"height":1006,"caption":"CyberSmart"},"image":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","https:\/\/twitter.com\/CyberSmartUK","https:\/\/www.instagram.com\/cybersmart.uk\/","https:\/\/www.linkedin.com\/company\/be-cybersmart","https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg"]},{"@type":"Person","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff","name":"Rob S","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g","caption":"Rob S"},"url":"https:\/\/cybersmart.com\/author\/rob-s\/"}]}},"_links":{"self":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/6733"}],"collection":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/comments?post=6733"}],"version-history":[{"count":0,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/6733\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media\/6938"}],"wp:attachment":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media?parent=6733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/categories?post=6733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/tags?post=6733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}