{"id":29465,"date":"2021-01-26T05:47:11","date_gmt":"2021-01-26T11:47:11","guid":{"rendered":"https:\/\/www.filecloud.com\/blog\/?p=29465"},"modified":"2022-03-17T12:46:07","modified_gmt":"2022-03-17T17:46:07","slug":"cyber-security-trends-to-watch-out-in-2021","status":"publish","type":"post","link":"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/","title":{"rendered":"Cyber Security Trends To Watch Out in 2021"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-29483\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2021\/01\/undraw_Security_on_ff2u.png\" alt=\"Cyber Security Trends 2021\" width=\"1099\" height=\"928\"><\/p>\n<p>\u00a0<\/p>\n<p><span class=\"q-box qu-userSelect--text\">With ever-growing cybercrime rates and AI stepping up its hacking game, the field of cybersecurity holds an instrumental position in almost every organization.<\/span><\/p>\n<p class=\"q-text qu-display--block\">The cybersecurity landscape is constantly changing with hackers finding new ways to target businesses and cybersecurity professionals trying to keep up with the defenses. The proliferation of IoT devices, the increased acceptance of a cloud-only model, and new threats like ransomware and botnets are some of the key factors driving cybersecurity trends. <span class=\"q-box qu-userSelect--text\">Companies of all sizes have embraced the cloud and open source has become the standard for infrastructure software. Both pose their own blend of benefit and risk. A major data center attack or failure could be problematic for many companies, and we can certainly expect an increase in the number of cyber-attacks based on open source vulnerabilities<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_63 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/#Ransomware\" title=\"Ransomware\">Ransomware<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/#Digital_Rights_Management\" title=\"Digital Rights Management\">Digital Rights Management<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/#Zero_Trust_Network_Access\" title=\"Zero Trust Network Access\">Zero Trust Network Access<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/#Cloud_Misconfigurations\" title=\"Cloud Misconfigurations\">Cloud Misconfigurations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/#Compliance_Will_Be_the_Key\" title=\"Compliance Will Be the Key \n\">Compliance Will Be the Key \n<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/#Passwordless_Authentication\" title=\"Passwordless Authentication\">Passwordless Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/#Data_Sovereignty_Will_be_a_Priority\" title=\"Data Sovereignty Will be a Priority \n\">Data Sovereignty Will be a Priority \n<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/#Smaller_and_Efficient_Collaboration_Tools\" title=\"Smaller and Efficient Collaboration Tools \n\">Smaller and Efficient Collaboration Tools \n<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"Ransomware\"><\/span><strong>Ransomware<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Cybercrime is everywhere! Cybercriminals are opportunistic. The Pandemic has made the world more vulnerable to cyber-attacks. Cyber insurance provider Coalition states that ransomware accounted for 41% of all cyber insurance claims filed in the first half of 2020. Over the past 12 months, the perpetrators behind these cyberattacks got better at infiltrating enterprise networks, with brute-force attacks on remote access software such as Remote Desktop Protocol and VPNs, the malware used to gain a foothold, and bots to help spread the ransomware.\u00a0 Targeting the most vulnerable victims and strategies that make it difficult to recover encrypted data will keep ransomware the most profitable way for cybercriminals in 2021 and the single biggest threat for all enterprises. That makes it critical for <span class=\"ILfuVd\"><span class=\"hgKElc\">information security officer<\/span><\/span>s to ensure they follow best practices for reducing ransomware risk this year.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Digital_Rights_Management\"><\/span><strong>Digital Rights Management<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The number of internet users will continue to increase in the coming year, and <a href=\"https:\/\/pages.bitglass.com\/CD-FY20Q2-RemoteWorkforceReport_LP.html?&amp;utm_source=pr\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">84%<\/a> of organizations will continue to support remote work even after a stay at home orders are lifted. Combining these trends with the rapid development and adoption of technologies like 5G (which enables malicious actors to execute attacks and move data much more quickly) suggests that we will see an increase in the number of people around the world who are impacted by data breaches. Due to the rising demand for digital content security and management, the DRM market is expected to expand at a significant pace this year. The adoption of innovative revenue models and the introduction of stringent policies and regulations by governments for the protection of intellectual property (IP) from unfair usage and illegal competition is also driving digital rights management. Lack of awareness about enterprises about the benefits of DRM solutions and lack of common standards to manage digital content restrict the growth of this market. The various digital rights management applications such as mobile content, mobile gaming, and e-books in different verticals offer opportunities for the global DRM market.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Zero_Trust_Network_Access\"><\/span><strong>Zero Trust Network Access<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Zero trust network access (ZTNA) services, also known as a software-defined perimeter (SDP), are a set of technologies built to provide fast, secure access to private applications without placing a user on the network.<\/p>\n<p class=\"q-text qu-display--block\">Based on the sensitivity of data access, we should be consistently re-verifying users at points where it makes sense. At the same time, we want to make sure the user experience for legitimate users is as seamless and comfortable as possible. It\u2019s a balance between making things more productive for end users while increasing the security level by continuously monitoring and deciding if we need to re-prompt for verification.<\/p>\n<p class=\"q-text qu-display--block\">In the zero-trust security model, you grant access \u2013 to critical applications, data, and endpoints \u2013 only to those users and devices that have already been authenticated and verified. This approach is based on three essential steps:<\/p>\n<ul class=\"q-box\">\n<li class=\"q-relative\">Verifying users when they login to the system<\/li>\n<li class=\"q-relative\">Validating devices before they connect to the network<\/li>\n<li class=\"q-relative\">Managing privileged access<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"q-image qu-display--block qu-borderRadius--small\" src=\"https:\/\/qphs.fs.quoracdn.net\/main-qimg-b5b4932052090c03f8d4cf4ef4803599\" alt=\"Steps to the Zero Trust Security Model\"><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Cloud_Misconfigurations\"><\/span><strong>Cloud Misconfigurations<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Misconfiguration occurs when computing assets are set up incorrectly, often leaving them vulnerable to malicious activity. Misconfiguration of cloud resources is a leading cause of data breaches and could allow deletion or modification of resources and service interruption. Cloud misconfigurations are considered a data security risk by 95% of IT decision-makers. As public clouds become more widely used within an organization, the risk of misconfiguration grows. But it can be avoided as long as organizations use cybersecurity and policy automation to keep up with the sheer volume of network activity. If more IT security tasks are automated, organizations are better prepared to reduce hybrid cloud complexity and improve network visibility to prevent cloud misconfiguration from happening in the first place.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Compliance_Will_Be_the_Key\"><\/span><strong>Compliance Will Be the Key<br \/>\n<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Security and compliance teams face an uncertain 2021, and there will no doubt be increased regulation as a result of COVID-19. But there is also data compliance uncertainty between the US, Europe, and the UK as a result of the UK exiting the European Union in January 2021. Organizations will need to adopt protective security arrangements to meet the changing threat landscape, including the challenge of managing a remote workforce at scale. 55% of enterprise executives plan to increase their cybersecurity budgets in 2021 and 51% are adding full-time cyber staff in 2021.<\/p>\n<p>2020 has been a difficult year for compliance. We have already seen the EU-US Privacy Shield being revoked. Any businesses that handle sensitive or personal data, such as<a title=\"Open in a new tab\" href=\"https:\/\/www.atlantic.net\/hipaa-compliant-hosting\/hipaa-compliance-guide-what-is-hipaa\/\" target=\"new\" rel=\"noopener noreferrer\"> HIPAA-compliant <\/a>healthcare organizations, must take extra care during this pandemic.\u00a0Each legislation is still enforceable despite some relaxation of enforcement by governing bodies like the Office for Civil Rights (OCR). Other data privacy acts, such as GDPR, CCPA will continue to take action against businesses that suffer a data breach.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Passwordless_Authentication\"><\/span><strong>Passwordless Authentication<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The identity will become the new security perimeter. In 2021, IT teams will implement a more robust identity and access management (IAM) strategy and solutions such as Single Sign-On (SSO), password management, and multifactor authentication (MFA) to support a secure digital dynamic workforce and to further enhance remote employees\u2019 security. We will see a larger number of organizations adopt passwordless authentication.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Data_Sovereignty_Will_be_a_Priority\"><\/span><strong>Data Sovereignty Will be a Priority<br \/>\n<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Privacy and data protection have been a major driver for restricting international data transfers. Policymakers in the EU and around the world are focusing their attention on the rollout of digital infrastructures like the cloud and 5G, to reduce dependence on international suppliers and to prevent potential surveillance activities by foreign governments. Data localization approaches have been embraced around the world (e.g. Russia, Brazil, China, India, Vietnam) to ensure easier law enforcement access to data for criminal investigations and prosecutions. Finding a policy solution to cross-border data transfers is an unprecedented opportunity: a new Privacy Shield might set the benchmark for global data flows.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Smaller_and_Efficient_Collaboration_Tools\"><\/span><strong>Smaller and Efficient Collaboration Tools<br \/>\n<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>we\u2019ve seen time and time again that these open, large-scale video calls created opportunities for bad actors to gain access and disrupt meetings. As companies double down on cybersecurity and employees prioritize productivity and experience higher levels of online fatigue, the functionality of these all-hands calls will diminish. Instead, people will prefer private, highly-focused video groups and breakout rooms centered around efficiency, specific goals, and collaborative interactions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 With ever-growing cybercrime rates and AI stepping up its hacking game, the field of cybersecurity holds an instrumental position in almost every organization. The cybersecurity landscape is constantly changing with hackers finding new ways to target businesses and cybersecurity professionals trying to keep up with the defenses. The proliferation of IoT devices, the increased [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[345,1055,1490,1026,1571],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v20.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security Trends To Watch Out in 2021 - FileCloud blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Trends To Watch Out in 2021\" \/>\n<meta property=\"og:description\" content=\"\u00a0 With ever-growing cybercrime rates and AI stepping up its hacking game, the field of cybersecurity holds an instrumental position in almost every organization. The cybersecurity landscape is constantly changing with hackers finding new ways to target businesses and cybersecurity professionals trying to keep up with the defenses. The proliferation of IoT devices, the increased [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/\" \/>\n<meta property=\"og:site_name\" content=\"FileCloud blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tonidopage\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-26T11:47:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-17T17:46:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2021\/01\/undraw_Security_on_ff2u.png\" \/>\n<meta name=\"author\" content=\"Team FileCloud\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:site\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Team FileCloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/\"},\"author\":{\"name\":\"Team FileCloud\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/8a8df071f564aa2c10fa07d6ce60c935\"},\"headline\":\"Cyber Security Trends To Watch Out in 2021\",\"datePublished\":\"2021-01-26T11:47:11+00:00\",\"dateModified\":\"2022-03-17T17:46:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/\"},\"wordCount\":1161,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"keywords\":[\"data compliance\",\"Data sovereignty\",\"DRM\",\"Ransomware\",\"Zero Trust Network Access\"],\"articleSection\":[\"Enterprise File Sharing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/\",\"name\":\"Cyber Security Trends To Watch Out in 2021 - FileCloud blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\"},\"datePublished\":\"2021-01-26T11:47:11+00:00\",\"dateModified\":\"2022-03-17T17:46:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.filecloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Trends To Watch Out in 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"name\":\"FileCloud blog\",\"description\":\"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing\",\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\",\"name\":\"FileCloud\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"contentUrl\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"width\":155,\"height\":40,\"caption\":\"FileCloud\"},\"image\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/tonidopage\",\"https:\/\/twitter.com\/getfilecloud\",\"https:\/\/www.linkedin.com\/company\/codelathe\",\"https:\/\/www.pinterest.com\/filecloud\/filecloud\/\",\"https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/8a8df071f564aa2c10fa07d6ce60c935\",\"name\":\"Team FileCloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b5818ab931b69298f500d8a184fd2384?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b5818ab931b69298f500d8a184fd2384?s=96&d=mm&r=g\",\"caption\":\"Team FileCloud\"},\"sameAs\":[\"http:\/\/www.filecloud.com\"],\"url\":\"https:\/\/www.filecloud.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Security Trends To Watch Out in 2021 - FileCloud blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security Trends To Watch Out in 2021","og_description":"\u00a0 With ever-growing cybercrime rates and AI stepping up its hacking game, the field of cybersecurity holds an instrumental position in almost every organization. The cybersecurity landscape is constantly changing with hackers finding new ways to target businesses and cybersecurity professionals trying to keep up with the defenses. The proliferation of IoT devices, the increased [&hellip;]","og_url":"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/","og_site_name":"FileCloud blog","article_publisher":"https:\/\/www.facebook.com\/tonidopage","article_published_time":"2021-01-26T11:47:11+00:00","article_modified_time":"2022-03-17T17:46:07+00:00","og_image":[{"url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2021\/01\/undraw_Security_on_ff2u.png"}],"author":"Team FileCloud","twitter_card":"summary_large_image","twitter_creator":"@getfilecloud","twitter_site":"@getfilecloud","twitter_misc":{"Written by":"Team FileCloud","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/#article","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/"},"author":{"name":"Team FileCloud","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/8a8df071f564aa2c10fa07d6ce60c935"},"headline":"Cyber Security Trends To Watch Out in 2021","datePublished":"2021-01-26T11:47:11+00:00","dateModified":"2022-03-17T17:46:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/"},"wordCount":1161,"commentCount":0,"publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"keywords":["data compliance","Data sovereignty","DRM","Ransomware","Zero Trust Network Access"],"articleSection":["Enterprise File Sharing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/","url":"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/","name":"Cyber Security Trends To Watch Out in 2021 - FileCloud blog","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/#website"},"datePublished":"2021-01-26T11:47:11+00:00","dateModified":"2022-03-17T17:46:07+00:00","breadcrumb":{"@id":"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.filecloud.com\/blog\/cyber-security-trends-to-watch-out-in-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.filecloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Trends To Watch Out in 2021"}]},{"@type":"WebSite","@id":"https:\/\/www.filecloud.com\/blog\/#website","url":"https:\/\/www.filecloud.com\/blog\/","name":"FileCloud blog","description":"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing","publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.filecloud.com\/blog\/#organization","name":"FileCloud","url":"https:\/\/www.filecloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","contentUrl":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","width":155,"height":40,"caption":"FileCloud"},"image":{"@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/tonidopage","https:\/\/twitter.com\/getfilecloud","https:\/\/www.linkedin.com\/company\/codelathe","https:\/\/www.pinterest.com\/filecloud\/filecloud\/","https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g"]},{"@type":"Person","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/8a8df071f564aa2c10fa07d6ce60c935","name":"Team FileCloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b5818ab931b69298f500d8a184fd2384?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5818ab931b69298f500d8a184fd2384?s=96&d=mm&r=g","caption":"Team FileCloud"},"sameAs":["http:\/\/www.filecloud.com"],"url":"https:\/\/www.filecloud.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/29465"}],"collection":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/comments?post=29465"}],"version-history":[{"count":7,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/29465\/revisions"}],"predecessor-version":[{"id":33185,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/29465\/revisions\/33185"}],"wp:attachment":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/media?parent=29465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/categories?post=29465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/tags?post=29465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}