{"id":19496,"date":"2021-08-06T13:37:23","date_gmt":"2021-08-06T13:37:23","guid":{"rendered":"https:\/\/www.algardata.com\/?p=19496"},"modified":"2021-08-06T14:02:08","modified_gmt":"2021-08-06T14:02:08","slug":"7-cybersecurity-trends-and-predictions-for-2022","status":"publish","type":"post","link":"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/","title":{"rendered":"7 cybersecurity trends and predictions for 2022"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: #ffffff;background-position: center center;background-repeat: no-repeat;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center\" style=\"max-width:1331.2px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-1\"><p><a href=\"https:\/\/algardata.com\/blog\"><i class=\"fal fa-angle-left\" style=\"margin-right: 8px\"><!--icone--><\/i>Voltar<\/a><\/p>\n<\/div><style type=\"text\/css\">@media only screen and (max-width:1024px) {.fusion-title.fusion-title-1{margin-top:0px!important;margin-right:!important;margin-bottom:0px!important; margin-left:!important;}}@media only screen and (max-width:640px) {.fusion-title.fusion-title-1{margin-top:0px!important; margin-right:0px!important;margin-bottom:0px!important; margin-left:0px!important;}}<\/style><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;\"><h1 class=\"title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:48;line-height:1.21;\"><p style=\"text-align: left\"><b><span data-contrast=\"auto\">7 cybersecurity trends and predictions for 2022 <\/span><\/b><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{\">\u00a0<\/span><\/p><\/h1><\/div><div class=\"fusion-sharing-box fusion-sharing-box-1 fusion-no-large-visibility boxed-icons article-social\" style=\"background-color:#ffffff;margin-top:60px;\" data-title=\"7 cybersecurity trends and predictions for 2022\" data-description=\"Voltar \r\n7 cybersecurity trends and predictions for 2022 \u00a0\r\n\u00a0     \r\n\r\n\r\n\r\nDid you know that a cyberattack is launched\" data-link=\"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/\"><div class=\"fusion-social-networks sharingbox-shortcode-icon-wrapper sharingbox-shortcode-icon-wrapper-1 boxed-icons\"><span><a href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fold.algardata.com%2Fen%2Fblog-en%2Fbusiness%2F7-cybersecurity-trends-and-predictions-for-2022%2F&amp;t=7%20cybersecurity%20trends%20and%20predictions%20for%202022\" target=\"_blank\" title=\"Facebook\" aria-label=\"Facebook\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"Facebook\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-facebook awb-icon-facebook\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><span><a href=\"https:\/\/twitter.com\/share?text=7%20cybersecurity%20trends%20and%20predictions%20for%202022&amp;url=https%3A%2F%2Fold.algardata.com%2Fen%2Fblog-en%2Fbusiness%2F7-cybersecurity-trends-and-predictions-for-2022%2F\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Twitter\" aria-label=\"Twitter\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"Twitter\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-twitter awb-icon-twitter\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><span><a href=\"http:\/\/reddit.com\/submit?url=https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/&amp;title=7 cybersecurity trends and predictions for 2022\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Reddit\" aria-label=\"Reddit\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"Reddit\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-reddit awb-icon-reddit\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><span><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&amp;url=https%3A%2F%2Fold.algardata.com%2Fen%2Fblog-en%2Fbusiness%2F7-cybersecurity-trends-and-predictions-for-2022%2F&amp;title=7%20cybersecurity%20trends%20and%20predictions%20for%202022&amp;summary=Voltar%20%0D%0A7%20cybersecurity%20trends%20and%20predictions%20for%202022%20%C2%A0%0D%0A%C2%A0%20%20%20%20%20%20%20%20%20%0D%0A%0D%0A%0D%0A%0D%0ADid%20you%20know%20that%20a%20cyberattack%20is%20launched\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"LinkedIn\" aria-label=\"LinkedIn\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"LinkedIn\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-linkedin awb-icon-linkedin\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><span><a href=\"https:\/\/api.whatsapp.com\/send?text=https%3A%2F%2Fold.algardata.com%2Fen%2Fblog-en%2Fbusiness%2F7-cybersecurity-trends-and-predictions-for-2022%2F\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"WhatsApp\" aria-label=\"WhatsApp\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"WhatsApp\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-whatsapp awb-icon-whatsapp\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><span><a href=\"http:\/\/www.tumblr.com\/share\/link?url=https%3A%2F%2Fold.algardata.com%2Fen%2Fblog-en%2Fbusiness%2F7-cybersecurity-trends-and-predictions-for-2022%2F&amp;name=7%20cybersecurity%20trends%20and%20predictions%20for%202022&amp;description=Voltar%20%0D%0A7%20cybersecurity%20trends%20and%20predictions%20for%202022%20%C2%A0%0D%0A%C2%A0%20%20%20%20%20%20%20%20%20%0D%0A%0D%0A%0D%0A%0D%0ADid%20you%20know%20that%20a%20cyberattack%20is%20launched\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Tumblr\" aria-label=\"Tumblr\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"Tumblr\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-tumblr awb-icon-tumblr\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><span><a href=\"http:\/\/pinterest.com\/pin\/create\/button\/?url=https%3A%2F%2Fold.algardata.com%2Fen%2Fblog-en%2Fbusiness%2F7-cybersecurity-trends-and-predictions-for-2022%2F&amp;description=Voltar%20%0D%0A7%20cybersecurity%20trends%20and%20predictions%20for%202022%20%C2%A0%0D%0A%C2%A0%20%20%20%20%20%20%20%20%20%0D%0A%0D%0A%0D%0A%0D%0ADid%20you%20know%20that%20a%20cyberattack%20is%20launched&amp;media=\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Pinterest\" aria-label=\"Pinterest\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"Pinterest\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-pinterest awb-icon-pinterest\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><span><a href=\"http:\/\/vkontakte.ru\/share.php?url=https%3A%2F%2Fold.algardata.com%2Fen%2Fblog-en%2Fbusiness%2F7-cybersecurity-trends-and-predictions-for-2022%2F&amp;title=7%20cybersecurity%20trends%20and%20predictions%20for%202022&amp;description=Voltar%20%0D%0A7%20cybersecurity%20trends%20and%20predictions%20for%202022%20%C2%A0%0D%0A%C2%A0%20%20%20%20%20%20%20%20%20%0D%0A%0D%0A%0D%0A%0D%0ADid%20you%20know%20that%20a%20cyberattack%20is%20launched\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Vk\" aria-label=\"Vk\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"Vk\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-vk awb-icon-vk\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><span><a href=\"mailto:?subject=7%20cybersecurity%20trends%20and%20predictions%20for%202022&amp;body=https%3A%2F%2Fold.algardata.com%2Fen%2Fblog-en%2Fbusiness%2F7-cybersecurity-trends-and-predictions-for-2022%2F\" target=\"_self\" title=\"Email\" aria-label=\"Email\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"Email\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-mail awb-icon-mail\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><\/div><\/div><style type=\"text\/css\">.fusion-sharing-box-1 h4{margin-bottom:0 !important;}.fusion-sharing-box-1{flex-direction:row !important;}@media only screen and (max-width:1024px){.fusion-sharing-box-1 h4{margin-right:0.5em !important;margin-bottom:0 !important;}.sharingbox-shortcode-icon-wrapper-1{width:auto !important;justify-content:flex-end !important;}.fusion-sharing-box-1{align-items:center !important;} }@media only screen and (max-width:640px){.fusion-sharing-box-1{flex-direction:row !important;align-items:center !important;}.fusion-sharing-box-1 h4{margin-right:0.5em !important;margin-bottom:0 !important;}.sharingbox-shortcode-icon-wrapper-1{width:auto !important;justify-content:space-between !important;} }<\/style><div class=\"fusion-modal modal fade modal-1 newsletter\" tabindex=\"-1\" role=\"dialog\" aria-labelledby=\"modal-heading-1\" aria-hidden=\"true\"><style type=\"text\/css\">.modal-1 .modal-header, .modal-1 .modal-footer{border-color:#002d57;}.modal-1 .close{color:#ffffff; opacity:0.35}<\/style><div class=\"modal-dialog modal-lg\" role=\"document\"><div class=\"modal-content fusion-modal-content\" style=\"background-color:#002d57\"><div class=\"modal-header\"><button class=\"close\" type=\"button\" data-dismiss=\"modal\" aria-hidden=\"true\" aria-label=\"Close\">&times;<\/button><h3 class=\"modal-title\" id=\"modal-heading-1\" data-dismiss=\"modal\" aria-hidden=\"true\">Subscribe to our newsletter and be the first to know about new products and special offers.<\/h3><\/div><div class=\"modal-body fusion-clearfix\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f17743-o1\" lang=\"en-US\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/posts\/19496#wpcf7-f17743-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"17743\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.8.5\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f17743-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_hidden_group_fields\" value=\"[]\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_hidden_groups\" value=\"[]\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_visible_groups\" value=\"[]\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_repeaters\" value=\"[]\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_steps\" value=\"{}\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_options\" value=\"{&quot;form_id&quot;:17743,&quot;conditions&quot;:[],&quot;settings&quot;:{&quot;animation&quot;:&quot;yes&quot;,&quot;animation_intime&quot;:200,&quot;animation_outtime&quot;:200,&quot;conditions_ui&quot;:&quot;normal&quot;,&quot;notice_dismissed&quot;:false}}\" \/>\n<\/div>\n<div class=\"newsletter-footer\">\n\t<div class=\"col-lg-8 form-padding\" >\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-lg-4 form-padding\">\n\t\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner sub_news\" type=\"submit\" value=\"Subscribe\" \/>\n\t\t<\/p>\n\t\t<p><img class=\"lazyload subscribed\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27480%27%20height%3D%27360%27%20viewBox%3D%270%200%20480%20360%27%3E%3Crect%20width%3D%27480%27%20height%3D%27360%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2020\/12\/subscribed.gif\" \/>\n\t\t<\/p>\n\t<\/div>\n<\/div><div class=\"fusion-alert alert custom alert-custom fusion-alert-center wpcf7-response-output alert-dismissable\" style=\"border-width:1px;\"><button type=\"button\" class=\"close toggle-alert\" data-dismiss=\"alert\" aria-label=\"Close\">&times;<\/button><div class=\"fusion-alert-content-wrapper\"><span class=\"fusion-alert-content\"><\/span><\/div><\/div>\n<\/form>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-0{width:66.666666666667% !important;margin-top : 0px;margin-bottom : 0px;}.fusion-builder-column-0 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 2.88%;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 2.88%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-0{width:100% !important;order : 0;}.fusion-builder-column-0 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-0{width:100% !important;order : 0;}.fusion-builder-column-0 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-flex-container.fusion-builder-row-1{ padding-top : 0px;margin-top : 80px;padding-right : 0px;padding-bottom : 0px;margin-bottom : 0px;padding-left : 0px;}@media only screen and (max-width:1024px) {.fusion-body .fusion-flex-container.fusion-builder-row-1{ margin-top : 16px;}}@media only screen and (max-width:640px) {.fusion-body .fusion-flex-container.fusion-builder-row-1{ margin-top : 16px;}}<\/style><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: #ffffff;background-position: center center;background-repeat: no-repeat;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center\" style=\"max-width:1331.2px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-flex-column article-social-box fusion-no-small-visibility fusion-no-medium-visibility\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-sharing-box fusion-sharing-box-2 fusion-no-small-visibility fusion-no-medium-visibility boxed-icons article-social\" style=\"background-color:#ffffff;margin-top:60px;\" data-title=\"7 cybersecurity trends and predictions for 2022\" data-description=\"Voltar \r\n7 cybersecurity trends and predictions for 2022 \u00a0\r\n\u00a0     \r\n\r\n\r\n\r\nDid you know that a cyberattack is launched\" data-link=\"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/\"><div class=\"fusion-social-networks sharingbox-shortcode-icon-wrapper sharingbox-shortcode-icon-wrapper-2 boxed-icons\"><span><a href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fold.algardata.com%2Fen%2Fblog-en%2Fbusiness%2F7-cybersecurity-trends-and-predictions-for-2022%2F&amp;t=7%20cybersecurity%20trends%20and%20predictions%20for%202022\" target=\"_blank\" title=\"Facebook\" aria-label=\"Facebook\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"Facebook\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-facebook awb-icon-facebook\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><span><a href=\"https:\/\/twitter.com\/share?text=7%20cybersecurity%20trends%20and%20predictions%20for%202022&amp;url=https%3A%2F%2Fold.algardata.com%2Fen%2Fblog-en%2Fbusiness%2F7-cybersecurity-trends-and-predictions-for-2022%2F\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Twitter\" aria-label=\"Twitter\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"Twitter\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-twitter awb-icon-twitter\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><span><a href=\"http:\/\/reddit.com\/submit?url=https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/&amp;title=7 cybersecurity trends and predictions for 2022\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Reddit\" aria-label=\"Reddit\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"Reddit\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-reddit awb-icon-reddit\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><span><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&amp;url=https%3A%2F%2Fold.algardata.com%2Fen%2Fblog-en%2Fbusiness%2F7-cybersecurity-trends-and-predictions-for-2022%2F&amp;title=7%20cybersecurity%20trends%20and%20predictions%20for%202022&amp;summary=Voltar%20%0D%0A7%20cybersecurity%20trends%20and%20predictions%20for%202022%20%C2%A0%0D%0A%C2%A0%20%20%20%20%20%20%20%20%20%0D%0A%0D%0A%0D%0A%0D%0ADid%20you%20know%20that%20a%20cyberattack%20is%20launched\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"LinkedIn\" aria-label=\"LinkedIn\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"LinkedIn\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-linkedin awb-icon-linkedin\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><span><a href=\"https:\/\/api.whatsapp.com\/send?text=https%3A%2F%2Fold.algardata.com%2Fen%2Fblog-en%2Fbusiness%2F7-cybersecurity-trends-and-predictions-for-2022%2F\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"WhatsApp\" aria-label=\"WhatsApp\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"WhatsApp\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-whatsapp awb-icon-whatsapp\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><span><a href=\"http:\/\/www.tumblr.com\/share\/link?url=https%3A%2F%2Fold.algardata.com%2Fen%2Fblog-en%2Fbusiness%2F7-cybersecurity-trends-and-predictions-for-2022%2F&amp;name=7%20cybersecurity%20trends%20and%20predictions%20for%202022&amp;description=Voltar%20%0D%0A7%20cybersecurity%20trends%20and%20predictions%20for%202022%20%C2%A0%0D%0A%C2%A0%20%20%20%20%20%20%20%20%20%0D%0A%0D%0A%0D%0A%0D%0ADid%20you%20know%20that%20a%20cyberattack%20is%20launched\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Tumblr\" aria-label=\"Tumblr\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"Tumblr\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-tumblr awb-icon-tumblr\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><span><a href=\"http:\/\/pinterest.com\/pin\/create\/button\/?url=https%3A%2F%2Fold.algardata.com%2Fen%2Fblog-en%2Fbusiness%2F7-cybersecurity-trends-and-predictions-for-2022%2F&amp;description=Voltar%20%0D%0A7%20cybersecurity%20trends%20and%20predictions%20for%202022%20%C2%A0%0D%0A%C2%A0%20%20%20%20%20%20%20%20%20%0D%0A%0D%0A%0D%0A%0D%0ADid%20you%20know%20that%20a%20cyberattack%20is%20launched&amp;media=\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Pinterest\" aria-label=\"Pinterest\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"Pinterest\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-pinterest awb-icon-pinterest\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><span><a href=\"http:\/\/vkontakte.ru\/share.php?url=https%3A%2F%2Fold.algardata.com%2Fen%2Fblog-en%2Fbusiness%2F7-cybersecurity-trends-and-predictions-for-2022%2F&amp;title=7%20cybersecurity%20trends%20and%20predictions%20for%202022&amp;description=Voltar%20%0D%0A7%20cybersecurity%20trends%20and%20predictions%20for%202022%20%C2%A0%0D%0A%C2%A0%20%20%20%20%20%20%20%20%20%0D%0A%0D%0A%0D%0A%0D%0ADid%20you%20know%20that%20a%20cyberattack%20is%20launched\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Vk\" aria-label=\"Vk\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"Vk\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-vk awb-icon-vk\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><span><a href=\"mailto:?subject=7%20cybersecurity%20trends%20and%20predictions%20for%202022&amp;body=https%3A%2F%2Fold.algardata.com%2Fen%2Fblog-en%2Fbusiness%2F7-cybersecurity-trends-and-predictions-for-2022%2F\" target=\"_self\" title=\"Email\" aria-label=\"Email\" data-placement=\"left\" data-toggle=\"tooltip\" data-title=\"Email\"><i class=\"fusion-social-network-icon fusion-tooltip fusion-mail awb-icon-mail\" style=\"color:#fff;background-color:#7F96AB;border-color:#7F96AB;border-radius:99px;\" aria-hidden=\"true\"><\/i><\/a><\/span><\/div><\/div><style type=\"text\/css\">.fusion-sharing-box-2 h4{margin-bottom:0 !important;}.fusion-sharing-box-2{flex-direction:row !important;}@media only screen and (max-width:1024px){.fusion-sharing-box-2 h4{margin-right:0.5em !important;margin-bottom:0 !important;}.sharingbox-shortcode-icon-wrapper-2{width:auto !important;justify-content:flex-end !important;}.fusion-sharing-box-2{align-items:center !important;} }@media only screen and (max-width:640px){.fusion-sharing-box-2{flex-direction:row !important;align-items:center !important;}.fusion-sharing-box-2 h4{margin-right:0.5em !important;margin-bottom:0 !important;}.sharingbox-shortcode-icon-wrapper-2{width:auto !important;justify-content:space-between !important;} }<\/style><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-1{width:50% !important;margin-top : 0px;margin-bottom : 0px;}.fusion-builder-column-1 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 0;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 3.84%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-1{width:100% !important;order : 0;}.fusion-builder-column-1 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-1{width:100% !important;order : 0;}.fusion-builder-column-1 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column blog_article\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-2\"><p><img decoding=\"async\" class=\"lazyload size-full wp-image-19548\" title=\"cyberseguranca 2022 08 21 header EN 2\" src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_header_EN-2.jpg\" data-orig-src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_header_EN-2.jpg\" alt=\"cyberseguranca 2022 08 21 header EN 2\" width=\"800\" height=\"400\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27800%27%20height%3D%27400%27%20viewBox%3D%270%200%20800%20400%27%3E%3Crect%20width%3D%27800%27%20height%3D%27400%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_header_EN-2-200x100.jpg 200w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_header_EN-2-400x200.jpg 400w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_header_EN-2-600x300.jpg 600w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_header_EN-2-768x384.jpg 768w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_header_EN-2.jpg 800w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Did you know that a cyberattack is launched every 39 seconds? This is something that all businesses &#8211; large and small &#8211; should be concerned about. It&#8217;s no wonder that the cybersecurity landscape has been changing throughout 2020 and 2021. The Covid-19 pandemic has been particularly challenging for security teams. Given the shift towards social distancing and telecommuting for many industries, cybersecurity has become a top priority.<\/p>\n<p>As companies look to consolidate their cybersecurity and data protection practices to adapt to a new reality, here are the most common cybersecurity trends you should be tracking in 2022.<\/p>\n<h2><\/h2>\n<p><img decoding=\"async\" class=\"lazyload size-full wp-image-19515\" title=\"cyberseguranca 2022 08 21 imagem 1\" src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-1.png\" data-orig-src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-1.png\" alt=\"cyberseguranca 2022 08 21 imagem 1\" width=\"800\" height=\"400\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27800%27%20height%3D%27400%27%20viewBox%3D%270%200%20800%20400%27%3E%3Crect%20width%3D%27800%27%20height%3D%27400%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-1-200x100.png 200w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-1-400x200.png 400w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-1-600x300.png 600w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-1-768x384.png 768w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-1.png 800w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Cloud threats are on the rise<\/p>\n<p>As remote working and online collaboration intensified during the pandemic, cloud adoption was critical for companies to ensure business continuity. Although organizations had been migrating to the cloud prior to the crisis, the pandemic accelerated the transition process.<\/p>\n<p>However, rapid migration to the Cloud introduces several new security challenges and threats, including misconfigured Cloud storage, reduced control and visibility, incomplete data deletion, and Cloud vulnerabilities. That&#8217;s why protecting Cloud infrastructures from cyber threats must be an urgent priority for all enterprises in 2022.<\/p>\n<h2><\/h2>\n<p><img decoding=\"async\" class=\"lazyload size-full wp-image-19518\" title=\"cyberseguranca 2022 08 21 imagem 2\" src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-2.png\" data-orig-src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-2.png\" alt=\"cyberseguranca 2022 08 21 imagem 2\" width=\"800\" height=\"400\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27800%27%20height%3D%27400%27%20viewBox%3D%270%200%20800%20400%27%3E%3Crect%20width%3D%27800%27%20height%3D%27400%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-2-200x100.png 200w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-2-400x200.png 400w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-2-600x300.png 600w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-2-768x384.png 768w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-2.png 800w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Focus on AI-powered solutions<\/p>\n<p>Advances in Artificial Intelligence (AI) are increasing our ability to detect threats more successfully than ever before. One of the biggest threats to cyber systems is the difficulty in updating and patching in real time. As new threats become known to the hacker community, technology vendors need to quickly produce fixes on potentially compromised systems.<\/p>\n<p>These affected systems have often relied on their human counterparts to take the necessary steps to rectify the weaknesses. However, with AI, sufficiently intelligent networks can process their weak points and repair them in real time, leading to less downtime and less stress for IT teams. These solutions will gradually hit the market in the coming years, and this cybersecurity trend will continue to grow. Until then, you need a good security and maintenance plan for your IT department to ensure that critical systems stay up to date with the latest security patches.<\/p>\n<h2><\/h2>\n<p><img decoding=\"async\" class=\"lazyload size-full wp-image-19521\" title=\"cyberseguranca 2022 08 21 imagem 3\" src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-3.png\" data-orig-src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-3.png\" alt=\"cyberseguranca 2022 08 21 imagem 3\" width=\"800\" height=\"400\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27800%27%20height%3D%27400%27%20viewBox%3D%270%200%20800%20400%27%3E%3Crect%20width%3D%27800%27%20height%3D%27400%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-3-200x100.png 200w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-3-400x200.png 400w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-3-600x300.png 600w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-3-768x384.png 768w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-3.png 800w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Attacks on mobile devices<\/p>\n<p>Like other types of cyber-attacks, mobile malware is becoming increasingly sophisticated. This may be due to the increase in access to e-Commerce software and other platforms via smartphones or other mobile devices. Cybercriminals find these devices an easy means of attack as they are used for business and personal communication, shopping, hotel reservations, banking, etc.<\/p>\n<p>In 2020, the Microsoft 365 Defender Research Team discovered a new Android malware, which was the latest evolution of mobile ransomware and much more sophisticated than its predecessors. This malware completely disabled the use of Android devices and forced individuals to pay ransom to get control back.<\/p>\n<h2><\/h2>\n<p><img decoding=\"async\" class=\"lazyload size-full wp-image-19524\" title=\"cyberseguranca 2022 08 21 imagem 4\" src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-4.png\" data-orig-src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-4.png\" alt=\"cyberseguranca 2022 08 21 imagem 4\" width=\"800\" height=\"400\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27800%27%20height%3D%27400%27%20viewBox%3D%270%200%20800%20400%27%3E%3Crect%20width%3D%27800%27%20height%3D%27400%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-4-200x100.png 200w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-4-400x200.png 400w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-4-600x300.png 600w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-4-768x384.png 768w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-4.png 800w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Supply Chain Attacks<\/p>\n<p>Although supply chain attacks are not the most common cybercrimes, they are still extremely damaging. These can occur when cybercriminals find a weakness or a series of vulnerabilities in an organization&#8217;s ecosystem, particularly through third-party systems. This is fueled by the sudden increase in digitization, the rise of remote working, and the growing number of connected devices. Due to these factors, cybercriminals can exploit more access points in the supply chain.<\/p>\n<h2><\/h2>\n<p><img decoding=\"async\" class=\"lazyload size-full wp-image-19527\" title=\"cyberseguranca 2022 08 21 imagem 5\" src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-5.png\" data-orig-src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-5.png\" alt=\"cyberseguranca 2022 08 21 imagem 5\" width=\"800\" height=\"400\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27800%27%20height%3D%27400%27%20viewBox%3D%270%200%20800%20400%27%3E%3Crect%20width%3D%27800%27%20height%3D%27400%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-5-200x100.png 200w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-5-400x200.png 400w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-5-600x300.png 600w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-5-768x384.png 768w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-5.png 800w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Compliance in increasingly complex environments<\/p>\n<p>Increasingly, companies need to be agnostic in their approach and implement solutions that reduce bottlenecks and blind spots to ensure that data is never at risk, regardless of where it is located and who is using it.<\/p>\n<p>If there are no such guarantees, these blind spots can be leveraged by cyber-attacks, create management roadblocks, or jeopardize compliance with existing rules. Today, privacy and data security are highlighted as the main challenges for cloud adoption &#8211; and this is exacerbated when we talk about more complex environments.<\/p>\n<h2><\/h2>\n<p><img decoding=\"async\" class=\"lazyload size-full wp-image-19530\" title=\"cyberseguranca 2022 08 21 imagem 6\" src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-6.png\" data-orig-src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-6.png\" alt=\"cyberseguranca 2022 08 21 imagem 6\" width=\"800\" height=\"400\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27800%27%20height%3D%27400%27%20viewBox%3D%270%200%20800%20400%27%3E%3Crect%20width%3D%27800%27%20height%3D%27400%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-6-200x100.png 200w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-6-400x200.png 400w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-6-600x300.png 600w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-6-768x384.png 768w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-6.png 800w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Ransomware threats will continue to grow<\/p>\n<p>71% of data breaches in 2020 are financially motivated, with 52% involving manual hacking rather than standalone malware. This means that cybercriminals may attempt to actively breach your servers and databases in order to cause financial damage. Ransomware attacks that involve holding a company&#8217;s database hostage in exchange for some forms of financial compensation have been growing at an alarming rate, becoming a threat to thousands of organizations around the world.<\/p>\n<p>The best way to prevent these attacks from advancing is to educate your staff on how email and files from unverified sources should be handled. A single file downloaded onto your company&#8217;s intranet can cause critical damage to the company&#8217;s financial well-being.<\/p>\n<h2><\/h2>\n<p><img decoding=\"async\" class=\"lazyload size-full wp-image-19533\" title=\"cyberseguranca 2022 08 21 imagem 7\" src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-7.png\" data-orig-src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-7.png\" alt=\"cyberseguranca 2022 08 21 imagem 7\" width=\"800\" height=\"400\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27800%27%20height%3D%27400%27%20viewBox%3D%270%200%20800%20400%27%3E%3Crect%20width%3D%27800%27%20height%3D%27400%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-7-200x100.png 200w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-7-400x200.png 400w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-7-600x300.png 600w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-7-768x384.png 768w, https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_imagem-7.png 800w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Cyberattacks on the Healthcare Sector<\/p>\n<p>Data breaches are one of the major cybersecurity trends in the healthcare sector, which is costing organizations huge amounts of money. With the outbreak of the new coronavirus, some of the healthcare organizations have relaxed their firewall rules so that their staff can work from home.<\/p>\n<p>Cybercriminals are looking to obtain sensitive information about employees, companies and patients and this continues to be a threat to healthcare organizations. By 2025, the healthcare cybersecurity market will skyrocket to $125 billion. Thus, healthcare organizations are paying more attention to security requirements such as compliance with the (Health Insurance Portability and Accountability Act) to protect health information.<\/p>\n<h2>Cybersecurity threats will continue to evolve in 2022<\/h2>\n<p>While cybersecurity trends may be temporary, they are a good indicator of the future ahead. As technology evolves, we will inevitably encounter a new set of challenges in the IT sector.<\/p>\n<p>We see these cybersecurity trends as some of the biggest challenges facing businesses and encourage all companies to continue to manage and educate their teams on these issues.<\/p>\n<p>When it comes to threats to your business, it&#8217;s always best to stay one step ahead!<\/p>\n<\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_1 1_1 fusion-flex-column\" id=\"main-footer\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;border-radius:4px 4px 4px 4px;background-color:#002d57;border-radius:4px 4px 4px 4px;overflow:hidden;padding: 20px 20px 20px 20px;\"><style type=\"text\/css\">@media only screen and (max-width:1024px) {.fusion-title.fusion-title-2{margin-top:10px!important; margin-right:0px!important;margin-bottom:15px!important;margin-left:0px!important;}}@media only screen and (max-width:640px) {.fusion-title.fusion-title-2{margin-top:10px!important; margin-right:0px!important;margin-bottom:10px!important; margin-left:0px!important;}}<\/style><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-six\" style=\"margin-top:10px;margin-right:0px;margin-bottom:15px;margin-left:0px;\"><h6 class=\"title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;color:#ffffff;--fontSize:32;line-height:1.25;\">Newsletter!<\/h6><\/div><div class=\"fusion-text fusion-text-3\" style=\"color:#ffffff;\"><p>Subscribe to our newsletter and receive weekly updates, with the bonus of a different ebook every month!<\/p>\n<\/div>\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f17743-o2\" lang=\"en-US\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/posts\/19496#wpcf7-f17743-o2\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"17743\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.8.5\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f17743-o2\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_hidden_group_fields\" value=\"[]\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_hidden_groups\" value=\"[]\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_visible_groups\" value=\"[]\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_repeaters\" value=\"[]\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_steps\" value=\"{}\" \/>\n<input type=\"hidden\" name=\"_wpcf7cf_options\" value=\"{&quot;form_id&quot;:17743,&quot;conditions&quot;:[],&quot;settings&quot;:{&quot;animation&quot;:&quot;yes&quot;,&quot;animation_intime&quot;:200,&quot;animation_outtime&quot;:200,&quot;conditions_ui&quot;:&quot;normal&quot;,&quot;notice_dismissed&quot;:false}}\" \/>\n<\/div>\n<div class=\"newsletter-footer\">\n\t<div class=\"col-lg-8 form-padding\" >\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-lg-4 form-padding\">\n\t\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner sub_news\" type=\"submit\" value=\"Subscribe\" \/>\n\t\t<\/p>\n\t\t<p><img class=\"lazyload subscribed\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27480%27%20height%3D%27360%27%20viewBox%3D%270%200%20480%20360%27%3E%3Crect%20width%3D%27480%27%20height%3D%27360%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2020\/12\/subscribed.gif\" \/>\n\t\t<\/p>\n\t<\/div>\n<\/div><div class=\"fusion-alert alert custom alert-custom fusion-alert-center wpcf7-response-output alert-dismissable\" style=\"border-width:1px;\"><button type=\"button\" class=\"close toggle-alert\" data-dismiss=\"alert\" aria-label=\"Close\">&times;<\/button><div class=\"fusion-alert-content-wrapper\"><span class=\"fusion-alert-content\"><\/span><\/div><\/div>\n<\/form>\n<\/div>\n<\/div><style type=\"text\/css\">.fusion-body .fusion-builder-nested-column-0{width:100% !important;margin-top : 0px;margin-bottom : 24px;}.fusion-builder-nested-column-0 > .fusion-column-wrapper {padding-top : 20px !important;padding-right : 20px !important;margin-right : 1.92%;padding-bottom : 20px !important;padding-left : 20px !important;margin-left : 1.92%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-nested-column-0{width:100% !important;order : 0;}.fusion-builder-nested-column-0 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-nested-column-0{width:100% !important;order : 0;}.fusion-builder-nested-column-0 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-2{width:50% !important;margin-top : 0px;margin-bottom : 0px;}.fusion-builder-column-2 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 0;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 0;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-2{width:100% !important;order : 0;}.fusion-builder-column-2 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-2{width:100% !important;order : 0;}.fusion-builder-column-2 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-flex-container.fusion-builder-row-2{ padding-top : 0px;margin-top : 48px;padding-right : 0px;padding-bottom : 0px;margin-bottom : 0px;padding-left : 0px;}<\/style><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":10,"featured_media":19545,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false},"categories":[256],"tags":[406,409,405,407,281,404,408],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>7 cybersecurity trends and predictions for 2022<\/title>\n<meta name=\"description\" content=\"Did you know that a cyberattack is launched every 39 seconds? This is something that all businesses - large and small - should be concerned about.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 cybersecurity trends and predictions for 2022\" \/>\n<meta property=\"og:description\" content=\"Did you know that a cyberattack is launched every 39 seconds? This is something that all businesses - large and small - should be concerned about.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"Algardata \u2013 We are technology. Business technology.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Algardata-113166512044312\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-06T13:37:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-06T14:02:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_header_EN-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"AlgarEditor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@algardata\" \/>\n<meta name=\"twitter:site\" content=\"@algardata\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"AlgarEditor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/\"},\"author\":{\"name\":\"AlgarEditor\",\"@id\":\"https:\/\/old.algardata.com\/#\/schema\/person\/a933bbf1a27260a488a611904ae507b2\"},\"headline\":\"7 cybersecurity trends and predictions for 2022\",\"datePublished\":\"2021-08-06T13:37:23+00:00\",\"dateModified\":\"2021-08-06T14:02:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/\"},\"wordCount\":3103,\"publisher\":{\"@id\":\"https:\/\/old.algardata.com\/#organization\"},\"keywords\":[\"colabora\u00e7\u00e3o\",\"fluxo de trabalho\",\"lista de tarefas\",\"organiza\u00e7\u00e3o\",\"produtividade\",\"sinergia empresarial\",\"sistema produtivo\"],\"articleSection\":[\"Business\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/\",\"url\":\"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/\",\"name\":\"7 cybersecurity trends and predictions for 2022\",\"isPartOf\":{\"@id\":\"https:\/\/old.algardata.com\/#website\"},\"datePublished\":\"2021-08-06T13:37:23+00:00\",\"dateModified\":\"2021-08-06T14:02:08+00:00\",\"description\":\"Did you know that a cyberattack is launched every 39 seconds? This is something that all businesses - large and small - should be concerned about.\",\"breadcrumb\":{\"@id\":\"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/old.algardata.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 cybersecurity trends and predictions for 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/old.algardata.com\/#website\",\"url\":\"https:\/\/old.algardata.com\/\",\"name\":\"Algardata \u2013 We are technology. Business technology.\",\"description\":\"Na Algardata gostamos de ver crescer o neg\u00f3cio dos nossos clientes. As tecnologias s\u00e3o o meio pelo qual procuramos satisfazer as suas necessidades e objetivos.\",\"publisher\":{\"@id\":\"https:\/\/old.algardata.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/old.algardata.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/old.algardata.com\/#organization\",\"name\":\"Algardata - Sistemas Inform\u00e1ticos SA\",\"url\":\"https:\/\/old.algardata.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/old.algardata.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/old.algardata.com\/wp-content\/uploads\/2020\/04\/Logo_algardata.png\",\"contentUrl\":\"https:\/\/old.algardata.com\/wp-content\/uploads\/2020\/04\/Logo_algardata.png\",\"width\":250,\"height\":62,\"caption\":\"Algardata - Sistemas Inform\u00e1ticos SA\"},\"image\":{\"@id\":\"https:\/\/old.algardata.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Algardata-113166512044312\/\",\"https:\/\/twitter.com\/algardata\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/old.algardata.com\/#\/schema\/person\/a933bbf1a27260a488a611904ae507b2\",\"name\":\"AlgarEditor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/old.algardata.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/db400a1ca056277535a151652e1af8cb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/db400a1ca056277535a151652e1af8cb?s=96&d=mm&r=g\",\"caption\":\"AlgarEditor\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 cybersecurity trends and predictions for 2022","description":"Did you know that a cyberattack is launched every 39 seconds? This is something that all businesses - large and small - should be concerned about.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"7 cybersecurity trends and predictions for 2022","og_description":"Did you know that a cyberattack is launched every 39 seconds? This is something that all businesses - large and small - should be concerned about.","og_url":"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/","og_site_name":"Algardata \u2013 We are technology. Business technology.","article_publisher":"https:\/\/www.facebook.com\/Algardata-113166512044312\/","article_published_time":"2021-08-06T13:37:23+00:00","article_modified_time":"2021-08-06T14:02:08+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/old.algardata.com\/wp-content\/uploads\/2021\/08\/cyberseguranca-2022_08_21_header_EN-1.jpg","type":"image\/jpeg"}],"author":"AlgarEditor","twitter_card":"summary_large_image","twitter_creator":"@algardata","twitter_site":"@algardata","twitter_misc":{"Written by":"AlgarEditor","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/#article","isPartOf":{"@id":"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/"},"author":{"name":"AlgarEditor","@id":"https:\/\/old.algardata.com\/#\/schema\/person\/a933bbf1a27260a488a611904ae507b2"},"headline":"7 cybersecurity trends and predictions for 2022","datePublished":"2021-08-06T13:37:23+00:00","dateModified":"2021-08-06T14:02:08+00:00","mainEntityOfPage":{"@id":"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/"},"wordCount":3103,"publisher":{"@id":"https:\/\/old.algardata.com\/#organization"},"keywords":["colabora\u00e7\u00e3o","fluxo de trabalho","lista de tarefas","organiza\u00e7\u00e3o","produtividade","sinergia empresarial","sistema produtivo"],"articleSection":["Business"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/","url":"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/","name":"7 cybersecurity trends and predictions for 2022","isPartOf":{"@id":"https:\/\/old.algardata.com\/#website"},"datePublished":"2021-08-06T13:37:23+00:00","dateModified":"2021-08-06T14:02:08+00:00","description":"Did you know that a cyberattack is launched every 39 seconds? This is something that all businesses - large and small - should be concerned about.","breadcrumb":{"@id":"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/old.algardata.com\/en\/blog-en\/business\/7-cybersecurity-trends-and-predictions-for-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/old.algardata.com\/en\/"},{"@type":"ListItem","position":2,"name":"7 cybersecurity trends and predictions for 2022"}]},{"@type":"WebSite","@id":"https:\/\/old.algardata.com\/#website","url":"https:\/\/old.algardata.com\/","name":"Algardata \u2013 We are technology. Business technology.","description":"Na Algardata gostamos de ver crescer o neg\u00f3cio dos nossos clientes. As tecnologias s\u00e3o o meio pelo qual procuramos satisfazer as suas necessidades e objetivos.","publisher":{"@id":"https:\/\/old.algardata.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/old.algardata.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/old.algardata.com\/#organization","name":"Algardata - Sistemas Inform\u00e1ticos SA","url":"https:\/\/old.algardata.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/old.algardata.com\/#\/schema\/logo\/image\/","url":"https:\/\/old.algardata.com\/wp-content\/uploads\/2020\/04\/Logo_algardata.png","contentUrl":"https:\/\/old.algardata.com\/wp-content\/uploads\/2020\/04\/Logo_algardata.png","width":250,"height":62,"caption":"Algardata - Sistemas Inform\u00e1ticos SA"},"image":{"@id":"https:\/\/old.algardata.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Algardata-113166512044312\/","https:\/\/twitter.com\/algardata"]},{"@type":"Person","@id":"https:\/\/old.algardata.com\/#\/schema\/person\/a933bbf1a27260a488a611904ae507b2","name":"AlgarEditor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/old.algardata.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/db400a1ca056277535a151652e1af8cb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/db400a1ca056277535a151652e1af8cb?s=96&d=mm&r=g","caption":"AlgarEditor"}}]}},"_links":{"self":[{"href":"https:\/\/old.algardata.com\/en\/wp-json\/wp\/v2\/posts\/19496"}],"collection":[{"href":"https:\/\/old.algardata.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/old.algardata.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/old.algardata.com\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/old.algardata.com\/en\/wp-json\/wp\/v2\/comments?post=19496"}],"version-history":[{"count":7,"href":"https:\/\/old.algardata.com\/en\/wp-json\/wp\/v2\/posts\/19496\/revisions"}],"predecessor-version":[{"id":19589,"href":"https:\/\/old.algardata.com\/en\/wp-json\/wp\/v2\/posts\/19496\/revisions\/19589"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/old.algardata.com\/en\/wp-json\/wp\/v2\/media\/19545"}],"wp:attachment":[{"href":"https:\/\/old.algardata.com\/en\/wp-json\/wp\/v2\/media?parent=19496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/old.algardata.com\/en\/wp-json\/wp\/v2\/categories?post=19496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/old.algardata.com\/en\/wp-json\/wp\/v2\/tags?post=19496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}