{"id":32162,"date":"2022-07-11T09:00:00","date_gmt":"2022-07-11T14:00:00","guid":{"rendered":"https:\/\/thelogicgroup.com\/?p=32162"},"modified":"2022-08-18T15:08:29","modified_gmt":"2022-08-18T20:08:29","slug":"2021-cybersecurity-trends-everything-you-should-know","status":"publish","type":"post","link":"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/","title":{"rendered":"2021 Cybersecurity Trends: Everything You Should Know"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-376i3eq-1d9db5e05cce314d3feef8fc9ec1afa1\">\n.avia-section.av-376i3eq-1d9db5e05cce314d3feef8fc9ec1afa1{\nbackground-color:#3187bc;\nbackground-image:unset;\n}\n<\/style>\n<div id='amg-diagonal-overlay'  class='avia-section av-376i3eq-1d9db5e05cce314d3feef8fc9ec1afa1 header_color avia-section-large avia-no-border-styling  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  avia-bg-style-scroll av-minimum-height av-minimum-height-25 av-height-25  container_wrap fullsize'   data-av_minimum_height_pc='25' data-av_min_height_opt='25'><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-32162'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2e4schu-e039859205a69b0876249dd08b89ea0a\">\n.flex_column.av-2e4schu-e039859205a69b0876249dd08b89ea0a{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-2e4schu-e039859205a69b0876249dd08b89ea0a av_one_full  avia-builder-el-1  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p41hmu-172f1ef67d35d660063b232eaf50729c\">\n#top .av-special-heading.av-l2p41hmu-172f1ef67d35d660063b232eaf50729c{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\n}\nbody .av-special-heading.av-l2p41hmu-172f1ef67d35d660063b232eaf50729c .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2p41hmu-172f1ef67d35d660063b232eaf50729c .av-subheading{\nfont-size:23px;\n}\n<\/style>\n<div  class='av-special-heading av-l2p41hmu-172f1ef67d35d660063b232eaf50729c av-special-heading-h1 blockquote modern-quote modern-centered  avia-builder-el-2  avia-builder-el-no-sibling  av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >2021 Cybersecurity Trends: Everything You Should Know<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-32162'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1z4q1nm-0f8e68c2a40442fb2fdb34717b468f61\">\n.flex_column.av-1z4q1nm-0f8e68c2a40442fb2fdb34717b468f61{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-1z4q1nm-0f8e68c2a40442fb2fdb34717b468f61 av_one_full  avia-builder-el-3  el_after_av_section  el_before_av_one_full  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p41zzy-41326423bc6d66fc57861ffd3ffd8955\">\n.avia-image-container.av-l2p41zzy-41326423bc6d66fc57861ffd3ffd8955 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-l2p41zzy-41326423bc6d66fc57861ffd3ffd8955 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-l2p41zzy-41326423bc6d66fc57861ffd3ffd8955 av-styling- avia-align-center  avia-builder-el-4  el_before_av_hr  avia-builder-el-first '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-31979 avia-img-lazy-loading-not-31979 avia_image ' src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/Cybersecurity-Trends-in-2021-July-Blog-2-1210x423.jpg\" alt='' title='Cybersecurity Trends in 2021 July Blog 2'  height=\"423\" width=\"1210\"  itemprop=\"thumbnailUrl\"  \/><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1fx4xcy-0c2cc9754759428265440b5b368ef246\">\n#top .hr.hr-invisible.av-1fx4xcy-0c2cc9754759428265440b5b368ef246{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-1fx4xcy-0c2cc9754759428265440b5b368ef246 hr-invisible  avia-builder-el-5  el_after_av_image  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p42ems-4ae365d4356772fab24e730ea43dd529\">\n#top .av_textblock_section.av-l2p42ems-4ae365d4356772fab24e730ea43dd529 .avia_textblock{\nfont-size:20px;\n}\n<\/style>\n<section  class='av_textblock_section av-l2p42ems-4ae365d4356772fab24e730ea43dd529 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><span style=\"font-weight: 400;\">Phishing and ransomware are major cybersecurity concerns, but they\u2019re far from being the only factors threatening the security of your network. What\u2019s worse is it seems new threats emerge on an almost yearly basis. In order to protect your business, it\u2019s necessary to take steps to prepare your organization. One of the best ways to fight against cyberthreats is to stay aware of new <\/span><span style=\"font-weight: 400;\">cybersecurity trends<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p42tpb-69414a28f3852237e618eaa9065bbf09\">\n#top .av-special-heading.av-l2p42tpb-69414a28f3852237e618eaa9065bbf09{\npadding-bottom:10px;\ncolor:#4a4a4a;\n}\nbody .av-special-heading.av-l2p42tpb-69414a28f3852237e618eaa9065bbf09 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2p42tpb-69414a28f3852237e618eaa9065bbf09 .special-heading-inner-border{\nborder-color:#4a4a4a;\n}\n.av-special-heading.av-l2p42tpb-69414a28f3852237e618eaa9065bbf09 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2p42tpb-69414a28f3852237e618eaa9065bbf09 av-special-heading-h2 custom-color-heading blockquote modern-quote  avia-builder-el-7  el_after_av_textblock  el_before_av_textblock  amg-blog-heading av-linked-heading'><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >2021 Cybersecurity Trends<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2p441mw-e334322732a07f956468d1ab470b2aac '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">Last year was quite a hectic year in terms of information technology. Along with a notable rise in cyberthreats, we had <\/span><span style=\"font-weight: 400;\">cybersecurity evolution<\/span><span style=\"font-weight: 400;\"> in the form of new solutions, revelations, and regulations. Since the technology landscape is constantly shifting, what was trending then may not be the case now. So, how has the industry changed now that we\u2019re in the year 2021?<\/span><\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><\/p><\/div>\n<div  class='flex_column av-15lzaua-772d236d2a8ee8103269d3da7b0c0468 av_one_full  avia-builder-el-9  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p44eqw-ca560d4aa4c62ad60c33f5806a51f034\">\n#top .av-special-heading.av-l2p44eqw-ca560d4aa4c62ad60c33f5806a51f034{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#7e8f87;\n}\nbody .av-special-heading.av-l2p44eqw-ca560d4aa4c62ad60c33f5806a51f034 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2p44eqw-ca560d4aa4c62ad60c33f5806a51f034 .special-heading-inner-border{\nborder-color:#7e8f87;\n}\n.av-special-heading.av-l2p44eqw-ca560d4aa4c62ad60c33f5806a51f034 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2p44eqw-ca560d4aa4c62ad60c33f5806a51f034 av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-10  el_before_av_textblock  avia-builder-el-first  av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Ransomware Is Back and More Troublesome Than Ever<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2p45me0-f4be0d458b0dbf8db232fc4c7d19e273 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-32\" class=\"lp-element lp-pom-text nlh\">\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">It\u2019s the problem that just won\u2019t go away. Ransomware is one of the most <\/span><span style=\"font-weight: 400;\">common cybersecurity threats<\/span><span style=\"font-weight: 400;\"> in the corporate world. Not only are these attacks increasing in frequency, but they\u2019re also becoming more sophisticated and disruptive. Ransomware caused up to <\/span><a href=\"https:\/\/purplesec.us\/resources\/cyber-security-statistics\/ransomware\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">$20 billion<\/span><\/a><span style=\"font-weight: 400;\"> in damages in 2020 and that number is only expected to go up in 2021.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Just this year, we had the most infamous ransomware attack against a U.S. corporation. Colonial Pipeline\u2014the largest fuel pipeline in the country\u2014suffered an attack in May that forced its pipelines to temporarily shut down. This is only one in a line of high-profile attacks we\u2019ve seen so far. Some of the top IT organizations in the world\u2014Cognizant, CompuCom, and DXC Technology\u2014have been hobbled by ransomware as well.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are a variety of ways a business can become infected with ransomware. However, hackers tend to favor phishing as their preferred method of attack. To guard against this type of threat, it\u2019s a good idea to train your staff so they know how to spot phishing scams when they happen.<\/span><\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div>\n<div id=\"lp-pom-text-34\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p45y32-0dc068c236f072140769a6fd89280baa\">\n#top .av-special-heading.av-l2p45y32-0dc068c236f072140769a6fd89280baa{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#7e8f87;\n}\nbody .av-special-heading.av-l2p45y32-0dc068c236f072140769a6fd89280baa .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2p45y32-0dc068c236f072140769a6fd89280baa .special-heading-inner-border{\nborder-color:#7e8f87;\n}\n.av-special-heading.av-l2p45y32-0dc068c236f072140769a6fd89280baa .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2p45y32-0dc068c236f072140769a6fd89280baa av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-12  el_after_av_textblock  el_before_av_textblock  av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >AI and Machine Learning for Security<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2p46e3t-a4a7add75dbf6620dd101fc5d179ffde '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-32\" class=\"lp-element lp-pom-text nlh\">\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">The capabilities of <\/span><span style=\"font-weight: 400;\">artificial intelligence<\/span><span style=\"font-weight: 400;\"> (AI) and machine learning make them valuable tools in business. These technologies are only going to improve as time goes on. While they can be used as virtual assistants or to automate processes, the best way to use them may be to integrate them into your security structure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">AI and machine learning is increasingly being used to create automated security systems that remove the human factor from the equation. This makes sense because of the solution\u2019s ability to quickly analyze massive quantities of risk data. AI and machine learning have been used to do everything from discovering network vulnerabilities to detecting cyberattacks within seconds. Dependence on these systems is expected to increase in the foreseeable future.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you want to strengthen your security measures, think about implementing an AI-powered security system. A solution like this has the potential to streamline your threat detection efforts.<\/span><\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div>\n<div id=\"lp-pom-text-34\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p479f3-aaaf0fbfed690df190f0a9c3f22a8f42\">\n#top .av-special-heading.av-l2p479f3-aaaf0fbfed690df190f0a9c3f22a8f42{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#7e8f87;\n}\nbody .av-special-heading.av-l2p479f3-aaaf0fbfed690df190f0a9c3f22a8f42 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2p479f3-aaaf0fbfed690df190f0a9c3f22a8f42 .special-heading-inner-border{\nborder-color:#7e8f87;\n}\n.av-special-heading.av-l2p479f3-aaaf0fbfed690df190f0a9c3f22a8f42 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2p479f3-aaaf0fbfed690df190f0a9c3f22a8f42 av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-14  el_after_av_textblock  el_before_av_textblock  av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Improved Cyber Awareness<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2p47mog-b371e284debfc1168b4718eb9fe7e4bb '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-32\" class=\"lp-element lp-pom-text nlh\">\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">It doesn\u2019t matter if you\u2019re a small startup or a mega corporation, every organization shares a common vulnerability\u2014their employees. You could have the strongest security measures in the world. All it takes is a single mistake from one of your employees to bring disaster to your network.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fortunately, there is something you can do to turn this weak link into a strength\u2014invest in security awareness training (SAT). With a cybersecurity awareness program, you can train your team on how to identify and avoid threats. As cybersecurity becomes more of a central focus in the business world, we\u2019re seeing a growing number of employers take this approach.<\/span><\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div>\n<div id=\"lp-pom-text-34\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p48cmg-f6c4d51ba7e939379c8ceb09a0b3e9a1\">\n#top .av-special-heading.av-l2p48cmg-f6c4d51ba7e939379c8ceb09a0b3e9a1{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#7e8f87;\n}\nbody .av-special-heading.av-l2p48cmg-f6c4d51ba7e939379c8ceb09a0b3e9a1 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2p48cmg-f6c4d51ba7e939379c8ceb09a0b3e9a1 .special-heading-inner-border{\nborder-color:#7e8f87;\n}\n.av-special-heading.av-l2p48cmg-f6c4d51ba7e939379c8ceb09a0b3e9a1 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2p48cmg-f6c4d51ba7e939379c8ceb09a0b3e9a1 av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-16  el_after_av_textblock  el_before_av_textblock  av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >The Cloud Isn\u2019t as Safe as It Used To Be<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2p48qr8-137c41fd904cd47810f16e930fb44f00 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-32\" class=\"lp-element lp-pom-text nlh\">\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">Cloud services offer a variety of benefits like increased flexibility, scalability, operational efficiency, and cost-effectiveness. In 2020, the cloud\u2019s ability to allow employees to work from anywhere made it an essential tool as companies switched over to full <\/span><span style=\"font-weight: 400;\">remote work<\/span><span style=\"font-weight: 400;\">. Cloud adoption is only expected to grow in the years to come.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of course, due to the uptick in popularity of the cloud, hackers are now increasingly targeting these services. In response to this situation, the current <\/span><span style=\"font-weight: 400;\">cloud security trend<\/span><span style=\"font-weight: 400;\"> is to familiarize yourself with the vulnerabilities that come with integrating cloud services with your infrastructure. When you are aware of the security gaps of your solution, you can take steps to eliminate them.<\/span><\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div>\n<div id=\"lp-pom-text-34\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p491ew-6c86646a19e01dae96b44e00dc629021\">\n#top .av-special-heading.av-l2p491ew-6c86646a19e01dae96b44e00dc629021{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#7e8f87;\n}\nbody .av-special-heading.av-l2p491ew-6c86646a19e01dae96b44e00dc629021 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2p491ew-6c86646a19e01dae96b44e00dc629021 .special-heading-inner-border{\nborder-color:#7e8f87;\n}\n.av-special-heading.av-l2p491ew-6c86646a19e01dae96b44e00dc629021 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2p491ew-6c86646a19e01dae96b44e00dc629021 av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-18  el_after_av_textblock  el_before_av_textblock  av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Existing Cyberthreats Are Getting Stronger<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2p49epe-75d776c6b0a17148aaee03df32eaac23 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-32\" class=\"lp-element lp-pom-text nlh\">\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">It\u2019s not just ransomware that\u2019s getting worse. Phishing, trojans, botnets, and so on are also evolving and becoming more sophisticated. Not only that, but as we lean more towards automation, expect the volume of these threats to grow in frequency.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Many cybercriminals have already begun plotting their next move. Now that malware and <\/span><span style=\"font-weight: 400;\">social engineering<\/span><span style=\"font-weight: 400;\"> campaigns are being industrialized, hackers can assess and fine-tune their strategies based on the results of a previous attack. As if they weren\u2019t already a big enough pain in the neck, expect for these threats to become more difficult to deal with.<\/span><\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div>\n<div id=\"lp-pom-text-34\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p49pot-310c785aa674d278bb3065c6c1a38dae\">\n#top .av-special-heading.av-l2p49pot-310c785aa674d278bb3065c6c1a38dae{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#7e8f87;\n}\nbody .av-special-heading.av-l2p49pot-310c785aa674d278bb3065c6c1a38dae .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2p49pot-310c785aa674d278bb3065c6c1a38dae .special-heading-inner-border{\nborder-color:#7e8f87;\n}\n.av-special-heading.av-l2p49pot-310c785aa674d278bb3065c6c1a38dae .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2p49pot-310c785aa674d278bb3065c6c1a38dae av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-20  el_after_av_textblock  el_before_av_textblock  av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >An Increased Need for Cybersecurity Professionals<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2p4a0rf-958bab5f2dbf34f1950b46299689cc6b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-32\" class=\"lp-element lp-pom-text nlh\">\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">Confiding in professionals who are well-trained and experienced in handling cyberthreats has always been an industry best practice. However, the growing complexity of cyberattacks has really highlighted the importance of having an expert by your side. It\u2019s no longer viable to take chances with the protection of your IT.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While hiring an internal team to take care of your cybersecurity needs is a solution, it\u2019s not always the right solution for every business. Hiring new staff can be too expensive for some small- to medium-sized businesses. If this is the case, there\u2019s always the option to <\/span><span style=\"font-weight: 400;\">outsource<\/span><span style=\"font-weight: 400;\"> with a managed service provider (MSP). An MSP is able to act as your cybersecurity solution for less than the cost of hiring one employee.<\/span><\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div>\n<div id=\"lp-pom-text-34\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-wgdqci-a833a2c7564842020738e5720f9d8921\">\n.flex_column.av-wgdqci-a833a2c7564842020738e5720f9d8921{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-wgdqci-a833a2c7564842020738e5720f9d8921 av_one_full  avia-builder-el-22  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2p4acwh-5eecb463aeecdf40c4dcd95844819f56\">\n#top .av-special-heading.av-l2p4acwh-5eecb463aeecdf40c4dcd95844819f56{\npadding-bottom:10px;\ncolor:#4a4a4a;\n}\nbody .av-special-heading.av-l2p4acwh-5eecb463aeecdf40c4dcd95844819f56 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2p4acwh-5eecb463aeecdf40c4dcd95844819f56 .special-heading-inner-border{\nborder-color:#4a4a4a;\n}\n.av-special-heading.av-l2p4acwh-5eecb463aeecdf40c4dcd95844819f56 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2p4acwh-5eecb463aeecdf40c4dcd95844819f56 av-special-heading-h2 custom-color-heading blockquote modern-quote  avia-builder-el-23  el_before_av_textblock  avia-builder-el-first  amg-blog-heading av-linked-heading'><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Do What It Takes To Protect Your Business<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2p4anv9-4a13eda0ed0efea614590abd2fab104e '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">The Logic Group is a full-service IT and network services provider that is committed to the protection of your sensitive information. We offer a range of <\/span><span style=\"font-weight: 400;\">cybersecurity<\/span><span style=\"font-weight: 400;\"> services\u2014like dark web monitoring and 24\/7 Security Operation Center\u2014to meet the needs of your business.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Contact us today to learn more about our services and how we can keep your IT environment secure.<\/span><\/p>\n<\/div>\n<\/div><\/section><\/p><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":31979,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[56,57,58,59],"class_list":["post-32162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-2021-cybersecurity-trends","tag-cloud-security-trend","tag-cybersecurity-evolution","tag-most-common-cybersecurity-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>2021 Cybersecurity Trends for Business | The Logic Group<\/title>\n<meta name=\"description\" content=\"As the technology landscape changes, so do the cybersecurity needs of businesses. Here is everything you need to know about cybersecurity in 2021.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2021 Cybersecurity Trends for Business | The Logic Group\" \/>\n<meta property=\"og:description\" content=\"As the technology landscape changes, so do the cybersecurity needs of businesses. Here is everything you need to know about cybersecurity in 2021.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/\" \/>\n<meta property=\"og:site_name\" content=\"The Logic Group\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-11T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-18T20:08:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/Cybersecurity-Trends-in-2021-July-Blog-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wpengine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"wpengine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/\"},\"author\":{\"name\":\"wpengine\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93\"},\"headline\":\"2021 Cybersecurity Trends: Everything You Should Know\",\"datePublished\":\"2022-07-11T14:00:00+00:00\",\"dateModified\":\"2022-08-18T20:08:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/\"},\"wordCount\":2789,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/Cybersecurity-Trends-in-2021-July-Blog-2.jpg\",\"keywords\":[\"2021 Cybersecurity Trends\",\"cloud security trend\",\"cybersecurity evolution\",\"most common cybersecurity threats\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/\",\"url\":\"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/\",\"name\":\"2021 Cybersecurity Trends for Business | The Logic Group\",\"isPartOf\":{\"@id\":\"https:\/\/thelogicgroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/Cybersecurity-Trends-in-2021-July-Blog-2.jpg\",\"datePublished\":\"2022-07-11T14:00:00+00:00\",\"dateModified\":\"2022-08-18T20:08:29+00:00\",\"author\":{\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93\"},\"description\":\"As the technology landscape changes, so do the cybersecurity needs of businesses. Here is everything you need to know about cybersecurity in 2021.\",\"breadcrumb\":{\"@id\":\"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/#primaryimage\",\"url\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/Cybersecurity-Trends-in-2021-July-Blog-2.jpg\",\"contentUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/Cybersecurity-Trends-in-2021-July-Blog-2.jpg\",\"width\":2000,\"height\":1250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/thelogicgroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2021 Cybersecurity Trends: Everything You Should Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thelogicgroup.com\/#website\",\"url\":\"https:\/\/thelogicgroup.com\/\",\"name\":\"The Logic Group\",\"description\":\"Turn to The Logic Group for all your Philadelphia managed IT services.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thelogicgroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93\",\"name\":\"wpengine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d8770fe9625ca7c4601f13d9d0ab86565a6dac8cd6a77bfe2ada6d83c6837870?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d8770fe9625ca7c4601f13d9d0ab86565a6dac8cd6a77bfe2ada6d83c6837870?s=96&d=mm&r=g\",\"caption\":\"wpengine\"},\"description\":\"This is the \\\"wpengine\\\" admin user that our staff uses to gain access to your admin area to provide support and troubleshooting. It can only be accessed by a button in our secure log that auto generates a password and dumps that password after the staff member has logged in. We have taken extreme measures to ensure that our own user is not going to be misused to harm any of our clients sites.\",\"sameAs\":[\"http:\/\/wpengine.com\"],\"url\":\"https:\/\/thelogicgroup.com\/author\/wpengine\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2021 Cybersecurity Trends for Business | The Logic Group","description":"As the technology landscape changes, so do the cybersecurity needs of businesses. Here is everything you need to know about cybersecurity in 2021.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/","og_locale":"en_US","og_type":"article","og_title":"2021 Cybersecurity Trends for Business | The Logic Group","og_description":"As the technology landscape changes, so do the cybersecurity needs of businesses. Here is everything you need to know about cybersecurity in 2021.","og_url":"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/","og_site_name":"The Logic Group","article_published_time":"2022-07-11T14:00:00+00:00","article_modified_time":"2022-08-18T20:08:29+00:00","og_image":[{"width":2000,"height":1250,"url":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/Cybersecurity-Trends-in-2021-July-Blog-2.jpg","type":"image\/jpeg"}],"author":"wpengine","twitter_card":"summary_large_image","twitter_misc":{"Written by":"wpengine","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/#article","isPartOf":{"@id":"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/"},"author":{"name":"wpengine","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93"},"headline":"2021 Cybersecurity Trends: Everything You Should Know","datePublished":"2022-07-11T14:00:00+00:00","dateModified":"2022-08-18T20:08:29+00:00","mainEntityOfPage":{"@id":"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/"},"wordCount":2789,"commentCount":0,"image":{"@id":"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/#primaryimage"},"thumbnailUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/Cybersecurity-Trends-in-2021-July-Blog-2.jpg","keywords":["2021 Cybersecurity Trends","cloud security trend","cybersecurity evolution","most common cybersecurity threats"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/","url":"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/","name":"2021 Cybersecurity Trends for Business | The Logic Group","isPartOf":{"@id":"https:\/\/thelogicgroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/#primaryimage"},"image":{"@id":"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/#primaryimage"},"thumbnailUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/Cybersecurity-Trends-in-2021-July-Blog-2.jpg","datePublished":"2022-07-11T14:00:00+00:00","dateModified":"2022-08-18T20:08:29+00:00","author":{"@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93"},"description":"As the technology landscape changes, so do the cybersecurity needs of businesses. Here is everything you need to know about cybersecurity in 2021.","breadcrumb":{"@id":"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/#primaryimage","url":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/Cybersecurity-Trends-in-2021-July-Blog-2.jpg","contentUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/06\/Cybersecurity-Trends-in-2021-July-Blog-2.jpg","width":2000,"height":1250},{"@type":"BreadcrumbList","@id":"https:\/\/thelogicgroup.com\/2021-cybersecurity-trends-everything-you-should-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thelogicgroup.com\/"},{"@type":"ListItem","position":2,"name":"2021 Cybersecurity Trends: Everything You Should Know"}]},{"@type":"WebSite","@id":"https:\/\/thelogicgroup.com\/#website","url":"https:\/\/thelogicgroup.com\/","name":"The Logic Group","description":"Turn to The Logic Group for all your Philadelphia managed IT services.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thelogicgroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93","name":"wpengine","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d8770fe9625ca7c4601f13d9d0ab86565a6dac8cd6a77bfe2ada6d83c6837870?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d8770fe9625ca7c4601f13d9d0ab86565a6dac8cd6a77bfe2ada6d83c6837870?s=96&d=mm&r=g","caption":"wpengine"},"description":"This is the \"wpengine\" admin user that our staff uses to gain access to your admin area to provide support and troubleshooting. It can only be accessed by a button in our secure log that auto generates a password and dumps that password after the staff member has logged in. We have taken extreme measures to ensure that our own user is not going to be misused to harm any of our clients sites.","sameAs":["http:\/\/wpengine.com"],"url":"https:\/\/thelogicgroup.com\/author\/wpengine\/"}]}},"_links":{"self":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts\/32162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/comments?post=32162"}],"version-history":[{"count":0,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts\/32162\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/media\/31979"}],"wp:attachment":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/media?parent=32162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/categories?post=32162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/tags?post=32162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}