{"id":44609,"date":"2023-12-05T10:39:30","date_gmt":"2023-12-05T10:39:30","guid":{"rendered":"https:\/\/www.elixirr.com\/en-us\/?p=44609"},"modified":"2025-11-10T14:38:07","modified_gmt":"2025-11-10T14:38:07","slug":"2024-trends-cyber","status":"publish","type":"post","link":"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/","title":{"rendered":"2024 Trends: Cyber"},"content":{"rendered":"\n<p>This year alone, there have been over&nbsp;<a href=\"https:\/\/www.itgovernance.co.uk\/blog\/list-of-data-breaches-and-cyber-attacks-in-2023#top-data-breach-stats\">950 major cyber incidents<\/a>&nbsp;globally, with almost 5.5 billion data records breached. The global average cost of each data breach&nbsp;<a href=\"https:\/\/www.ibm.com\/reports\/data-breach#:~:text=The%20global%20average%20cost%20of,15%25%20increase%20over%203%20years\">is $4.45 million<\/a>&nbsp;\u2013 a figure that has grown by 15% in the last three years. Certainly, there are existing threats that businesses need to continue to contend with, but as we look towards 2024, a growing set of new cyber challenges is emerging.<\/p>\n\n\n<section\n    class=\"wp-block-video \"\n    >\n    <div class=\"wp-block-video__container\">\n                            <\/div>\n<\/section>\n\n\n<section\n    class=\"wp-block-video layout--spacing-y bg--none\"\n    >\n    <div class=\"wp-block-video__container\">\n                    <div\n        class=\"wp-component-video-embed js-wp-component-video-embed js-wp-component-video-embed-wistia wp-component-video-embed--ratio-- wp-block-video__video\"\n                        data-video-id=\"fq2hslf7ab\"\n        data-wistia-options=\"seo=false videoFoam=true controlsVisibleOnLoad=true playButton=true smallPlayButton=true playbar=true volumeControl=true settingsControl=true fullscreenButton=true muted=false fitStrategy=cover qualityMin=1080\"\n                        >\n                    <div class=\"wistia_responsive_padding\">\n                <div class=\"wistia_responsive_wrapper\">\n                    <div class=\"js-wistia-lazy\">\n                        <div class=\"wistia_swatch\">\n                            <img decoding=\"async\"\n                                src=\"https:\/\/fast.wistia.com\/embed\/medias\/fq2hslf7ab\/swatch\"\n                                class=\"wistia_swatch__image\"\n                                alt=\"\"\n                                aria-hidden=\"true\"\n                            \/>\n                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n            <\/div>\n            <\/div>\n<\/section>\n\n\n\n<p>There are many known threats, namely malware, network overloading, technical vulnerability exploitation and, the most common, phishing; over 3.4 billion phishing emails are sent daily, with 80% of companies noting a growing rate of incidents since last year. While these threats have had operational, financial, and often reputational impacts for several years, heading into a new year, organizations must now also pay heightened attention to newer forms of malicious activity \u2013 several of which have been enabled by AI. The benefits and opportunities AI presents are countless, but this same technology has also been weaponised by criminal actors. AI can be used to decipher individuals\u2019 passwords, extort victims with advanced ransomware and cause widespread network disruption with botnets, to name a few key threats. This technology can also be used to infect other AI, manipulating models\u2019 outputs for criminal gain. But perhaps the most recognized AI-driven threat comes in the form of deepfakes and disinformation, whereby genuine-looking content is produced to gain access to sensitive information or to spread false information.<\/p>\n\n\n\n<p>Organizations must develop a greater awareness and understanding of AI, both so that its (positive) potential can be realized through innovation and collaboration, and so that individuals and businesses can be better prepared to combat the threat and impact of it being used harmfully.&nbsp;<\/p>\n\n\n\n<p>Read on for insights from our cyber and <a href=\"https:\/\/www.elixirr.com\/en-us\/services\/generative-ai\/\">AI <\/a>experts, Partners <a href=\"https:\/\/www.elixirr.com\/en-us\/person\/roryfarquharson\/\">Rory Farquharson<\/a> and <a href=\"https:\/\/www.elixirr.com\/en-us\/person\/stevesteinberg\/\">Steve Steinberg<\/a>, on how to defend against both known and growing threats in the cyber space this coming year.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-are-organisations-using-ai-to-solve-for-these-challenges-today\">How are organizations using AI to solve for these challenges today?<\/h2>\n\n\n\n<p>Today, multi-factor authentication is commonly used to mitigate data breaches, anti-virus and anti-malware software is installed on most office computers and attach rate throttling is used to defend against network overloading. Targeted education and simulations for employees have also helped them recognize and avoid phishing attempts.&nbsp;<\/p>\n\n\n\n<p>These same practices and tools can be used to defend against emerging threats, including those created or enhanced by AI \u2013 although there is a limit to how much protection these can provide. However, this technology is both part of the problem and the solution, as AI-enhanced solutions can and will be used to overcome these AI-driven threats. In fact, there are a growing number of AI-backed malware and ransomware solutions (e.g., Halycon), as well as automated vulnerability patching tools (e.g., NinjaOne Patch Management). We\u2019re also seeing that organizations are frequently incorporating AI-supported Extended Detection and Response (XDR) tools into their digital architecture; these are used to scan companies\u2019 digital infrastructure to identify, assess and resolve cyber threats.&nbsp;<\/p>\n\n\n\n<p>AI identifies divergences from patterns of behavior; depending on the extent of the suspicious activity, tools like Microsoft Defender can adjust a system\u2019s accessibility. Therefore, not only can AI be used to protect systems, but it can also judge the level of protection it requires in a particular scenario. With AI-powered security in place, the time taken to identify, react to, and resolve issues is reduced, as is the need for human intervention, not only offering more sophisticated layers of protection, but boosting efficiency of teams.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-can-organisations-do-to-bolster-their-defences-against-ai-enabled-threats\">What can organizations do to bolster their defenses against AI-enabled threats?<\/h2>\n\n\n\n<p>Improved education around AI will help to build stronger trust in the technology, control over its utilisation, and vigilance towards its challenges. The cyber-training on phishing that nearly all employees are now familiar with needs to be evolved to cover the next level of threats. Beyond education there are several AI-related opportunities that businesses can exploit to improve the robustness of their cyber security in 2024.<\/p>\n\n\n\n<p><strong><em>Identifying the next threat:<\/em><\/strong>&nbsp;It might sound obvious, but businesses need to think ahead as to what their next cyber security threat may be. Generative AI\u2019s analytical and predictive capabilities can be leveraged to anticipate the new (and perhaps unique) challenges an organization may face. Recognizing these future risks will enable businesses to update and prepare their defensive measures accordingly.<\/p>\n\n\n\n<p><strong><em>Reinforcing AI capabilities:<\/em><\/strong>&nbsp;With the increased utilisation of AI models comes the risk that those models will be compromised by malicious actors. AI models are usually trained with agent-led reinforcement learning but, instead, multiple models can be paired together to sense-check each other\u2019s outputs. This would enable irregularities to be flagged and resolved promptly, potentially without the need for human intervention.<\/p>\n\n\n\n<p><strong><em>Labeling genuine content:<\/em><\/strong>&nbsp;While better education may help employees and individuals to distinguish between genuine and artificial (e.g., deepfake) content, the risk that criminals use fake material to evade security systems will still exist. Organizations should take measures to label genuine content as far as possible, marking authentic copy with verification stickers, or by including unique tags in metadata. These short-term solutions can help to keep companies and their people safe. Technology designed to protect against deepfakes, such as Intel\u2019s FakeCatcher, is also emerging, but there remains room for further advancement in this space (which we will almost certainly see emerging from Silicon Valley in the coming years).<\/p>\n\n\n\n<p><strong><em>Introducing a security framework:<\/em><\/strong>&nbsp;Businesses should also introduce consistent operational and technical processes to support their cyber defenses. These processes should include a dedicated AI-security framework, such as the one recently published by <a href=\"https:\/\/www.enisa.europa.eu\/publications\/multilayer-framework-for-good-cybersecurity-practices-for-ai\">ENISA<\/a>, which outlines various critical considerations, including tools (such as AI) and roles that need to be introduced, and the procedures and governance that needs to be mobilized. Designing a clear, bespoke framework will enable organizations to determine their readiness to defend against AI-driven (and other emerging) cyber threats.&nbsp;<\/p>\n\n\n\n<p>As we look to 2024, it\u2019s critical to have awareness of both the existing and future threats your business faces when it comes to cyber, and to put solid foundations in place to guard against these.&nbsp;<\/p>\n\n\n\n<p>If you want to protect your business against new and evolving cyber threats, connect with <a href=\"https:\/\/www.elixirr.com\/en-us\/person\/roryfarquharson\/\">Rory Farquharson<\/a>, <a href=\"https:\/\/www.elixirr.com\/en-us\/person\/stevesteinberg\/\">Steve Steinberg<\/a> or our team, today.<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>This year alone, there have been over&nbsp;950 major cyber incidents&nbsp;globally, with almost 5.5 billion data records breached. The global average cost of each data breach&nbsp;is $4.45 million&nbsp;\u2013 a figure that&hellip;<\/p>\n","protected":false},"author":1,"featured_media":44615,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[116],"tags":[],"related_service":[344,68],"related_industry":[],"class_list":["post-44609","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>2024 Trends: Cyber - Elixirr - USA<\/title>\n<meta name=\"description\" content=\"If you want to protect your business against new and evolving cyber threats, read insights from our experts today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2024 Trends: Cyber\" \/>\n<meta property=\"og:description\" content=\"If you want to protect your business against new and evolving cyber threats, read insights from our experts today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/\" \/>\n<meta property=\"og:site_name\" content=\"Elixirr - USA\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-05T10:39:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-10T14:38:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"edx\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"edx\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/\"},\"author\":{\"name\":\"edx\",\"@id\":\"https:\/\/www.elixirr.com\/en-us\/#\/schema\/person\/21faac779b9228efe960d1f4aac3f3f1\"},\"headline\":\"2024 Trends: Cyber\",\"datePublished\":\"2023-12-05T10:39:30+00:00\",\"dateModified\":\"2025-11-10T14:38:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/\"},\"wordCount\":1039,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.elixirr.com\/en-us\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px.jpg\",\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/\",\"url\":\"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/\",\"name\":\"2024 Trends: Cyber - Elixirr - USA\",\"isPartOf\":{\"@id\":\"https:\/\/www.elixirr.com\/en-us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px.jpg\",\"datePublished\":\"2023-12-05T10:39:30+00:00\",\"dateModified\":\"2025-11-10T14:38:07+00:00\",\"description\":\"If you want to protect your business against new and evolving cyber threats, read insights from our experts today.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/#primaryimage\",\"url\":\"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px.jpg\",\"contentUrl\":\"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px.jpg\",\"width\":2400,\"height\":1440,\"caption\":\"Cyber trends\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.elixirr.com\/en-us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2024 Trends: Cyber\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.elixirr.com\/en-us\/#website\",\"url\":\"https:\/\/www.elixirr.com\/en-us\/\",\"name\":\"Elixirr - USA\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.elixirr.com\/en-us\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.elixirr.com\/en-us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.elixirr.com\/en-us\/#organization\",\"name\":\"Elixirr\",\"alternateName\":\"Elixirr International PLC\",\"url\":\"https:\/\/www.elixirr.com\/en-us\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.elixirr.com\/en-us\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/11\/elixirr-logo.png\",\"contentUrl\":\"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/11\/elixirr-logo.png\",\"width\":200,\"height\":200,\"caption\":\"Elixirr\"},\"image\":{\"@id\":\"https:\/\/www.elixirr.com\/en-us\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.elixirr.com\/en-us\/#\/schema\/person\/21faac779b9228efe960d1f4aac3f3f1\",\"name\":\"edx\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.elixirr.com\/en-us\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/162ae25ced79c001c564cbc5c8310d19e3cf4e71ace4075a77d65c92a7f6fb3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/162ae25ced79c001c564cbc5c8310d19e3cf4e71ace4075a77d65c92a7f6fb3a?s=96&d=mm&r=g\",\"caption\":\"edx\"},\"sameAs\":[\"http:\/\/elixirr.vps.staging.elixirrdigital.com\"],\"url\":\"https:\/\/www.elixirr.com\/en-us\/person\/edx\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"2024 Trends: Cyber - Elixirr - USA","description":"If you want to protect your business against new and evolving cyber threats, read insights from our experts today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/","og_locale":"en_US","og_type":"article","og_title":"2024 Trends: Cyber","og_description":"If you want to protect your business against new and evolving cyber threats, read insights from our experts today.","og_url":"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/","og_site_name":"Elixirr - USA","article_published_time":"2023-12-05T10:39:30+00:00","article_modified_time":"2025-11-10T14:38:07+00:00","og_image":[{"width":2400,"height":1440,"url":"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px.jpg","type":"image\/jpeg"}],"author":"edx","twitter_card":"summary_large_image","twitter_misc":{"Written by":"edx","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/#article","isPartOf":{"@id":"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/"},"author":{"name":"edx","@id":"https:\/\/www.elixirr.com\/en-us\/#\/schema\/person\/21faac779b9228efe960d1f4aac3f3f1"},"headline":"2024 Trends: Cyber","datePublished":"2023-12-05T10:39:30+00:00","dateModified":"2025-11-10T14:38:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/"},"wordCount":1039,"commentCount":0,"publisher":{"@id":"https:\/\/www.elixirr.com\/en-us\/#organization"},"image":{"@id":"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/#primaryimage"},"thumbnailUrl":"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px.jpg","articleSection":["Articles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/","url":"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/","name":"2024 Trends: Cyber - Elixirr - USA","isPartOf":{"@id":"https:\/\/www.elixirr.com\/en-us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/#primaryimage"},"image":{"@id":"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/#primaryimage"},"thumbnailUrl":"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px.jpg","datePublished":"2023-12-05T10:39:30+00:00","dateModified":"2025-11-10T14:38:07+00:00","description":"If you want to protect your business against new and evolving cyber threats, read insights from our experts today.","breadcrumb":{"@id":"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/#primaryimage","url":"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px.jpg","contentUrl":"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px.jpg","width":2400,"height":1440,"caption":"Cyber trends"},{"@type":"BreadcrumbList","@id":"https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.elixirr.com\/en-us\/"},{"@type":"ListItem","position":2,"name":"2024 Trends: Cyber"}]},{"@type":"WebSite","@id":"https:\/\/www.elixirr.com\/en-us\/#website","url":"https:\/\/www.elixirr.com\/en-us\/","name":"Elixirr - USA","description":"","publisher":{"@id":"https:\/\/www.elixirr.com\/en-us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.elixirr.com\/en-us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.elixirr.com\/en-us\/#organization","name":"Elixirr","alternateName":"Elixirr International PLC","url":"https:\/\/www.elixirr.com\/en-us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.elixirr.com\/en-us\/#\/schema\/logo\/image\/","url":"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/11\/elixirr-logo.png","contentUrl":"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/11\/elixirr-logo.png","width":200,"height":200,"caption":"Elixirr"},"image":{"@id":"https:\/\/www.elixirr.com\/en-us\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.elixirr.com\/en-us\/#\/schema\/person\/21faac779b9228efe960d1f4aac3f3f1","name":"edx","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.elixirr.com\/en-us\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/162ae25ced79c001c564cbc5c8310d19e3cf4e71ace4075a77d65c92a7f6fb3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/162ae25ced79c001c564cbc5c8310d19e3cf4e71ace4075a77d65c92a7f6fb3a?s=96&d=mm&r=g","caption":"edx"},"sameAs":["http:\/\/elixirr.vps.staging.elixirrdigital.com"],"url":"https:\/\/www.elixirr.com\/en-us\/person\/edx\/"}]}},"card":"<article class=\"wp-component-card edwp-component wp-component-card--resource            wp-component-card--link js-card-link\n        edwp-fade-in\">\n            <figure class=\"wp-component-card__image-wrapper\">\n                            <img width=\"2400\" height=\"1440\" src=\"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px.jpg\" class=\"wp-component-card__image\" alt=\"Cyber trends\" decoding=\"async\" srcset=\"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px.jpg 2400w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px-300x180.jpg 300w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px-1024x614.jpg 1024w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px-768x461.jpg 768w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px-1536x922.jpg 1536w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px-2048x1229.jpg 2048w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px-87x52.jpg 87w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px-319x191.jpg 319w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px-479x287.jpg 479w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px-567x340.jpg 567w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px-767x460.jpg 767w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px-1023x614.jpg 1023w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px-1278x767.jpg 1278w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px-1378x827.jpg 1378w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2023\/12\/Elixirr_Industry_Trends_2024_Cyber_2400x1440px-1640x984.jpg 1640w\" sizes=\"(max-width: 2400px) 100vw, 2400px\" \/>            <div class=\"wp-component-card__preview-icon\">\n                <span class='edwp-svg '><svg width=\"47\" height=\"47\" viewBox=\"0 0 47 47\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<g>\n<path d=\"M23.4141 0.539062C36.1232 0.539183 46.4258 10.8416 46.4258 23.5508C46.4257 36.2599 36.1231 46.5624 23.4141 46.5625C10.7049 46.5625 0.402465 36.2599 0.402344 23.5508C0.402344 10.8415 10.7048 0.539062 23.4141 0.539062ZM23.4141 1.68945C11.3606 1.68945 1.55273 11.4974 1.55273 23.5508C1.55286 35.6041 11.3607 45.4111 23.4141 45.4111C35.4673 45.411 45.2743 35.604 45.2744 23.5508C45.2744 11.4974 35.4674 1.68957 23.4141 1.68945Z\" fill=\"currentColor\"\/>\n<path d=\"M19.2841 33.6992C18.9579 33.6986 18.6374 33.6111 18.3543 33.4454C17.7167 33.0759 17.3203 32.3585 17.3203 31.5797V15.8189C17.3203 15.0379 17.7167 14.3227 18.3543 13.9531C18.6442 13.7827 18.9735 13.6951 19.3078 13.6994C19.6421 13.7037 19.9692 13.7998 20.2548 13.9776L33.4237 22.0406C33.6981 22.2166 33.9244 22.461 34.0812 22.751C34.238 23.0409 34.3203 23.3668 34.3203 23.6982C34.3203 24.0295 34.238 24.3555 34.0812 24.6454C33.9244 24.9353 33.6981 25.1798 33.4237 25.3558L20.2527 33.421C19.9604 33.6017 19.6256 33.6979 19.2841 33.6992Z\" fill=\"currentColor\"\/>\n<\/g>\n<\/svg>\n<\/span>            <\/div>\n                        <\/figure>\n        <div class=\"wp-component-card__content edwp-row-load\">\n                                    <p class=\"wp-component-card__eyebrow\">\n                Articles            <\/p>\n                <a href='https:\/\/www.elixirr.com\/en-us\/2024-trends-cyber\/' class='wp-component-card__title'>\n            <h2>\n                2024 Trends: Cyber\n            <\/h2>\n        <\/a>                                    <div class=\"wp-component-card__description\">\n                    This year alone, there have been over&nbsp;950 major cyber incidents&nbsp;globally, with almost 5.5 billion data records breached. The global average cost of each data breach&nbsp;is $4.45 million&nbsp;\u2013 a figure that&hellip;                <\/div>\n                                                    <div class=\"wp-component-card__meta\">\n                                            <p class=\"wp-component-card__date\">\n                            05 December 2023                        <\/p>\n                                                                <div class=\"wp-component-card__terms\">\n                                                                                                                                                    <div class=\"wp-component-tags edwp-component\">\n                        <div class=\"wp-component-tags__tag\">\n                Cybersecurity            <\/div>\n                                <div class=\"wp-component-tags__tag\">\n                Risk &amp; Compliance            <\/div>\n                <\/div>\n                        <\/div>\n                                    <\/div>\n                                                    <div class=\"wp-component-card__button-wrapper\">\n                    <button class=\"btn btn--link arrow wp-component-card__button\">\n                                                                            Read more                                                                            <span class='edwp-svg '><svg width=\"20\" height=\"20\" viewBox=\"0 0 20 20\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<g id=\"Lg\">\n<path id=\"Vector\" d=\"M1.12509 9.50162H15.8648L9.43259 3.06941C9.374 3.0113 9.3275 2.94216 9.29576 2.86599C9.26403 2.78981 9.24769 2.70811 9.24769 2.62559C9.24769 2.54307 9.26403 2.46137 9.29576 2.38519C9.3275 2.30902 9.374 2.23988 9.43259 2.18177C9.54971 2.06535 9.70814 2 9.87328 2C10.0384 2 10.1969 2.06535 10.314 2.18177L17.8151 9.6829C17.8737 9.74101 17.9202 9.81014 17.9519 9.88632C17.9837 9.96249 18 10.0442 18 10.1267C18 10.2092 17.9837 10.2909 17.9519 10.3671C17.9202 10.4433 17.8737 10.5124 17.8151 10.5705L10.314 18.0717C10.1975 18.1871 10.0404 18.2522 9.87641 18.2529C9.79414 18.2534 9.71259 18.2376 9.63643 18.2065C9.56027 18.1754 9.491 18.1296 9.43259 18.0717C9.374 18.0135 9.3275 17.9444 9.29576 17.8682C9.26403 17.7921 9.24769 17.7104 9.24769 17.6278C9.24769 17.5453 9.26403 17.4636 9.29576 17.3874C9.3275 17.3113 9.374 17.2421 9.43259 17.184L15.8711 10.7518H1.12509C0.959309 10.7518 0.800312 10.686 0.683084 10.5687C0.565857 10.4515 0.5 10.2925 0.5 10.1267C0.5 9.96093 0.565857 9.80193 0.683084 9.68471C0.800312 9.56748 0.959309 9.50162 1.12509 9.50162Z\" fill=\"#1D0F25\"\/>\n<\/g>\n<\/svg>\n<\/span>                                            <\/button>\n                <\/div>\n                                            <\/div>\n<\/article>\n","_links":{"self":[{"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/posts\/44609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/comments?post=44609"}],"version-history":[{"count":4,"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/posts\/44609\/revisions"}],"predecessor-version":[{"id":62732,"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/posts\/44609\/revisions\/62732"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/media\/44615"}],"wp:attachment":[{"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/media?parent=44609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/categories?post=44609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/tags?post=44609"},{"taxonomy":"related_service","embeddable":true,"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/related_service?post=44609"},{"taxonomy":"related_industry","embeddable":true,"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/related_industry?post=44609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}