Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php on line 46

Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php on line 50

Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php on line 52

Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php on line 56

Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php on line 72

Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php on line 114

Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php on line 118

Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php on line 119

Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php on line 120

Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php on line 121

Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php on line 122

Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_LoggerSchema.php on line 40

Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_LoggerSchema.php on line 44

Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_LoggerSchema.php on line 77

Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_LoggerSchema.php on line 81

Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_LoggerSchema.php on line 82

Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_LoggerSchema.php on line 83

Warning: Cannot modify header information - headers already sent by (output started at /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php:46) in /home1/sarahdea/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php:46) in /home1/sarahdea/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php:46) in /home1/sarahdea/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php:46) in /home1/sarahdea/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php:46) in /home1/sarahdea/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php:46) in /home1/sarahdea/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php:46) in /home1/sarahdea/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home1/sarahdea/public_html/wp-content/plugins/wpforms-lite/vendor/woocommerce/action-scheduler/classes/schema/ActionScheduler_StoreSchema.php:46) in /home1/sarahdea/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1794
{"id":2280,"date":"2013-12-20T10:32:36","date_gmt":"2013-12-20T10:32:36","guid":{"rendered":"http:\/\/www.theprroom.com\/?p=2280"},"modified":"2021-05-17T15:08:52","modified_gmt":"2021-05-17T15:08:52","slug":"bullguards-top-10-security-predictions-for-2014","status":"publish","type":"post","link":"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/","title":{"rendered":"BullGuard\u2019s Top 10 Security Predictions for 2014"},"content":{"rendered":"

\"logo-red\"<\/h2>\n

BullGuard\u2019s Top 10 Security Predictions for 2014<\/b><\/h2>\n

London, 20th<\/sup> December 2013: <\/i><\/b>With 2014 just around the corner what security developments can we expect to see in the coming 12 months? Alex Balan, Head of Product Management at BullGuard<\/a>, draws from a deep well of experience and nails his 10 security predictions to the mast. Some are predictable, some are intriguing and others are, well, spine chilling. <\/i><\/b><\/p>\n

1.\u00a0\u00a0\u00a0 <\/b>Ransomware
\n<\/b><\/p>\n

It\u2019s devious and destructive and it makes hackers money. Ransomware has been around a while, but because it\u2019s so effective it\u2019s going to be around for a lot longer.<\/i>
\n<\/b><\/p>\n

Hackers are, by and large, motivated by money and new opportunities. In fact, the potential for making money is so great that much of this underground activity is also driven by well organised criminal organisations. This means that ransomware such as Cryptolocker, and other new variants, which have been doing the rounds for a few months will continue to be used.<\/p>\n

As a hacking technology it\u2019s not ground-breaking but it\u2019s certainly effective. Simply, it encrypts your photos and documents and flashes up a message on your screen telling you that you need to pay a \u2018ransom\u2019 to get your computer back. If you don\u2019t then you\u2019ve lost your data and there is little anyone can do to help you.<\/p>\n

Even police in the US who were infected by Cryptome actually paid the ransom. \u00a0It\u2019s a devious method for hackers to lock down your computer and many victims often have no choice but to pay up to retrieve their personal information.<\/p>\n

2.\u00a0\u00a0\u00a0 <\/b>Mobile malware<\/b><\/p>\n

If you\u2019re using a mobile device to do some online banking or shopping you\u2019re going to need some protection.<\/i><\/p>\n

Mobile malware has been something of a bogeyman in the security industry. Today, that is changing. There is a growing body of evidence that shows concerted attacks on mobile devices, with many aiming to steal personal financial details. This is hardly surprising given the explosive growth in smartphones and tablets. The emergence of Android and iOS as leaders in the mobile operating-system wars, makes life easier for hackers. It also means there is more to steal, with the ability to generate revenue through reversed billed text, calls to premium-rate numbers and banking. Back-door Trojans, which steal data without the victim\u2019s knowledge, and malware that goes after banking login information made up the largest portion of all new mobile malware families in Q2 2013. \u00a0Mobile malware is no longer a bogeyman. It\u2019s here, now, and is set to grow.<\/p>\n

3.\u00a0\u00a0\u00a0 <\/b>Shoring up personal security
\n<\/b><\/p>\n

Increasing numbers of people will be exploring how they can best protect their online communications from prying eyes.<\/i><\/p>\n

The recent leaks about the NSA and GCHQ monitoring Internet traffic, email communications and mobile calls, is by far the most important cyber security event in the past year for many reasons. At a personal level, the revelations have certainly increased awareness about the need for personal security.<\/p>\n

More and more people are now aware of how important online privacy is and are starting to be more cautious about online behaviour and interactions. Until now, people have generally only taken security actions reactively, typically after something has happened.\u00a0 The NSA and GCHQ revelations are making people realise they need to be proactive.\u00a0 This will lead to a growth in privacy-related technologies that offer users safety for their data and privacy in their communications.<\/p>\n

4.\u00a0\u00a0\u00a0 <\/b>Forget me not
\n<\/b><\/p>\n

With so many \u2018old\u2019 systems in place there\u2019s a real risk many will be hacked simply because they are not properly secured.<\/i>
\n<\/b><\/p>\n

We\u2019re likely to see more attacks that are successful as a result of a lack of awareness about old software and systems that are full of \u2018holes.\u2019 For example, Microsoft XP reaches its end of life early next year and will no longer be supported, which means no more updates even if a security problem is found.\u00a0 This popular but creaking operating system is widely used and how many people know that Microsoft is turning its back on it? Of course, hackers are aware of this and you can bet that there will be many attempts to find new exploits in XP \u2013 which means there\u2019s sure to be a lot of people who will fall victim to malware as a result. The same can also be said for any operating system that is not upgraded regularly.<\/p>\n

5.\u00a0\u00a0\u00a0 <\/b>The Internet of Things
\n<\/b><\/p>\n

Computer-controlled appliances are on the rise. The majority of them are not protected. More of them will be hacked.
\n<\/i><\/p>\n

You may or may not have heard about the \u2018Internet of Things\u2019. It\u2019s a term used to describe the increasing computerisation of everyday things and it\u2019s steadily becoming a reality. We already have so many Internet-connected devices such as webcams, CCTV systems, televisions, digital video recorders and even baby alarms. If these devices are not protected they\u2019re vulnerable to attack via the Internet.<\/p>\n

You\u2019ve probably already heard of webcams being controlled by hackers but as the Internet of Things gathers pace, there will inevitably be a corresponding rise in hacking activities to take control of these devices. It might sound bizarre, but soon we\u2019ll see fridges, toasters and other devices hooked into the Internet. We\u2019ve even heard of clothes with chips in them that let their owner know they need cleaning. And today\u2019s cars are largely dependent on computers. So, don\u2019t be too surprised when you hear of these things being hijacked by hackers.<\/p>\n

6.\u00a0\u00a0\u00a0 <\/b>Back it up
\n<\/b><\/p>\n

If you lose your virtual life you\u2019ll also struggle in the real world.
\n<\/i><\/p>\n

Never in the history of humankind has an industry grown so rapidly and so pervasively as technology. It reaches into every corner of our lives and is changing the way we live. Film cameras are a thing of the past, physical bank branches and post offices are becoming \u2018quaint\u2019 and well-known retailers have disappeared from the high-street because they didn\u2019t get the online thing.<\/p>\n

In fact, online shopping today is as common as storing all our personal information on our computers. But what happens when computers crash, as they sometimes do? You can probably hear the shrieks of horror several miles away.\u00a0 Thankfully, more people are aware of the potential damage and the implications, leading to an increase in back-up technologies, whether this is online or external drives that plug into your computer.\u00a0 Expect the arrival of more back-up services, especially in the online space.<\/p>\n

7.\u00a0\u00a0\u00a0 <\/b>Biometric authentication
\n<\/b><\/p>\n

Computers that won\u2019t fire up until you\u2019ve identified yourself with some form of biometric ID will gradually become mainstream.<\/i><\/p>\n

Biometric authentication is widely regarded as the most secure form of identity control.\u00a0 Early systems were slow and intrusive but were mainly used for guarding access or restricting physical entry to relatively few users. Today, computers are much faster and cheaper than ever and with new, inexpensive hardware, the interest in biometrics has been renewed. There are several types of biometric authentication in use but because of its convenience and ease of use, fingerprint authentication is becoming the biometric technology of widest choice. Expect to see growing numbers of notebook PCs, mobile devices and computer peripherals coming to market with built-in fingerprint readers and more sophisticated models that read your eye.<\/p>\n

8.\u00a0\u00a0\u00a0 <\/b>The deep web gets deeper
\n<\/b><\/p>\n

Anonymous services \u2018hidden\u2019 on the deep web are being targeted by law enforcement.\u00a0 As a result, they\u2019ll respond with even tougher protection.<\/i>
\n<\/b><\/p>\n

Law enforcement agencies have scored some significant \u2018deep web\u2019 successes the past year, most notably the taking down of the Silk Road web site. Silk Road was notorious for its merchandise; heroin, cocaine, hash, guns, counterfeit currency and so on. Crime busters both sides of the pond are also enlisting the help of intelligence services such as the NSA and GCHQ to crack encryption codes used to mask all sorts of nefarious things on the deep web such as child abuse images.<\/p>\n

Inroads will continue to be made into the deep web in 2014 but the odds are that other anonymous deep web services will simply ratchet up their protection and will become even harder to compromise and take down. There\u2019s already been a taste of this trend evident when the FBI shut down file sharing service Megaupload and arrested Kit Dotcom, its founder. A short time later Mega, the son of Megaupload, was launched protected by tough encryption. With Mega, there\u2019s no way to retrieve lost passwords and Mega has no idea what it is hosting, but it\u2019s a certainty that it includes illicit content such as child pornography.<\/p>\n

9.\u00a0\u00a0\u00a0 <\/b>Smartphones in the workplace<\/b><\/p>\n

Think twice about plugging your smartphone into your work computer \u2013 you never know what might happen.<\/i><\/p>\n

You may not realise it, but when you take your smartphone into the workplace and hook it up to the desktop or laptop you work on, you\u2019re committing a security faux pas<\/i>.\u00a0 If your device has some malware on it and you\u2019re not aware of it, you\u2019ve probably just released it into the company network.<\/p>\n

Hackers love breaking into company networks because they are virtual treasure troves.\u00a0 If the hackers are malicious they can simply cause damage, but more often they want to get their hands on things like databases full of customer information which they sell on the dark web.<\/p>\n

Because smart phones are now so popular, hackers are targeting them as a means to access corporate networks. We\u2019ll steadily see an increase in this type of activity in the coming year, so it pays to be aware.<\/p>\n

10. <\/b>\u00a0\u00a0\u00a0Service provider hacks
\n<\/b><\/p>\n

Criminals love a successful ISP hack \u2013 it provides them with access to millions of account details. Watch out for more of the same.<\/i><\/p>\n

When a service provider gets hacked it resonates long and loud. In April this year UK telco giant BT dumped Yahoo as its email provider to six million customers.\u00a0 Customers had been complaining for months that hackers had taken control of their email accounts.<\/p>\n

Many hackers break into service provider systems simply to get free broadband, but at the organised crime end of the spectrum it\u2019s done to launch large scale spam and malware attacks. Don\u2019t be surprised to see more ISP hacks in the coming year to hijack email accounts and launch mega-scale spam attacks.<\/p>\n

 <\/p>\n

-ENDS-<\/p>\n

More information
\n<\/b>Press Contact<\/b><\/p>\n

Sarah Chard
\nThe PR Room Ltd<\/p>\n

Tel: +44 (0) 845 094 2902
\nMobile: +44 (0) 7779 584 799
\n
sarah.chard@theprroom.co.uk<\/a><\/p>\n

[callout size=”col-12″ last_column=”true” title=”Further Information” description=”For further information, images or review samples, please …” button_title=”Get in Touch” icon=”\u00a0icon-chevron-right” button_link=”\/contact\/” button_color=”red” button_size=”xlarge” button_rounded=”false” button_in_new_tab=”false” flip_right_edge=”false”]<\/p>\n

[section]<\/p>\n

\n

About BullGuard:<\/h3>\n
\n

Launched in 2002, BullGuard is one of the fastest growing internet and mobile security brands. Today, its product portfolio also includes award-winning antivirus, premium 24\/7 protection suite, web-based identity and social media protection that works across all devices, as well as PC and mobile backup software solutions. BullGuard\u2019s philosophy has always remained the same – to combine technical excellence with a genuine understanding of consumer needs, creating simple, easy-to-use products that deliver complete protection, and to enable customers to control and manage their digital footprint.<\/p>\n<\/div>\n

For two consecutive years (January 2012 and 2013), BullGuard Internet Security has won a coveted \u201cBest Buy\u201d award from Which?.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"

BullGuard\u2019s Top 10 Security Predictions for 2014 London, 20th December 2013: With 2014 just around the corner what security developments can we expect to see in the coming 12 months? Alex Balan, Head of Product Management at BullGuard, draws from a deep well of experience and nails his 10 security predictions to the mast. Some […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[4],"yoast_head":"\nBullGuard\u2019s Top 10 Security Predictions for 2014 - The PR Room | Technology PR & IoT PR Agency<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BullGuard\u2019s Top 10 Security Predictions for 2014 - The PR Room | Technology PR & IoT PR Agency\" \/>\n<meta property=\"og:description\" content=\"BullGuard\u2019s Top 10 Security Predictions for 2014 London, 20th December 2013: With 2014 just around the corner what security developments can we expect to see in the coming 12 months? Alex Balan, Head of Product Management at BullGuard, draws from a deep well of experience and nails his 10 security predictions to the mast. Some […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/\" \/>\n<meta property=\"og:site_name\" content=\"The PR Room | Technology PR & IoT PR Agency\" \/>\n<meta property=\"article:published_time\" content=\"2013-12-20T10:32:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-17T15:08:52+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/theprroom.co.uk\/wp-content\/uploads\/2021\/05\/logo-red.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/theprroom.co.uk\/#\/schema\/person\/e0c9af2edaf639702b5606781acfd8ab\"},\"headline\":\"BullGuard\u2019s Top 10 Security Predictions for 2014\",\"datePublished\":\"2013-12-20T10:32:36+00:00\",\"dateModified\":\"2021-05-17T15:08:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/\"},\"wordCount\":1895,\"publisher\":{\"@id\":\"https:\/\/theprroom.co.uk\/#organization\"},\"keywords\":[\"Press Releases\"],\"articleSection\":[\"Client News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/\",\"url\":\"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/\",\"name\":\"BullGuard\u2019s Top 10 Security Predictions for 2014 - The PR Room | Technology PR & IoT PR Agency\",\"isPartOf\":{\"@id\":\"https:\/\/theprroom.co.uk\/#website\"},\"datePublished\":\"2013-12-20T10:32:36+00:00\",\"dateModified\":\"2021-05-17T15:08:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/theprroom.co.uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BullGuard\u2019s Top 10 Security Predictions for 2014\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/theprroom.co.uk\/#website\",\"url\":\"https:\/\/theprroom.co.uk\/\",\"name\":\"The PR Room | Technology PR & IoT PR Agency\",\"description\":\"Technology PR & IoT PR Agency\",\"publisher\":{\"@id\":\"https:\/\/theprroom.co.uk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/theprroom.co.uk\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/theprroom.co.uk\/#organization\",\"name\":\"The PR Room | Technology PR & IoT PR Agency\",\"url\":\"https:\/\/theprroom.co.uk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/theprroom.co.uk\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/theprroom.co.uk\/wp-content\/uploads\/2021\/05\/PR-Room-Logo-320x120xleft-Transparent.png\",\"contentUrl\":\"https:\/\/theprroom.co.uk\/wp-content\/uploads\/2021\/05\/PR-Room-Logo-320x120xleft-Transparent.png\",\"width\":320,\"height\":120,\"caption\":\"The PR Room | Technology PR & IoT PR Agency\"},\"image\":{\"@id\":\"https:\/\/theprroom.co.uk\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/theprroom.co.uk\/#\/schema\/person\/e0c9af2edaf639702b5606781acfd8ab\",\"name\":\"admin\",\"sameAs\":[\"http:\/\/box5201.temp.domains\/~sarahdea\"],\"url\":\"https:\/\/theprroom.co.uk\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BullGuard\u2019s Top 10 Security Predictions for 2014 - The PR Room | Technology PR & IoT PR Agency","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/","og_locale":"en_US","og_type":"article","og_title":"BullGuard\u2019s Top 10 Security Predictions for 2014 - The PR Room | Technology PR & IoT PR Agency","og_description":"BullGuard\u2019s Top 10 Security Predictions for 2014 London, 20th December 2013: With 2014 just around the corner what security developments can we expect to see in the coming 12 months? Alex Balan, Head of Product Management at BullGuard, draws from a deep well of experience and nails his 10 security predictions to the mast. Some […]","og_url":"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/","og_site_name":"The PR Room | Technology PR & IoT PR Agency","article_published_time":"2013-12-20T10:32:36+00:00","article_modified_time":"2021-05-17T15:08:52+00:00","og_image":[{"url":"http:\/\/theprroom.co.uk\/wp-content\/uploads\/2021\/05\/logo-red.jpg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/#article","isPartOf":{"@id":"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/"},"author":{"name":"admin","@id":"https:\/\/theprroom.co.uk\/#\/schema\/person\/e0c9af2edaf639702b5606781acfd8ab"},"headline":"BullGuard\u2019s Top 10 Security Predictions for 2014","datePublished":"2013-12-20T10:32:36+00:00","dateModified":"2021-05-17T15:08:52+00:00","mainEntityOfPage":{"@id":"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/"},"wordCount":1895,"publisher":{"@id":"https:\/\/theprroom.co.uk\/#organization"},"keywords":["Press Releases"],"articleSection":["Client News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/","url":"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/","name":"BullGuard\u2019s Top 10 Security Predictions for 2014 - The PR Room | Technology PR & IoT PR Agency","isPartOf":{"@id":"https:\/\/theprroom.co.uk\/#website"},"datePublished":"2013-12-20T10:32:36+00:00","dateModified":"2021-05-17T15:08:52+00:00","breadcrumb":{"@id":"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/theprroom.co.uk\/client-news\/bullguards-top-10-security-predictions-for-2014\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/theprroom.co.uk\/"},{"@type":"ListItem","position":2,"name":"BullGuard\u2019s Top 10 Security Predictions for 2014"}]},{"@type":"WebSite","@id":"https:\/\/theprroom.co.uk\/#website","url":"https:\/\/theprroom.co.uk\/","name":"The PR Room | Technology PR & IoT PR Agency","description":"Technology PR & IoT PR Agency","publisher":{"@id":"https:\/\/theprroom.co.uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/theprroom.co.uk\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/theprroom.co.uk\/#organization","name":"The PR Room | Technology PR & IoT PR Agency","url":"https:\/\/theprroom.co.uk\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/theprroom.co.uk\/#\/schema\/logo\/image\/","url":"https:\/\/theprroom.co.uk\/wp-content\/uploads\/2021\/05\/PR-Room-Logo-320x120xleft-Transparent.png","contentUrl":"https:\/\/theprroom.co.uk\/wp-content\/uploads\/2021\/05\/PR-Room-Logo-320x120xleft-Transparent.png","width":320,"height":120,"caption":"The PR Room | Technology PR & IoT PR Agency"},"image":{"@id":"https:\/\/theprroom.co.uk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/theprroom.co.uk\/#\/schema\/person\/e0c9af2edaf639702b5606781acfd8ab","name":"admin","sameAs":["http:\/\/box5201.temp.domains\/~sarahdea"],"url":"https:\/\/theprroom.co.uk\/author\/admin\/"}]}},"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"admin","author_link":"https:\/\/theprroom.co.uk\/author\/admin\/"},"_links":{"self":[{"href":"https:\/\/theprroom.co.uk\/wp-json\/wp\/v2\/posts\/2280"}],"collection":[{"href":"https:\/\/theprroom.co.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/theprroom.co.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/theprroom.co.uk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/theprroom.co.uk\/wp-json\/wp\/v2\/comments?post=2280"}],"version-history":[{"count":1,"href":"https:\/\/theprroom.co.uk\/wp-json\/wp\/v2\/posts\/2280\/revisions"}],"predecessor-version":[{"id":5867,"href":"https:\/\/theprroom.co.uk\/wp-json\/wp\/v2\/posts\/2280\/revisions\/5867"}],"wp:attachment":[{"href":"https:\/\/theprroom.co.uk\/wp-json\/wp\/v2\/media?parent=2280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/theprroom.co.uk\/wp-json\/wp\/v2\/categories?post=2280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/theprroom.co.uk\/wp-json\/wp\/v2\/tags?post=2280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}