{"id":8592,"date":"2022-10-03T14:19:47","date_gmt":"2022-10-03T14:19:47","guid":{"rendered":"https:\/\/grantsofficecan.com\/global-cybersecurity-funding-copy\/"},"modified":"2024-01-02T14:38:19","modified_gmt":"2024-01-02T14:38:19","slug":"global-cybersecurity-funding-fr","status":"publish","type":"post","link":"https:\/\/grantsofficecan.com\/fr\/global-cybersecurity-funding-fr\/","title":{"rendered":"Global Cybersecurity Funding Trends | 2022-2024"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8592\" class=\"elementor elementor-8592\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-5f3f10bd elementor-section-boxed elementor-section-height-default elementor-section-height-default ct-header-fixed-none\" data-id=\"5f3f10bd\" data-element_type=\"section\">\n            \n                        <div class=\"elementor-container elementor-column-gap-default \">\n                    <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-11d2f60d\" data-id=\"11d2f60d\" data-element_type=\"column\">\n            <div class=\"elementor-widget-wrap elementor-element-populated\">\n                        \t\t<div class=\"elementor-element elementor-element-67037d1 elementor-widget elementor-widget-text-editor\" data-id=\"67037d1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.18.0 - 08-12-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\tThe global pandemic created a unique opportunity for cybercriminals to expand their activities &#8211; particularly by exploiting vulnerable individuals who transitioned from work at the office to work at their home overnight. Two years later, these phishing attempts and attacks on video services continue, as many organisations still struggle to provide a \u2018cyber-safe\u2019 remote-work environment for their employees. As the world emerges from the COVID-19 crisis and sets its eyes on the future of work, it is clear that our new reliance on digital infrastructure requires us to change the way we think and interact with the ever-growing list cybersecurity threats across the globe.\n<\/p>\n\n<strong><a title=\"Global Cybersecurity Funding Trends\" href=\"https:\/\/www2.grantsoffice.com\/GlobalCybersecurityTrends\" target=\"_blank\" rel=\"noopener\">Register to download the entire white paper &#8220;Global Cybersecurity Funding Trends,&#8221; <\/p>and view additional\u00a0free resources.<\/a><\/strong>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t            <\/div>\n        <\/div>\n                            <\/div>\n        <\/section>\n        \t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The global pandemic created a unique opportunity for cybercriminals to expand their activities &#8211; particularly by exploiting vulnerable individuals who transitioned from work at the office to work at their home overnight. Two years later, these phishing attempts and attacks on video services continue, as many organisations still struggle to provide a \u2018cyber-safe\u2019 remote-work environment [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8554,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[275],"tags":[240,226],"class_list":["post-8592","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publications-fr","tag-cybersecurity-funding-fr","tag-grants-intelligence-fr"],"featured_image_src":"https:\/\/grantsofficecan.com\/wp-content\/uploads\/2022\/10\/Man-at-a-compter-600x400.jpeg","featured_image_src_square":"https:\/\/grantsofficecan.com\/wp-content\/uploads\/2022\/10\/Man-at-a-compter-600x600.jpeg","author_info":{"display_name":"Grants Office Canada","author_link":"https:\/\/grantsofficecan.com\/fr\/author\/grantsofficeeu\/"},"_links":{"self":[{"href":"https:\/\/grantsofficecan.com\/fr\/wp-json\/wp\/v2\/posts\/8592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/grantsofficecan.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/grantsofficecan.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/grantsofficecan.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/grantsofficecan.com\/fr\/wp-json\/wp\/v2\/comments?post=8592"}],"version-history":[{"count":2,"href":"https:\/\/grantsofficecan.com\/fr\/wp-json\/wp\/v2\/posts\/8592\/revisions"}],"predecessor-version":[{"id":8594,"href":"https:\/\/grantsofficecan.com\/fr\/wp-json\/wp\/v2\/posts\/8592\/revisions\/8594"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/grantsofficecan.com\/fr\/wp-json\/wp\/v2\/media\/8554"}],"wp:attachment":[{"href":"https:\/\/grantsofficecan.com\/fr\/wp-json\/wp\/v2\/media?parent=8592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/grantsofficecan.com\/fr\/wp-json\/wp\/v2\/categories?post=8592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/grantsofficecan.com\/fr\/wp-json\/wp\/v2\/tags?post=8592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}