{"id":12968,"date":"2018-03-08T15:54:13","date_gmt":"2018-03-08T20:54:13","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=12968"},"modified":"2025-11-12T15:40:06","modified_gmt":"2025-11-12T20:40:06","slug":"2018-threat-report","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/2018-threat-report\/","title":{"rendered":"5 Big Takeaways from the SonicWall 2018 Cyber Threat Report"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12968\" class=\"elementor elementor-12968\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d5460f6 e-flex e-con-boxed e-con e-parent\" data-id=\"1d5460f6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c333ae1 elementor-widget elementor-widget-text-editor\" data-id=\"4c333ae1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The 2018 SonicWall Cyber Threat Report was just released and we&#8217;re here to break down this massive report into bite-size morsels for you to chew on. Each year, <a href=\"https:\/\/www.firewalls.com\/brands\/sonicwall.html\">SonicWall<\/a> Capture Labs publishes an in-depth look at the trends, changes, &amp; tech that shaped the cyber threat landscape over the previous year and they use their findings to predict the volatile threat landscape that organizations can expect to traverse in the coming year. Predict your own cyber security future by understanding these <strong>5 key takeaways from the 2018 Cyber Threat Report.<\/strong><\/p><p>\u00a0<\/p><h3><strong>1. Ransomware<\/strong><\/h3><p>Wave goodbye to the cyber security war that you once knew. No, it\u2019s not over. It\u2019s just a little different now. Despite headline-worthy attacks rocking Europe and North America, 2017 was a year of retreat and regroup for threat actors. No longer happy to play the numbers game, criminals have instead turned their focus towards innovation. While overall ransomware attacks dropped, the number of unique variants increased in 2017.<\/p><p>The number of ransomware attacks detected in 2017 by SonicWall Capture Labs totaled 183.6 million, a 71% drop compared to 2016. Nonetheless, of those detected hits, SonicWall discovered one never-before-seen variant for every 250 known threats it encountered. This means that ransomware is becoming more versatile. In 2018, expect the trend to continue, meaning your organization will be defending from fewer attempts, but each attempt will be smarter and more cunning than previous years.<\/p><h4><strong>What does this mean for me?<\/strong><\/h4><p>If you\u2019re not already using a <a href=\"https:\/\/www.firewalls.com\/blog\/capture-atp\/\" target=\"_blank\" rel=\"noopener noreferrer\">cloud-based sandbox<\/a>, 2018 is the year to jump on the wagon. <strong>Zero-day threats may well become the new norm<\/strong>, meaning you\u2019re only partially protected if you still depend on signature updates and patches. As the threat landscape shifts from quantity to quality, it is paramount that organizations stay ahead of the wave.<\/p><h3><strong>2. Malware<\/strong><\/h3><p>Where ransomware has taken a step back to catch its breath, malware filled the void in 2017, rebounding from the significant dip witnessed in 2016. From 2015 to 2016, malware attacks dropped from 8.19 billion occurrences to 7.87 billion, a statistic initially interpreted as a signal that malware was on the decline. 2017, however, saw a roaring return with over 9.32 billion malware attacks logged by SonicWall Capture Labs.<\/p><p>Malware in 2017 did have some unique features compared to past specimens. With the fall from grace of Adobe Flash sweeping a huge category of vulnerabilities and exploits into the trash, malware authors designated Microsoft as their new punching bag. Attacks against old targets like Acrobat Reader and Reader DC are down. Meanwhile, attacks targeting Word, Excel, and other Office products are ramping up.<\/p><p>Second, threat actors have seemingly joined the green movement by making recycling a big aspect of malware lifecycles. No, we\u2019re not talking about scraps of trash, but malware code itself being reused, rehashed, and rewritten. The SonicWall Cyber Threat Report refers to this phenomenon as \u201cmalware cocktails.\u201d Such cocktails are created by mixing and matching snippets of code or functionality from several malware kits and splicing them into new Frankenstein-esque creations.<\/p><h4><strong>What does it mean for me?<\/strong><\/h4><p>Take your <strong>signature-based scans and toss them out the window<\/strong>. It\u2019s high time you switch over to <strong>behavior scanning<\/strong>. Most cyber security brands worth their weight are relying more heavily on machine learning, deep system scans, and real-time protection. Both <a href=\"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/capture-advanced-threat-protection\" target=\"_blank\" rel=\"noopener noreferrer\">SonicWall\u2019s Capture ATP<\/a> &amp; <a href=\"https:\/\/www.sophos.com\/en-us\/lp\/sandstorm.aspx?id=00130000019KGZ4\" target=\"_blank\" rel=\"noopener noreferrer\">Sophos\u2019 Sandstorm<\/a>\u00a0make use of the latest deep learning capabilities to identify, probe, and judge data in fractions of a second. Much like our response to ransomware above, the key to steering clear of a malware infection will be in an organization\u2019s ability to stay dynamic.<\/p><h3><strong>3. SSL\/TSL<\/strong><\/h3><p>Speaking of malware, another important shift in the threat landscape is malware\u2019s ability to hide itself behind encryption. Encryption, specifically through SSL\/TSL protocol, has accelerated, <strong>with over 60% of web traffic now encrypted<\/strong>. Soon, Google Chrome will begin marking all unencrypted pages as \u201cnot secure.\u201d All signs point towards a future where SSL\/TSL secured sites are the normal and malicious traffic is no exception.<\/p><h4><strong>What does it mean for me?<\/strong><\/h4><p>According to the report, organizations that lack the ability to inspect encrypted traffic missed, on average, <strong>over 900 attacks hidden by SSL\/TSL encryption<\/strong> in 2017. In addition, many attack kits are leveraging custom encryption languages, making it even more problematic to parse out their payload.<\/p><p>Stateful inspection and bad policy configuration are no longer effective if you want to catch all of the attacks. In 2018, an organization will rely heavily on its ability to inspect encrypted traffic. It may be wise <a href=\"https:\/\/www.firewalls.com\/professional-services.html\" target=\"_blank\" rel=\"noopener noreferrer\">to get a second set of eyes to review your NGFW configuration<\/a> to ensure your network is set up to deal with encrypted threats.<\/p><h3><strong>4. Internet Of Things<\/strong><\/h3><p>We wrote up a <a href=\"https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/\" target=\"_blank\" rel=\"noopener noreferrer\">comprehensive article on IoT<\/a> in 2017 that takes an in-depth look at the developments and dangers surrounding the Internet of Things. Since then, exploits with very scary names such as Meltdown and Reaper have emerged. Unfortunately, IoT-enabled products continue to be produced with little to no regard for cyber security. Expect to see the weaponization of IoT clusters for use in botnet DDoS attacks.<\/p><h4><strong>What does it mean for me?<\/strong><\/h4><p>Honestly, we\u2019re not sure. The bad guys have not yet figured out how to best make use of this emergent attack vector. Whatever the future may hold for IoT, one thing we know for certain is that we will one day regret the short-sightedness of pumping all of these network-enabled devices into public hands with scant oversight of security risks. SonicWall Capture Labs has put forth at least one solution, which we\u2019ll outline next.<\/p><h3><strong>5. Real-Time Deep Memory Inspection (RTDMI)<\/strong><\/h3><p>SonicWall has demonstrated its inventiveness over and over throughout the years with a strong portfolio of patents. Most notable is their patented Reassembly-Free Deep Packet Inspection, a method that allows simultaneous scanning of data chunks through multiple processing engines, changing DPI services of old from bottlenecks into high-speed security checkpoints. In 2018, SonicWall continued their proud tradition of innovation by opening new battlegrounds in the fight against cyber crime in advanced technologies such as IoT, chip-based threats, &amp; mass market malware with the introduction of their patent-pending Real-Time Deep Memory Inspection.<\/p><p>There\u2019s not a whole lot of information about RTDMI released so far, but the few snippets of features we were able to find hinted at potential capabilities. RTDMI is located in the Capture cloud and has been quietly operating for a few months now, so if you\u2019re currently running Capture ATP you\u2019re already under RTDMI\u2019s silent watch.<\/p><p><strong>RTDMI can detect and block malware that conceals its malicious behavior behind encryption<\/strong>. By scanning these encrypted threats in real time and forcing them to expose their intentions in processor memory, RTDMI promises to root out even the best disguised attacks. According to the threat report, the act of exposing, detecting, and blocking these kinds of advanced threats takes place in a timescale of <strong>under 100 nanoseconds<\/strong>.<\/p><h4><strong>What\u2019s this mean for me?<\/strong><\/h4><p>Again, we\u2019re not sure yet. But <strong>you should find this news reassuring<\/strong> at the least. RTDMI demonstrates that SonicWall is already working to solve the emerging threats of tomorrow. We\u2019ll keep bugging SonicWall for more information on and we\u2019ll let you know what we find out about this mysterious new patent-pending tech.<\/p><p>There is one common thread linking all of this information: set-it-and-forget-it is dead. Cyber safety in 2018 equates to dynamic, real-time, advanced tech focused efforts. Still relying on a legacy firewall or bare bones subscriptions? We recommend you start weighing your options. And if this all sounds expensive to you, <strong>consider softening the upfront costs by partnering with a <a href=\"https:\/\/www.firewalls.com\/blog\/would-you-rather\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security-as-a-Service team<\/a>\u00a0where everything you need to stay secure is provided at a much lower cost monthly subscription<\/strong>.<\/p><p style=\"text-align: center;\"><a class=\"wpex-theme-button red\" href=\"https:\/\/www.sonicwall.com\/2021-cyber-threat-report\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-size: 18px;\">READ THE FULL 2021 SONICWALL CYBER THREAT REPORT<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>At the beginning of each year, SonicWall Capture Labs publishes an in-depth look at the trends, changes, &#038; tech that shaped the cyber threat landscape. You can predict your own cyber security future by understanding these 5 key takeaways from the 2018 Cyber Threat Report.<\/p>\n","protected":false},"author":5,"featured_media":12974,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[286,598],"tags":[],"class_list":["post-12968","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-sonicwall"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 Big Takeaways from the SonicWall 2018 Cyber Threat Report<\/title>\n<meta name=\"description\" content=\"At the beginning of each year, SonicWall Capture Labs publishes an in-depth look at the trends, changes, &amp; tech that shaped the cyber threat landscape. You can predict your own cyber security future by understanding these 5 key takeaways from the 2018 Cyber Threat Report.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/2018-threat-report\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Big Takeaways from the SonicWall 2018 Cyber Threat Report\" \/>\n<meta property=\"og:description\" content=\"At the beginning of each year, SonicWall Capture Labs publishes an in-depth look at the trends, changes, &amp; tech that shaped the cyber threat landscape. You can predict your own cyber security future by understanding these 5 key takeaways from the 2018 Cyber Threat Report.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/2018-threat-report\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-08T20:54:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-12T20:40:06+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/03\/ftrdimgthreatreport18.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1438\" \/>\n\t<meta property=\"og:image:height\" content=\"796\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/2018-threat-report\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/2018-threat-report\\\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"5 Big Takeaways from the SonicWall 2018 Cyber Threat Report\",\"datePublished\":\"2018-03-08T20:54:13+00:00\",\"dateModified\":\"2025-11-12T20:40:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/2018-threat-report\\\/\"},\"wordCount\":1291,\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/2018-threat-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/ftrdimgthreatreport18.jpg\",\"articleSection\":[\"Cybersecurity\",\"SonicWall\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/2018-threat-report\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/2018-threat-report\\\/\",\"name\":\"5 Big Takeaways from the SonicWall 2018 Cyber Threat Report\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/2018-threat-report\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/2018-threat-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/ftrdimgthreatreport18.jpg\",\"datePublished\":\"2018-03-08T20:54:13+00:00\",\"dateModified\":\"2025-11-12T20:40:06+00:00\",\"description\":\"At the beginning of each year, SonicWall Capture Labs publishes an in-depth look at the trends, changes, & tech that shaped the cyber threat landscape. You can predict your own cyber security future by understanding these 5 key takeaways from the 2018 Cyber Threat Report.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/2018-threat-report\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/2018-threat-report\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/2018-threat-report\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/ftrdimgthreatreport18.jpg\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/ftrdimgthreatreport18.jpg\",\"width\":1438,\"height\":796,\"caption\":\"The 2018 sonicwall cyber threat report takes a look at the previous years data on cyber threats and ransomware. now we tell you the 5 biggest takeaways from the report\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/2018-threat-report\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Big Takeaways from the SonicWall 2018 Cyber Threat Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/www.facebook.com\\\/firewallscom\",\"https:\\\/\\\/x.com\\\/firewallscom\",\"https:\\\/\\\/www.linkedin.com\\\/company-beta\\\/1439857\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\\\/\\\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/author\\\/aharmon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Big Takeaways from the SonicWall 2018 Cyber Threat Report","description":"At the beginning of each year, SonicWall Capture Labs publishes an in-depth look at the trends, changes, & tech that shaped the cyber threat landscape. You can predict your own cyber security future by understanding these 5 key takeaways from the 2018 Cyber Threat Report.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/2018-threat-report\/","og_locale":"en_US","og_type":"article","og_title":"5 Big Takeaways from the SonicWall 2018 Cyber Threat Report","og_description":"At the beginning of each year, SonicWall Capture Labs publishes an in-depth look at the trends, changes, & tech that shaped the cyber threat landscape. You can predict your own cyber security future by understanding these 5 key takeaways from the 2018 Cyber Threat Report.","og_url":"https:\/\/www.firewalls.com\/blog\/2018-threat-report\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2018-03-08T20:54:13+00:00","article_modified_time":"2025-11-12T20:40:06+00:00","og_image":[{"width":1438,"height":796,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/03\/ftrdimgthreatreport18.jpg","type":"image\/jpeg"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/2018-threat-report\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/2018-threat-report\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"5 Big Takeaways from the SonicWall 2018 Cyber Threat Report","datePublished":"2018-03-08T20:54:13+00:00","dateModified":"2025-11-12T20:40:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/2018-threat-report\/"},"wordCount":1291,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/2018-threat-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/03\/ftrdimgthreatreport18.jpg","articleSection":["Cybersecurity","SonicWall"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/2018-threat-report\/","url":"https:\/\/www.firewalls.com\/blog\/2018-threat-report\/","name":"5 Big Takeaways from the SonicWall 2018 Cyber Threat Report","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/2018-threat-report\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/2018-threat-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/03\/ftrdimgthreatreport18.jpg","datePublished":"2018-03-08T20:54:13+00:00","dateModified":"2025-11-12T20:40:06+00:00","description":"At the beginning of each year, SonicWall Capture Labs publishes an in-depth look at the trends, changes, & tech that shaped the cyber threat landscape. You can predict your own cyber security future by understanding these 5 key takeaways from the 2018 Cyber Threat Report.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/2018-threat-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/2018-threat-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/2018-threat-report\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/03\/ftrdimgthreatreport18.jpg","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/03\/ftrdimgthreatreport18.jpg","width":1438,"height":796,"caption":"The 2018 sonicwall cyber threat report takes a look at the previous years data on cyber threats and ransomware. now we tell you the 5 biggest takeaways from the report"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/2018-threat-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"5 Big Takeaways from the SonicWall 2018 Cyber Threat Report"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=12968"}],"version-history":[{"count":35,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12968\/revisions"}],"predecessor-version":[{"id":26697,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12968\/revisions\/26697"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/12974"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=12968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=12968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=12968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}