{"id":15166,"date":"2020-02-28T15:53:13","date_gmt":"2020-02-28T20:53:13","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=15166"},"modified":"2025-12-19T15:41:09","modified_gmt":"2025-12-19T20:41:09","slug":"2020-sonicwall-threat-report","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/","title":{"rendered":"Preparing for the Tempest: SonicWall&#8217;s 2020 Cyber Threat Report"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"15166\" class=\"elementor elementor-15166\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa3fa79 e-flex e-con-boxed e-con e-parent\" data-id=\"fa3fa79\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2dc2ed3 elementor-widget elementor-widget-text-editor\" data-id=\"2dc2ed3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>The Past is Prologue<\/h3><p>As Shakespeare once wrote, &#8220;the past is prologue.&#8221; When it comes to cybersecurity, knowing the recent past &#8211; and trends in the threat landscape &#8211; is vital to protecting your network against the latest and greatest hazards. And so the past &#8211; as in 2019 &#8211; is prologue in the <a href=\"https:\/\/www.sonicwall.com\/2020-cyber-threat-report\/\" target=\"_blank\" rel=\"noopener noreferrer\">2020 SonicWall Cyber Threat Report<\/a>. The report is prepared by SonicWall&#8217;s <a href=\"https:\/\/www.sonicwall.com\/lp\/capture-labs\/\" target=\"_blank\" rel=\"noopener noreferrer\">Capture Labs<\/a> threat research team. It provides an in depth look at the cyber threats of 2019 to help businesses, governments, and organizations of all sizes better prepare to stop the threats of 2020. Let&#8217;s take a look at some of the highlights of the Cyber Threat Report.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b5b96b e-grid e-con-full e-con e-child\" data-id=\"6b5b96b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9fa496b elementor-widget elementor-widget-text-editor\" data-id=\"9fa496b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Ransomware Shifts Strategy<\/h3><p>The good news: <a href=\"https:\/\/www.firewalls.com\/blog\/security-terms\/ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ransomware<\/a> attacks were down in 2019 &#8211; 6% in fact &#8211; from the all-time high recorded in 2018. There were a grand total of 187.9 million last year. The less good news? Well, you probably saw it <a href=\"https:\/\/www.winknews.com\/2020\/02\/24\/software-company-says-ransomware-attacks-cost-business-governments-billions-in-2019\/\" target=\"_blank\" rel=\"noopener noreferrer\">in the news<\/a>. There was an increase in targeted attacks, hitting <a href=\"https:\/\/bitcoinist.com\/50-of-us-departments-fell-victim-to-ransomware-in-2019-report\/\" target=\"_blank\" rel=\"noopener noreferrer\">government networks<\/a>, <a href=\"https:\/\/www.popularmechanics.com\/technology\/security\/a30767090\/ekans-ransomware-industrial-systems\/\" target=\"_blank\" rel=\"noopener noreferrer\">power grids<\/a>, and even <a href=\"https:\/\/www.cisomag.com\/ransomware-attacks-and-data-breaches-on-u-s-schools-and-colleges-triple-in-2019\/\" target=\"_blank\" rel=\"noopener noreferrer\">schools<\/a> &amp; <a href=\"https:\/\/www.healthcaredive.com\/news\/hospitals-clinics-most-likely-to-be-hit-with-ransomware-attack\/572091\/\" target=\"_blank\" rel=\"noopener noreferrer\">hospitals<\/a>. Attackers more and more are focusing on quality over quantity, looking for targets that are most likely to pay rather than blanketing all corners of the connected world.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa14beb elementor-widget elementor-widget-image\" data-id=\"fa14beb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" data-src=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/02\/Threat-report-Cover.png\" title=\"\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 515px; --smush-placeholder-aspect-ratio: 515\/590;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f320f9c elementor-widget elementor-widget-text-editor\" data-id=\"3f320f9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Just how many of these targets were hit last year? It&#8217;s probably under-reported because victims can be hesitant to reveal a breach. But more than 140 state and local governments were successfully targeted for the year, and over 600 schools and hospitals &#8211; just through September. The Cyber Threat Report warns, however, that the average individual can still be a target, too. Researchers note that ransomware operators are more willing than ever to have a dialog and negotiate with their victims to get a payout. They&#8217;ll even use things like sextortion scams, a form of blackmail that suggests the attacker has compromising information or images that they&#8217;ll release unless the victim pays.<\/p><h3>IoT Malware on the Rise<\/h3><p>You down with I-o-T? Yeah, probably! While internet of things devices are hardly Naughty By Nature, they&#8217;re becoming <a href=\"https:\/\/securitytoday.com\/Articles\/2020\/01\/13\/The-IoT-Rundown-for-2020.aspx?Page=2\" target=\"_blank\" rel=\"noopener noreferrer\">more and more ubiquitous<\/a>. As in, if you&#8217;re reading this, there&#8217;s virtually zero chance you don&#8217;t use some type of IoT device(s) in your everyday life. But with that popularity comes greater exposure. In 2019, the Cyber Threat Report indicates there were 34.3 million IoT malware attacks. Oh, and those attack numbers &#8211; much like the number of IoT devices &#8211; are trending up.<\/p><p>Security has not initially been a priority for most IoT device manufacturers. With no standards in place, devices commonly come with out-of-the-box vulnerabilities like weak or hard-coded passwords, unsecured interfaces, and a lack of secure update mechanisms. An otherwise secure network with vulnerable IoT devices may be leaving a <a href=\"https:\/\/msrc-blog.microsoft.com\/2019\/08\/05\/corporate-iot-a-path-to-intrusion\/\" target=\"_blank\" rel=\"noopener noreferrer\">backdoor wide open<\/a> for hackers to access data.<\/p><h3>Encrypted Threats Continue Growth<\/h3><p>While transport layer security (TLS) and its predecessor, secure sockets layer (SSL) encryption standards are largely meant for good, bad actors are always looking to spoil the fun. Encryption when used for wholesome purposes ensures privacy and protects data. But hackers use this encryption against a network, sending malicious packers to <a href=\"https:\/\/www.firewalls.com\/blog\/security-terms\/obfuscation\/\" target=\"_blank\" rel=\"noopener noreferrer\">obfuscate<\/a> malware files. That can get them through a network&#8217;s standard defenses. The Cyber Threat Report shows our aforementioned bad actors sent 3.7 million malware attacks over TLS\/SSL traffic in 2019, 27.3% more than the year prior. Why is this technique on the rise? Many firewall appliances don&#8217;t have the capability or power to detect, inspect, and stop attacks sent through encrypted traffic.<\/p><h3>Defenses Are Improving, Too<\/h3><p>Most of this Cyber Threat Report analysis is probably giving you anxiety, so let&#8217;s end on a positive note. The forces for good are continually improving their (which also means your) defenses against these hazards. Security advances include faster identification &#8211; and in turn faster mitigation &#8211; of zero-day threats. For instance, <a href=\"https:\/\/www.firewalls.com\/brands\/sonicwall.html\">SonicWall<\/a> is able to ID never-before-seen malware variants about 2 days before malware repository VirusTotal receives samples. Also noted are advancements made in deep memory inspection technology to combat side-channel attacks among others. In SonicWall&#8217;s case, that technology is a part of its Real-Time Deep Memory Inspection (RTDMI) engine. You can get a taste of it with a new SOHO 250 or TZ350 bundle. The report additionally spotlights growing momentum of perimeter-less security as traditional boundaries go by the wayside. This includes the introduction of the secure access service edge (SASE), which would combine software and service-based security solutions.<\/p><h3>Want to Learn More?<\/h3><p>Visit our <a href=\"https:\/\/www.firewalls.com\/blog\/threat-dictionary\/\" target=\"_blank\" rel=\"noopener noreferrer\">Threat Dictionary<\/a> to get updated on some of the latest cyber threats out there today. Shop for <a href=\"https:\/\/www.firewalls.com\/brands\/sonicwall.html\" target=\"_blank\" rel=\"noopener noreferrer\">SonicWall security solutions<\/a> like <a href=\"https:\/\/www.firewalls.com\/brands\/sonicwall\/firewalls.html\" target=\"_blank\" rel=\"noopener noreferrer\">firewalls<\/a>, <a href=\"https:\/\/www.firewalls.com\/brands\/sonicwall\/firewalls.html\" target=\"_blank\" rel=\"noopener noreferrer\">web application firewalls<\/a>, and <a href=\"https:\/\/www.firewalls.com\/brands\/sonicwall\/sonicwall-cloud-app-security.html\" target=\"_blank\" rel=\"noopener noreferrer\">cloud app security<\/a> to name a few. And get your very own copy of the full <a href=\"https:\/\/www.sonicwall.com\/2020-cyber-threat-report\/\" target=\"_blank\" rel=\"noopener noreferrer\">2020 Cyber Threat Report<\/a> to dig into all the nitty gritty details yourself.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>SonicWall&#8217;s 2020 Cyber Threat Report urges you to watch out for targeted ransomware, IoT malware, &#038; more. But there are also advances to stop cyber threats.<\/p>\n","protected":false},"author":5,"featured_media":27501,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[286,598],"tags":[],"class_list":["post-15166","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-sonicwall"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Preparing for the Tempest: SonicWall&#039;s 2020 Cyber Threat Report - Firewalls.com<\/title>\n<meta name=\"description\" content=\"SonicWall&#039;s 2020 Cyber Threat Report urges you to watch out for targeted ransomware, IoT malware, &amp; more. But there are also advances to stop cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Preparing for the Tempest: SonicWall&#039;s 2020 Cyber Threat Report - Firewalls.com\" \/>\n<meta property=\"og:description\" content=\"SonicWall&#039;s 2020 Cyber Threat Report urges you to watch out for targeted ransomware, IoT malware, &amp; more. But there are also advances to stop cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-28T20:53:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-19T20:41:09+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/02\/Preparing-for-the-Tempest-SonicWalls-2020-Cyber-Threat-Report.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"Preparing for the Tempest: SonicWall&#8217;s 2020 Cyber Threat Report\",\"datePublished\":\"2020-02-28T20:53:13+00:00\",\"dateModified\":\"2025-12-19T20:41:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/\"},\"wordCount\":800,\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/02\/Preparing-for-the-Tempest-SonicWalls-2020-Cyber-Threat-Report.png\",\"articleSection\":[\"Cybersecurity\",\"SonicWall\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/\",\"name\":\"Preparing for the Tempest: SonicWall's 2020 Cyber Threat Report - Firewalls.com\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/02\/Preparing-for-the-Tempest-SonicWalls-2020-Cyber-Threat-Report.png\",\"datePublished\":\"2020-02-28T20:53:13+00:00\",\"dateModified\":\"2025-12-19T20:41:09+00:00\",\"description\":\"SonicWall's 2020 Cyber Threat Report urges you to watch out for targeted ransomware, IoT malware, & more. But there are also advances to stop cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/#primaryimage\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/02\/Preparing-for-the-Tempest-SonicWalls-2020-Cyber-Threat-Report.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/02\/Preparing-for-the-Tempest-SonicWalls-2020-Cyber-Threat-Report.png\",\"width\":1120,\"height\":630,\"caption\":\"Preparing for the Tempest: SonicWall\u2019s 2020 Cyber Threat Report\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.firewalls.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Preparing for the Tempest: SonicWall&#8217;s 2020 Cyber Threat Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/firewallscom\",\"https:\/\/x.com\/firewallscom\",\"https:\/\/www.linkedin.com\/company-beta\/1439857\/\",\"https:\/\/www.youtube.com\/user\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\/\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Preparing for the Tempest: SonicWall's 2020 Cyber Threat Report - Firewalls.com","description":"SonicWall's 2020 Cyber Threat Report urges you to watch out for targeted ransomware, IoT malware, & more. But there are also advances to stop cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/","og_locale":"en_US","og_type":"article","og_title":"Preparing for the Tempest: SonicWall's 2020 Cyber Threat Report - Firewalls.com","og_description":"SonicWall's 2020 Cyber Threat Report urges you to watch out for targeted ransomware, IoT malware, & more. But there are also advances to stop cyber threats.","og_url":"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2020-02-28T20:53:13+00:00","article_modified_time":"2025-12-19T20:41:09+00:00","og_image":[{"width":1120,"height":630,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/02\/Preparing-for-the-Tempest-SonicWalls-2020-Cyber-Threat-Report.png","type":"image\/png"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"Preparing for the Tempest: SonicWall&#8217;s 2020 Cyber Threat Report","datePublished":"2020-02-28T20:53:13+00:00","dateModified":"2025-12-19T20:41:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/"},"wordCount":800,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/02\/Preparing-for-the-Tempest-SonicWalls-2020-Cyber-Threat-Report.png","articleSection":["Cybersecurity","SonicWall"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/","url":"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/","name":"Preparing for the Tempest: SonicWall's 2020 Cyber Threat Report - Firewalls.com","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/02\/Preparing-for-the-Tempest-SonicWalls-2020-Cyber-Threat-Report.png","datePublished":"2020-02-28T20:53:13+00:00","dateModified":"2025-12-19T20:41:09+00:00","description":"SonicWall's 2020 Cyber Threat Report urges you to watch out for targeted ransomware, IoT malware, & more. But there are also advances to stop cyber threats.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/02\/Preparing-for-the-Tempest-SonicWalls-2020-Cyber-Threat-Report.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/02\/Preparing-for-the-Tempest-SonicWalls-2020-Cyber-Threat-Report.png","width":1120,"height":630,"caption":"Preparing for the Tempest: SonicWall\u2019s 2020 Cyber Threat Report"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/2020-sonicwall-threat-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Preparing for the Tempest: SonicWall&#8217;s 2020 Cyber Threat Report"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=15166"}],"version-history":[{"count":21,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15166\/revisions"}],"predecessor-version":[{"id":27502,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15166\/revisions\/27502"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/27501"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=15166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=15166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=15166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}