{"id":6051,"date":"2022-04-04T13:02:06","date_gmt":"2022-04-04T13:02:06","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=6051"},"modified":"2022-04-04T13:02:06","modified_gmt":"2022-04-04T13:02:06","slug":"the-2022-thales-data-threat-report-global-edition","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/","title":{"rendered":"The\u00a02022 Thales Data Threat Report &#8211; Global Edition"},"content":{"rendered":"<p><iframe width=\"560\" height=\"315\" src=\"\/\/www.youtube.com\/embed\/e47BcOQDoEs\" frameborder=\"0\" allowfullscreen><\/iframe><br \/>\n    The pandemic, accelerating cloud adoption and the proliferation of ransomware attacks continue to have a major impact on the data security operations and strategies for organizations around the world.<\/p>\n<p>The truth is, many organizations are unprepared to meet the challenges of advanced security threats, ransomware, accelerating cloud transformation and hybrid work.<\/p>\n<p>Check out this brief video for insights garnered from nearly 2,800 of your industry-peers about the increasingly complex security threats facing businesses in 2022. <\/p>\n<p>Reach out to Abrahams Consulting LLC to discuss getting started with Thales.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chances are that over the last couple of years, the pandemic, accelerating cloud adoption, ever-increasing ransomware attacks and other cyberthreats have forced your organization to re-evaluate your IT infrastructure and cybersecurity posture.<\/p>\n<p>Watch this brief @Thales video for an overview of what nearly 2,800 of your industry-peers around the world had to say about the negative impact of data sprawl, security breaches, increasingly complex security threats and remote working on their organization&#8217;s data security. <\/p>\n<p>We&#8217;d love to hear from you, so drop us a comment and let us know your biggest operational or security challenge.<\/p>\n","protected":false},"author":2,"featured_media":6050,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1138,14,3,1136],"tags":[],"class_list":["post-6051","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciphertrust","category-cloud","category-data-security","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The\u00a02022 Thales Data Threat Report - Global Edition - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The\u00a02022 Thales Data Threat Report - Global Edition - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Chances are that over the last couple of years, the pandemic, accelerating cloud adoption, ever-increasing ransomware attacks and other cyberthreats have forced your organization to re-evaluate your IT infrastructure and cybersecurity posture. Watch this brief @Thales video for an overview of what nearly 2,800 of your industry-peers around the world had to say about the negative impact of data sprawl, security breaches, increasingly complex security threats and remote working on their organization&#039;s data security.  We&#039;d love to hear from you, so drop us a comment and let us know your biggest operational or security challenge.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-04T13:02:06+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"The\u00a02022 Thales Data Threat Report &#8211; Global Edition\",\"datePublished\":\"2022-04-04T13:02:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/\"},\"wordCount\":93,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/04\/maxresdefault.jpg\",\"articleSection\":[\"CipherTrust\",\"Cloud\",\"Data Security\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/\",\"name\":\"The\u00a02022 Thales Data Threat Report - Global Edition - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/04\/maxresdefault.jpg\",\"datePublished\":\"2022-04-04T13:02:06+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/04\/maxresdefault.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/04\/maxresdefault.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The\u00a02022 Thales Data Threat Report &#8211; Global Edition\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The\u00a02022 Thales Data Threat Report - Global Edition - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/","og_locale":"en_US","og_type":"article","og_title":"The\u00a02022 Thales Data Threat Report - Global Edition - TechTonic Times","og_description":"Chances are that over the last couple of years, the pandemic, accelerating cloud adoption, ever-increasing ransomware attacks and other cyberthreats have forced your organization to re-evaluate your IT infrastructure and cybersecurity posture. Watch this brief @Thales video for an overview of what nearly 2,800 of your industry-peers around the world had to say about the negative impact of data sprawl, security breaches, increasingly complex security threats and remote working on their organization's data security.  We'd love to hear from you, so drop us a comment and let us know your biggest operational or security challenge.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/","og_site_name":"TechTonic Times","article_published_time":"2022-04-04T13:02:06+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"The\u00a02022 Thales Data Threat Report &#8211; Global Edition","datePublished":"2022-04-04T13:02:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/"},"wordCount":93,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/04\/maxresdefault.jpg","articleSection":["CipherTrust","Cloud","Data Security","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/","name":"The\u00a02022 Thales Data Threat Report - Global Edition - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/04\/maxresdefault.jpg","datePublished":"2022-04-04T13:02:06+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/04\/maxresdefault.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/04\/maxresdefault.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The\u00a02022 Thales Data Threat Report &#8211; Global Edition"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6051","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=6051"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6051\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/6050"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=6051"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=6051"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=6051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}