{"id":102501,"date":"2025-02-05T16:11:59","date_gmt":"2025-02-05T08:11:59","guid":{"rendered":"https:\/\/version-2.com\/?p=102501"},"modified":"2025-01-24T16:14:07","modified_gmt":"2025-01-24T08:14:07","slug":"our-teams-hot-takes-on-cybersecurity-in-2025","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2025\/02\/our-teams-hot-takes-on-cybersecurity-in-2025\/","title":{"rendered":"Our team\u2019s hot takes on cybersecurity in 2025"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"102501\" class=\"elementor elementor-102501\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/2560bdde4f\/sneak-peak-2025-1062x597-1.png\/m\/1080x0\/filters:quality(60):format(avif)\" width=\"1080\" height=\"607\" \/><\/p><div class=\"richtext\"><h3 class=\"heading-lg text-primary\"><b>2025 is here\u2014what should we expect?<\/b><\/h3><p class=\"body-md text-primary\">As the new year kicks off, it\u2019s only natural to start thinking about what\u2019s ahead and make predictions. And so, we reached out to a few top experts on the NordPass team to find out what they think is coming in cybersecurity in 2025. The answers we got were not only varied and engaging but also unexpected and, at times, controversial. Here\u2019s what they had to say:<\/p><h4 class=\"heading-md text-primary\"><b>Prediction #1\u2014Jonas Karklys, CEO of NordPass<\/b><\/h4><h3 class=\"heading-lg text-primary\"><b>\u201cCybersecurity tools like password managers will help people reduce digital anxiety.\u201d<\/b><\/h3><p class=\"body-md text-primary\"><i>\u201cWith AI adoption booming, fake news spreading like wildfire, and cyber threats becoming more sophisticated by the day, it\u2019s no surprise that people feel overwhelmed and vulnerable online. The good news? Cybersecurity tools, like NordPass, are already providing significant support, making it much easier to manage accounts, protect sensitive data, and stay in control of who has access to their information.<\/i><\/p><p class=\"body-md text-primary\"><i>As these solutions continue to evolve to tackle the latest challenges head-on, like AI-powered phishing or 5G network vulnerabilities, they\u2019ll empower people to face the digital world with more confidence and truly take charge of their online lives. The digital world should be a place where everyone can be themselves and realize their potential\u2014not a place where they\u2019re constantly worried about what\u2019s around every corner. Let\u2019s make that happen.\u201d<\/i><\/p><h4 class=\"heading-md text-primary\"><b>Prediction #2\u2014Marvin Petzolt, Lead Security Architect at NordPass<\/b><\/h4><h3 class=\"heading-lg text-primary\"><b>\u201cAI will make scams much more realistic.\u201d<\/b><\/h3><p class=\"body-md text-primary\"><i>\u201cIn recent years, chatbots have become more and more lifelike, and now, the new models are even adding emotions to their responses. Because of this, I predict that, in 2025, we\u2019ll see a rise in AI-powered phishing and scam attacks. AI makes it incredibly easy to pull information from social media that criminals can use to create super convincing scams on a much larger scale.<\/i><\/p><p class=\"body-md text-primary\"><i>Picture this: you get a phone call, and the voice on the other end sounds just like someone you know\u2014maybe a relative or an old friend. They say they urgently need help: emergency funds, rent money, or money for medical bills. These kinds of scams will start happening more often, and without the right security measures, some people could easily be fooled on a level we\u2019ve never seen before.<\/i><\/p><p class=\"body-md text-primary\"><i>That\u2019s why it\u2019s going to be more important than ever to be cautious about what we share online\u2014keeping it private and to a minimum.\u201d<\/i><\/p><h4 class=\"heading-md text-primary\"><b>Prediction #3\u2014Karolis Arbaciauskas, Head of Product &amp; Business Development at NordPass<\/b><\/h4><h3 class=\"heading-lg text-primary\"><b>\u201cPasswords will endure and grow in volume.\u201d<\/b><\/h3><p class=\"body-md text-primary\"><i>\u201cWhile passwordless authentication methods, like passkeys, are starting to gain momentum, it\u2019ll take some time for them to catch on across consumer and shadow IT sectors. So, my prediction for 2025 is that passwords will still play a major role in authentication.<\/i><\/p><p class=\"body-md text-primary\"><i>Before the COVID-19 pandemic, most people had around 70 passwords. But with remote work becoming the norm and more people using collaboration and streaming services, that number went up to about 170 by 2024. Looking ahead to 2025, with more AI-driven tools requiring authentication, we\u2019re likely to hit an average of 190 passwords per user. Unfortunately, it also means that weak, reused, or stolen passwords will still make up around 70\u201380% of cyberattacks\u2014but even that could rise in 2025. The fact remains that this growing number of passwords highlights the need for better password management for all of us.\u201d<\/i><\/p><h4 class=\"heading-md text-primary\"><b>Prediction #4\u2014Jolanta Balciene, Head of Product Marketing at NordPass<\/b><\/h4><h3 class=\"heading-lg text-primary\"><b>\u201cCybersecurity will be seen even more as a business differentiator.\u201d<\/b><\/h3><p class=\"body-md text-primary\"><i>\u201cNo matter which cybersecurity market report you look at\u2014whether it\u2019s from Gartner, IBM, or McKinsey\u2014you\u2019ll see that this sector is growing at a very high speed. Due to the increasing number of cyber threats, more companies are now investing in cybersecurity products and services to protect their IT infrastructures and their customers&#8217; data. And so, I believe that in 2025, cybersecurity will stand out even more as a key business asset.<\/i><\/p><p class=\"body-md text-primary\"><i>What I mean by that is that organizations all around the world will not only invest more in cybersecurity tools to defend themselves against threats like AI-powered phishing, ransomware, and malware, but they will also position cybersecurity itself as a key value proposition. As a result, customers will more actively seek out companies that have known certifications and cybersecurity measures in place\u2014simply to make sure they are interacting with brands that prioritize their security.\u201d<\/i><\/p><h4 class=\"heading-md text-primary\"><b>Prediction #5\u2014Ieva Soblickaite, CPO at NordPass<\/b><\/h4><h3 class=\"heading-lg text-primary\"><b>\u201cPolitical tensions may impact how cybersecurity is managed.\u201d<\/b><\/h3><p class=\"body-md text-primary\"><i>\u201cThe relationship between cybersecurity and the global political climate has definitely gotten more complicated over the last few years. Many governments are struggling to match the pace of technological growth, often falling behind when it comes to implementing laws that protect digital infrastructure\u2014which can leave critical systems exposed.<\/i><\/p><p class=\"body-md text-primary\"><i>At the same time, the rise of controversial political powers is raising concerns about things like digital surveillance, censorship, and information manipulation. There\u2019s a fear they might try to control internet access, limit free speech, and use cyber tools to go after their opposition.<\/i><\/p><p class=\"body-md text-primary\"><i>On top of that, rising geopolitical tensions and military conflicts are making things worse, with some governments using cyberattacks as part of their military strategy. As a result, we\u2019re now seeing more sophisticated attacks aimed at critical infrastructures and democratic organizations, which shows that cybersecurity isn\u2019t just a technical challenge anymore, but a major issue in global diplomacy.<\/i><\/p><p class=\"body-md text-primary\"><i>So, in 2025, I\u2019m afraid we\u2019ll likely see these problems grow. We\u2019ll face more risks to critical systems, more manipulation of information, and more cyberattacks targeting democratic institutions. And while we do have some data privacy regulations in place right now, those could change at any time. Therefore, it\u2019s in each of us to take steps to protect our data and minimize the risk of it being used against us.\u201d<\/i><\/p><h4 class=\"heading-md text-primary\"><b>Prediction #6\u2014Ignas Valancius, Head of Engineering at NordPass<\/b><\/h4><h3 class=\"heading-lg text-primary\"><b>\u201cThe time to crack passwords will be even shorter.\u201d<\/b><\/h3><p class=\"body-md text-primary\"><i>\u201cI\u2019m sure AI has come up in a lot of predictions, and mine won\u2019t be any different, so here goes: in 2025, the time it takes to guess, social engineer, or brute force passwords is going to drop dramatically, due to AI tools in the hands of cybercriminals.<\/i><\/p><p class=\"body-md text-primary\"><i>Based on our own \u201cTop 200 Most Common Passwords\u201d research, we know that simple passwords like &#8220;123456&#8221; or &#8220;qwerty&#8221; can be cracked in under a second. The more complex the password, the longer it takes, but with the increasing computing power behind AI, hackers will be able to try many more combinations in less time. So even more complex passwords will be cracked faster. I\u2019m not saying that super long, random 18-character passwords are at immediate risk, but shorter ones? They could be in danger.<\/i><\/p><p class=\"body-md text-primary\"><i>And let\u2019s not forget that the more people use AI, the more it learns about them. This is to say that many people already share sensitive data with \u201cfree\u201d AI tools to get things done, but here\u2019s the catch\u2014nothing\u2019s really \u201cfree.\u201d That data gets used for training, tracking, and, even worse, creating detailed profiles for more targeted attacks. So, as we move forward, it\u2019s crucial to keep our passwords long and strong, and tread carefully as we interact with AI tools.\u201d<\/i><\/p><h4 class=\"heading-md text-primary\"><b>Prediction #7\u2014Jonas Karklys, CEO of NordPass<\/b><\/h4><h3 class=\"heading-lg text-primary\"><b>\u201cPasskeys will get more recognition.\u201d<\/b><\/h3><p class=\"body-md text-primary\"><i>\u201cIn 2024, we saw passkeys get massive support from major players like Google, Amazon, PayPal, and Facebook, who backed them as the next step beyond traditional passwords. Looking at the adoption rate, I believe that in 2025, even more companies will jump on the passwordless bandwagon, making it easier for their users to adopt passkeys across their online accounts.<\/i><\/p><p class=\"body-md text-primary\"><i>The reasons are simple: passkeys offer better security, helping to prevent many common incidents, and they\u2019re much easier to use than typing out long, complex passwords. Today, it\u2019s all about security and convenience, and if there\u2019s a solution that provides both, it\u2019s a winner. One thing\u2019s for certain\u2014NordPass will be there not only to continue supporting passkeys but also to help other organizations adopt passwordless technology through our services like <\/i><a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/passwordless-authentication\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to \/passwordless-authentication\"><i>Authopia<\/i><\/a><i>.\u201d<\/i><\/p><h3 class=\"heading-lg text-primary\"><b>Summary<\/b><\/h3><p class=\"body-md text-primary\">The NordPass team\u2019s predictions for 2025 highlight both the challenges and opportunities of cybersecurity, showing just how crucial it will be for both individuals and businesses. While we\u2019d all love to see the threats disappear, it\u2019s certain they\u2019ll only become more complex. That means it\u2019s up to us to step up our game and protect our digital valuables.<\/p><p class=\"body-md text-primary\">If you&#8217;re looking for a way to do that, we encourage you to try <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/business-password-manager\/\" data-ga-slug=\"Link to \/business-password-manager\">NordPass<\/a> and see how it can level up your cybersecurity and overall online experience. With the <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/business-free-trial\/\" data-ga-slug=\"Link to \/business-free-trial\">free 14-day trial<\/a>, you can get a good sense of how it\u2019ll keep your data safe in 2025 and beyond. The choice is yours!<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>2025 is here\u2014what should we expect? As the new year kic [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1129,1305,61],"tags":[974,1077,1131],"class_list":["post-102501","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-nordpass","category-1305","category-press-release","tag-nord-security","tag-1077","tag-nordpass"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Our team\u2019s hot takes on cybersecurity in 2025 - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/cybersecurity-trends-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Our team\u2019s hot takes on cybersecurity in 2025 - Version 2\" \/>\n<meta property=\"og:description\" content=\"2025 is here\u2014what should we expect? As the new year kic [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/cybersecurity-trends-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-05T08:11:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/2560bdde4f\/sneak-peak-2025-1062x597-1.png\/m\/1080x0\/filters:quality(60):format(avif)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-trends-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/our-teams-hot-takes-on-cybersecurity-in-2025\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Our team\u2019s hot takes on cybersecurity in 2025\",\"datePublished\":\"2025-02-05T08:11:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/our-teams-hot-takes-on-cybersecurity-in-2025\\\/\"},\"wordCount\":1480,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-trends-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/2560bdde4f\\\/sneak-peak-2025-1062x597-1.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"keywords\":[\"Nord Security\",\"2025\",\"NordPass\"],\"articleSection\":[\"Nord Security\",\"NordPass\",\"2025\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/our-teams-hot-takes-on-cybersecurity-in-2025\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-trends-2025\\\/\",\"name\":\"Our team\u2019s hot takes on cybersecurity in 2025 - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-trends-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-trends-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/2560bdde4f\\\/sneak-peak-2025-1062x597-1.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"datePublished\":\"2025-02-05T08:11:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-trends-2025\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-trends-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-trends-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/2560bdde4f\\\/sneak-peak-2025-1062x597-1.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/2560bdde4f\\\/sneak-peak-2025-1062x597-1.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-trends-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our team\u2019s hot takes on cybersecurity in 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Our team\u2019s hot takes on cybersecurity in 2025 - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/cybersecurity-trends-2025\/","og_locale":"en_US","og_type":"article","og_title":"Our team\u2019s hot takes on cybersecurity in 2025 - Version 2","og_description":"2025 is here\u2014what should we expect? As the new year kic [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/cybersecurity-trends-2025\/","og_site_name":"Version 2","article_published_time":"2025-02-05T08:11:59+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/2560bdde4f\/sneak-peak-2025-1062x597-1.png\/m\/1080x0\/filters:quality(60):format(avif)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/cybersecurity-trends-2025\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/02\/our-teams-hot-takes-on-cybersecurity-in-2025\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Our team\u2019s hot takes on cybersecurity in 2025","datePublished":"2025-02-05T08:11:59+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/02\/our-teams-hot-takes-on-cybersecurity-in-2025\/"},"wordCount":1480,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/cybersecurity-trends-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/2560bdde4f\/sneak-peak-2025-1062x597-1.png\/m\/1080x0\/filters:quality(60):format(avif)","keywords":["Nord Security","2025","NordPass"],"articleSection":["Nord Security","NordPass","2025","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/02\/our-teams-hot-takes-on-cybersecurity-in-2025\/","url":"https:\/\/nordpass.com\/blog\/cybersecurity-trends-2025\/","name":"Our team\u2019s hot takes on cybersecurity in 2025 - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/cybersecurity-trends-2025\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/cybersecurity-trends-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/2560bdde4f\/sneak-peak-2025-1062x597-1.png\/m\/1080x0\/filters:quality(60):format(avif)","datePublished":"2025-02-05T08:11:59+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/cybersecurity-trends-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/cybersecurity-trends-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordpass.com\/blog\/cybersecurity-trends-2025\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/2560bdde4f\/sneak-peak-2025-1062x597-1.png\/m\/1080x0\/filters:quality(60):format(avif)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/2560bdde4f\/sneak-peak-2025-1062x597-1.png\/m\/1080x0\/filters:quality(60):format(avif)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/cybersecurity-trends-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Our team\u2019s hot takes on cybersecurity in 2025"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-qFf","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/102501","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=102501"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/102501\/revisions"}],"predecessor-version":[{"id":102508,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/102501\/revisions\/102508"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=102501"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=102501"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=102501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}