Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
August 17th, 2022December 10th, 2024
Jaqueline SantosBlog

Phishing attacks are now targeting social networks and you could be a victim 

Social media platforms are constant targets for phishing campaigns. Proof of this is the number of attacks against these services, which has risen sharply, from 8.5% of all attacks in the fourth quarter of 2021 to 12.5% in the first...
Read More
August 10th, 2022December 10th, 2024
Jessica TrucatBlog

Find out about the top cyber threats affecting Brazil in the last month and how to protect yourself

By Bruno Odon: Most of the time, the main vector for the spread of a cyber threat is the user's own computer. Whether through their own actions, such as accessing a fake link, or through settings that don't depend on them,...
Read More
August 3rd, 2022December 10th, 2024
Jaqueline SantosBlog

Deepfake: technology threatens companies' cyber security

As technology advances and offers countless possibilities for all business sectors, cybercriminals are also taking advantage of its evolution to improve their attack strategies. This is the case with Deepfake, a threat that uses...
Read More
July 27th, 2022December 10th, 2024
Jaqueline SantosBlog

Incident response: what you need to know to support company protection initiatives

For a company to protect itself against cyber attacks, it needs to have a robust security policy, investments in technological resources and specialized manpower, as well as ensuring that employees are trained in security awareness. But to...
Read More
July 21, 2022December 10th, 2024
Jaqueline SantosBlog

Reducing costs, minimizing risks and increasing security: the role of the virtual SOC for companies 

The need for a reliable and effective security infrastructure in companies is becoming increasingly urgent. Proof of this is the growth of the security operations center as a service market, which showed a CAGR of 15.7% during the...
Read More
July 14th, 2022December 10th, 2024
Jaqueline SantosBlog

The demand for ransomware as a service (RaaS) will increase and your company could be the next victim

Ransomware attacks are becoming increasingly sophisticated and complex, even evolving into an on-demand service (RaaS) among digital criminals, facilitating attacks and invasions of data systems and damaging thousands of companies every year. O...
Read More
July 6th, 2022December 10th, 2024
Jaqueline SantosBlog, Business, Security

CXOs: Learn how they can combat risks and improve cyber security today

2021 was an overwhelming year for cybersecurity. In this period alone, the average total global cost of a ransomware breach was US$4.62 million according to IBM studies, and this trend will continue in the coming years....
Read More
June 30th, 2022December 10th, 2024
Jessica TrucatBlog

Accepting the risk of the cloud: the first step to making it more secure

Faced with the need to create and develop systems that help organizations' processes, infrastructure and business, cloud computing and virtualization are now part of most companies' reality. The downside of these technologies and...
Read More
June 22nd, 2022December 10th, 2024
Jessica TrucatBlog

Lockbit Ransomware: Malicious software is the fastest and worries experts

The LockBit ransomware is one of the most recent threats, it was seen in 2021 and came back with a bang in the first half of this year, haunting organizations all over the world, especially in Brazil. With speeds 86% faster than...
Read More
June 8th, 2022December 10th, 2024
Jessica TrucatBlog, Reviews, Security, Trends

Crush or Hacker? This Valentine's Day be careful not to fall for scams

With the evolution of technology, cyber scams take on new forms and use the tools available - such as cryptocurrencies, social networks and even dating apps. With Valentine's Day approaching, it's important to pay extra attention to...
Read More
1 … 11 12 13 14 15 … 24

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.