Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
protects digital assets
April 15th, 2021December 10th, 2024
Jaqueline SantosBlog, On-the-go, Trends

DRP - the technology that protects digital assets wherever exposure may occur

The search for DRP solutions, the acronym for Digital Risk Protection, has grown at the same rate as cases of data leakage and damage to the reputation of brands that have had information stolen in criminal actions. Because the...
Read More
ongoing phishing campaign using Trickbot
April 8th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

We have identified a scam using Trickbot and here are our recommendations

ISH's threat intelligence team has detected an ongoing phishing campaign using Trickbot, a sophisticated Trojan first identified in 2016 and constantly updated. Trickbot is used to steal information from...
Read More
Phishing scam
March 25th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider

We've detected a phishing scam that has already stolen 1 million pieces of data; find out how to protect yourself

ISH Tecnologia's threat intelligence team has detected the leak of almost 1 million passwords collected in a spear phishing scam. The initial infection vector is a fake billing email from major mobile operators...
Read More
secure cloud
March 18th, 2021December 10th, 2024
Jaqueline SantosBlog

Assuming that the cloud provider is also guaranteeing protection is a mistake

There are many reasons why companies are using cloud platforms. Outsourcing to the cloud adds scalability, efficiency and reliability, while reducing workloads for IT teams. However, there is a point...
Read More
Costs of ransomware attack
March 11, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

This is one of the biggest costs in the event of a ransomware attack

Companies that are victims of a ransomware attack can take days, sometimes even weeks, to restore their systems after an event. And downtime can be very expensive. If services and operations are interrupted, there are many...
Read More
Cost of a data breach
March 3rd, 2021December 10th, 2024
Jaqueline SantosBlog, General, Insider, Trends

What is the cost of a data breach?

Hackers broke into the computer system of Norsk Hydro, a global aluminum producer, in 2019. Once they got a foothold in the company's environment, the criminals spent weeks exploring the IT systems looking for more vulnerabilities. When they finally...
Read More
Data security
February 24, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Trends

Data leaks represent a major security challenge today. Why?

In a reality where there is a veritable explosion of corporate information, companies need to have a thorough understanding of the risks they run and the data security this requires. Today, data are digital treasures coveted by spies...
Read More
January 15th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, Offline, Trends

The pandemic has changed digital security priorities

In the migration to the home office, life merged with work once and for all and personal devices became widely used for work. Videoconferencing tools have become the main environment for meetings, both for...
Read More
The key to security is threat response time
January 5th, 2021December 10th, 2024
Jaqueline SantosBlog, Trends

The key to containing attacks is the speed of the response time to threats

The impact of a cyber attack is measured by how long an attacker remains in a company's systems unnoticed. The longer inside an environment, the more access to critical systems. Therefore, the key to containing attacks...
Read More
we still need to talk about combating ransomware
December 23, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Offline, On-the-go, Trends

What we still need to say about combating ransomware in companies

Yes, we still need to talk about fighting ransomware in companies. Because the creators and operators of ransomware were the pioneers in creating new ways to avoid endpoint security products in 2020. And they have creativity and versatility in their design...
Read More
1 … 17 18 19 20 21 … 24

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.