Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
24 de setembro de 202524 de setembro de 2025
Giuliana Dias GomesBlog

ISH Tecnologia se destaca no Mind The Sec 2025 com palestras e estande interativo

A participação da ISH no Mind The Sec 2025 uniu relacionamento e inovação em um estande que foi ponto de encontro para o mercado de cibersegurança A ISH marcou presença no Mind The Sec 2025, maior evento de cibersegurança da…
Read More
27 de agosto de 202527 de agosto de 2025
Nathalia ZagoBlog

Quais são as maiores preocupações dos executivos sobre ameaças cibernéticas?

À medida que avançamos para o segundo semestre de 2025, as lideranças empresariais enfrentam um cenário cibernético que continua evoluindo em sofisticação e impacto. Segundo estudos, os ataques mais temidos pelas organizações são também os que revelam maior sensação de…
Read More
20 de agosto de 202520 de agosto de 2025
Giuliana Dias GomesBlog

ISH é reconhecida pela 6ª vez consecutiva como líder em cibersegurança pelo ISG Provider Lens™ 

Empresa conquista posição de destaque em todos os quadrantes que foi indicada, reafirmando sua liderança no setor de cibersegurança no Brasil  Pelo sexto ano consecutivo, a ISH Tecnologia foi reconhecida como líder em cibersegurança no relatório ISG Provider Lens™ Cybersecurity…
Read More
July 23, 2025July 23, 2025
Rebecca BezerraBlog

Privilege control at risk: understand the fake folder trick and how to protect yourself

By Cleriston Freitas: Windows User Account Control (UAC) is an essential layer of protection, requiring your permission for actions that modify the system. But what if an attacker could bypass this barrier without you noticing?...
Read More
July 16, 2025July 16, 2025
Nathalia ZagoBlog

GenAI in the multi-cloud: how artificial intelligence increases cyber risks and requires automated defenses

While the market is dazzled by the power of generative AI, which is dominating corporate initiatives, cybersecurity leaders face a complex scenario of new digital threats. A survey reveals that 68% of Brazilian CISOs point out that...
Read More
June 25th, 2025
Rebecca BezerraBlog

From login to invasion: how Port 22 became a global target and what to do to prevent attacks

By Ismael Rocha and Thiago Cesar: Port 22 may be the weakest link in your digital infrastructure. The SSH (Secure Shell) protocol is essential for secure remote access to servers and networked devices. However, when...
Read More
June 4, 2025June 4, 2025
Nathalia ZagoBlog

Malicious apps: understand the risks and how to protect your devices

A massive campaign of malicious apps caught the attention of the cybersecurity market in February 2025: more than 60 million global downloads were attributed to apps disguised as simple utilities, but which hid malicious code to display advertisements...
Read More
May 13th, 2025May 13th, 2025
Rebecca BezerraBlog

Cybersecurity in healthcare: how unprotected connectivity puts patients at risk

By Ismael Rocha and Thiago Cesar: Cybersecurity in healthcare is an urgent priority in the age of digital transformation. Today, it is possible to send tests in real time, monitor patients remotely and use intelligent machines for highly precise treatments. However,...
Read More
May 6th, 2025May 6th, 2025
Nathalia ZagoBlog

What a VPN really protects - and why it's not enough for your digital security

With the growth of remote and hybrid working, corporate VPNs have become one of the main tools for guaranteeing secure remote access to companies' internal systems. A report shows that 93% of organizations around the world use VPNs...
Read More
April 15th, 2025April 15th, 2025
Rebecca BezerraBlog

How Akira ransomware uses double extortion, RaaS and psychological tactics - and how to defend yourself

By Ismael Rocha, Ícaro Cesar and Bryenne Soares: With the advance of increasingly structured cybercriminal groups, such as the one responsible for the Akira ransomware, understanding how these threats operate has become essential for companies looking to protect their data and...
Read More
1 2 3 4 … 24

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.