Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
May 14th, 2020December 10th, 2024
Jaqueline SantosBlog, Insights, On-the-go, Trends

In the crisis, the cybersecurity market responds. Hiring.

ISH Tecnologia has open positions in various sectors. With the quarantine, we have adapted the entire selection and hiring process to online. It seems strange to talk about hiring when the crisis triggered by COVID-19 has had such harsh effects...
Read More
May 12th, 2020December 10th, 2024
Jaqueline SantosBlog, On-the-go, Trends

The first ransomware appeared in 1980 and it's still on the rise. Why?

Ransomware attacks have increased. Cases in which hackers hijack information from companies and demand a ransom payment to return it, often extorting business owners with threats of data exposure. Part of the growth is explained by the pandemic. Since January...
Read More
April 24, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

3 common company oversights that compromise data security

Creating and maintaining information protection continues to be a pain for many companies of all sizes and industries. It's understandable, after all, without proper planning, sealing all the potential loopholes to prevent cyber attacks can seem like a...
Read More
April 23, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

The use of hot topics in phishing

In March, the number of attacks increased by 140% compared to the monthly average recorded by ISH. The company's team also carried out a survey to find out how many new threats linked to the terms "coronavirus" and "COVID-19"...
Read More
April 23, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

Human centric: a security concept without borders

In crises such as the one we are experiencing with the coronavirus, technology makes it possible for companies around the world to continue their business with remote access for employees. At the same time, there is a new challenge in the traditional way of...
Read More
How the coronavirus triggered hacker attacks in Brazil
April 23, 2020December 10th, 2024
Jaqueline SantosBlog, Geral, On-the-go

How the coronavirus triggered hacker attacks in Brazil

Almost 60% of Brazilians are staying at home, and social isolation has grown in recent weeks, as shown by data from In Loco, a geolocation technology company whose software is embedded in more than 60 million cell phones. It's possible...
Read More
April 23, 2020December 10th, 2024
Jaqueline SantosBlog, Insights

The first SOC was born with the first hacker

Have you ever wondered how long Information Security has been a challenge for companies? In a hyper-connected world, protection is a constant concern. And this has been true for many, many years, since...
Read More
April 23, 2020December 10th, 2024
Jaqueline SantosBlog, Insights

Could the internet collapse during the pandemic?

We've known for some time that the internet has become essential to the modern world. But I don't think we've ever really experienced how important the web is to our daily lives. This notion became clear after...
Read More
zoom case who uses it is unprotected
April 16th, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, Reviews

Zoom case - are users unprotected?

Nas últimas semanas, especialistas em segurança da informação começaram a descobrir uma série de brechas e falhas na plataforma que levantaram dúvidas em torno do Zoom, como explorei neste texto aqui no blog. As ações da empresa, que tinham subido…
Read More
Zoom case, part 1 - the price of simplicity
April 6th, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Reviews

Zoom case - the price of simplicity

O Zoom, plataforma de reuniões e videoconferências, caiu do posto de queridinha das pessoas que estão em isolamento social depois de ter passado por diversos escândalos de privacidade. Várias notícias foram veiculadas dizendo que o Zoom é inseguro exatamente no…
Read More
1 … 21 22 23 24

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.