Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
June 26th, 2024June 26th, 2024
Jaqueline SantosBlog

Digital security at risk: Protect your accounts now with two-factor authentication

Two-factor authentication (2FA) is an essential defense against cyber attacks, especially in Brazil, which is a frequent target for hackers. In the second half of 2023, Brazil suffered 357,422 attacks, an increase of 8.86% in relation to the...
Read More
June 19th, 2024June 20th, 2024
Jaqueline SantosBlog

 XDR, EDR and SIEM: what are the main differences between these solutions?  

The evolution of cybersecurity technologies has been essential for dealing with increasingly sophisticated and frequent threats. Effective cybersecurity management includes solutions focused on detecting, monitoring and responding to incidents, such as EDR (Endpoint Detection and...
Read More
May 29, 2024May 29, 2024
Jaqueline SantosBlog

Beware of "Click Here": learn how to identify and avoid online scams 

In the digital age, clicking on a "click here" link can be more dangerous than it seems. These often tempting invitations are commonly used in cyber traps. Often disguised as innocent offers or unmissable opportunities, these links can lead to...
Read More
May 22nd, 202430 de outubro de 2024
Rebecca BezerraBlog

Latin America in the crosshairs of cybercrime: increase in ransomware attacks worries organizations

By Ismael Rocha: In recent months, we have seen a significant drop in the activity of some of the most notorious ransomware groups. Several operations by international authorities have resulted in arrests and the dismantling of these criminals' infrastructures, impacting their ability to operate....
Read More
May 15th, 2024May 15th, 2024
Jaqueline SantosBlog

Improve your risk management: the crucial importance of Business Impact Assessment (BIA) 

In the modern business environment, characterized by its volatility and high connectivity, resilience emerges as a key pillar for the survival and prosperity of companies. Business Impact Assessment (BIA) is therefore an indispensable tool, designed...
Read More
May 8th, 2024December 10th, 2024
Rebecca BezerraBlog

Cactus ransomware uses malware and VPN attacks to infiltrate companies around the world: learn how to protect yourself

By Heimdall: Cactus ransomware is a sophisticated form of malware that infiltrates organizations' systems, encrypting vital data and demanding substantial ransoms for its release. Its spread has been rapid and effective, exploiting vulnerabilities in corporate networks...
Read More
April 30th, 2024December 10th, 2024
Jaqueline SantosBlog

How large companies align cyber security management with their business strategy 

Cyber security has become a central part of the business strategy of large companies. In the current scenario, marked by rapid digitalization, robust cyber security management is fundamental to business operations, reputation and competitiveness. In this article,...
Read More
April 24, 2024April 24, 2024
Jaqueline SantosBlog

Your Smart TV could be a gateway for cybercriminals: learn how to protect yourself  

Em busca de inovação e conveniência, residências, comércios e escritórios corporativos estão cada vez mais equipados com o que há de mais avançado em tecnologia.   Entre os dispositivos que redefinem nosso cotidiano, as Smart TVs se destacam como centros multimídia,…
Read More
April 3rd, 2024December 10th, 2024
Rebecca BezerraBlog

CloAk ransomware encrypts data and operates with other groups to pressure ransom payments

By Heimdall: The CloAk Ransomware, which emerged between late 2022 and early 2023, represents a relatively new group of ransomware that has stood out mainly for its activities in Europe, with a special focus on Germany. This malware...
Read More
March 27th, 202430 de outubro de 2024
Jaqueline SantosBlog

How PESI turns information security into a strategic advantage 

In the modern corporate world, where online transactions have become the heart of business operations, digitalization is not just a trend, but a consolidated reality. According to a study by the National Confederation of Industry (CNI), 70% of...
Read More
1 … 3 4 5 6 7 … 24

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.

Novidades sobre a nossa estrutura de negócios

Olá, Informamos sobre uma recente movimentação estratégica. A ISH Tecnologia passou por um processo de cisão, dando origem à Vision Cybersecurity. As empresas iniciam uma nova fase, com uma estrutura especializada para diferentes contextos de atuação em cibersegurança.
ISH Public Sector Soluções para infraestrutura crítica, soberania digital e ambientes regulados, exclusivas para o setor público. Access
Vision Empresas Privadas Inteligência, antecipação e proteção exclusivamente para empresas privadas e ambientes digitais críticos. Access