Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
June 21st, 2023December 10th, 2024
Rebecca BezerraBlog

Cyber attacks and data theft: here's how to protect your company

By Caique Barqueta: Ransomware attacks have become increasingly sophisticated. Cybercriminals are employing other extortion tactics, such as stealing information before encryption is carried out, acting as a "double extortion", since the actors demand...
Read More
May 11, 2023December 10th, 2024
Jaqueline SantosBlog

Less costs and more performance: learn how GRC can revolutionize your IT 

GRC (Governance, Risk and Compliance) solutions allow for a clearer view of all the company's relevant information, integrating sectors, improving communication and increasing employee productivity.According to a study carried out by Bravo Research, it is expected...
Read More
March 22nd, 2023December 10th, 2024
Rebecca BezerraBlog

Quanto custa o acesso à sua empresa? Identificamos operação em conjunto de 4 grupos de Ransomware

Por Caique Barqueta: Os custos de recuperação após um vazamento de dados pode ser mais caro do que o investimento em proteção e cibersegurança. Uma pesquisa mostra que o valor médio de um incidente é de R$ 23 milhões e,…
Read More
February 6th, 2023December 10th, 2024
Jessica TrucatBlog

We warn of large-scale attacks against VMware ESXi Servers

By Caique Barqueta: Thousands of servers around the world are being hit by a large-scale hacker attack that demands Bitcoin for ransom. Countries such as Italy, France, Finland, the United States and Canada are being attacked. In France, for example, the...
Read More
11 de janeiro de 2023December 10th, 2024
Jessica TrucatBlog

Conscientização dos usuários: o elo mais fraco da segurança cibernética 

Ao examinar um vazamento de dados, quase sempre é possível apontar práticas de segurança inadequadas dos usuários, e essa prática deve continuar em 2023.   Imagine a seguinte situação: você está no trabalho e recebe uma mensagem na sua caixa de…
Read More
4 de janeiro de 2023December 10th, 2024
Jessica TrucatBlog

4 principais tendências de phishing para ficar de olho em 2023  

Equipes de TI e de cibersegurança vêm enfrentando diversas mudanças no ambiente cibernético, em intervalos cada vez mais curtos.  E com a chegada de mais um ano, é hora de avaliar as estratégias e reestruturar as ações de segurança digital, já…
Read More
December 13th, 2022December 13th, 2022
Jessica TrucatBlog

Ransomware as a Service (RaaS): the subscription service that most affects companies

By Caique Barqueta: Ransomware attacks are constantly on the rise. This increase is due to a new sales model, known as "Ransomware-as-a-Service" (RaaS). This model is subscription-based and allows affiliates to...
Read More
30 de novembro de 2022December 10th, 2024
Jessica TrucatBlog

Com o crescimento da IoT, as empresas precisam garantir visibilidade e segurança 

Apesar de alguns impactos de escassez de chips e interrupções da cadeia de suprimentos que desaceleraram a recuperação do mercado da Internet das coisas (IoT), a previsão de crescimento para o setor continua otimista devido a uma demanda crescente.  Em…
Read More
November 17th, 2022December 10th, 2024
Jessica TrucatBlog

Prilex Group is back: malware collects bank card data to carry out scams

By Caique Barqueta: Brazil is among the countries that suffer the most cyber attacks in the world, a scenario that has worsened after the pandemic and the global moment related to the armed conflict between Ukraine and Russia. Being up to date on...
Read More
September 5th, 2022December 10th, 2024
Jessica TrucatBlog

Zero Trust: a journey to risk management for access credentials

By Marcelo Mantovani: Today's cybercriminals are always looking for new ways to enhance their attacks, stealing access credentials, escalating privileges and moving laterally in corporate networks to wreak havoc on organizations. In recent years, for example, ransomware...
Read More
1 2 3 4 5

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.