Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
Colonial Pipeline case
May 19th, 2021December 10th, 2024
Jaqueline SantosBlog, General, Insider, Trends

The Colonial Pipeline case shows that ransomware is more sophisticated; so is protecting yourself from it

When a giant like Colonial Pipeline, the largest oil pipeline operator in the United States, falls victim to ransomware with such catastrophic results, even triggering a crisis in the fuel market, the warning goes out to all other companies, from...
Read More
false sense of security
April 29, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, On-the-go, Trends

The false sense of security - the greatest vulnerability

The ability of companies to adapt is as crucial to a business as their ability to generate profit. To do this, organizations depend on prepared leaders, who visualize and calculate actions considering the worst-case scenarios, from the loss of key...
Read More
Microsoft Exchange alert
April 19th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, On-the-go

Microsoft Exchange alert: users, check your environment for security breaches

By Paulo Trindade and Atila Abreu Altoe The Microsoft Exchange alert deals with vulnerabilities detected in the Exchange Server platform. Microsoft has released patches to address these vulnerabilities. But how do you know if breaches have occurred in your environment? In this alert, prepared by...
Read More
ongoing phishing campaign using Trickbot
April 8th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

We have identified a scam using Trickbot and here are our recommendations

ISH's threat intelligence team has detected an ongoing phishing campaign using Trickbot, a sophisticated Trojan first identified in 2016 and constantly updated. Trickbot is used to steal information from...
Read More
Costs of ransomware attack
March 11, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

This is one of the biggest costs in the event of a ransomware attack

Companies that are victims of a ransomware attack can take days, sometimes even weeks, to restore their systems after an event. And downtime can be very expensive. If services and operations are interrupted, there are many...
Read More
Data security
February 24, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Trends

Data leaks represent a major security challenge today. Why?

In a reality where there is a veritable explosion of corporate information, companies need to have a thorough understanding of the risks they run and the data security this requires. Today, data are digital treasures coveted by spies...
Read More
The key to security is threat response time
January 5th, 2021December 10th, 2024
Jaqueline SantosBlog, Trends

The key to containing attacks is the speed of the response time to threats

The impact of a cyber attack is measured by how long an attacker remains in a company's systems unnoticed. The longer inside an environment, the more access to critical systems. Therefore, the key to containing attacks...
Read More
Drones are a threat to cyber security
December 3rd, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, Offline, On-the-go

Are drones a threat to cyber security?

The number of drones registered in Brazil increased by 51% from 2018 to 2019, jumping from 18,389 to 27,665 in that period. The data comes from the National Civil Aviation Agency (Anac). The Brazilian market for unmanned aerial vehicles has been growing,...
Read More
Be careful what you ask your virtual assistant to do at home
November 26, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, Offline, Reviews, Trends

Be careful what you ask your virtual assistant to do in your home

Warnings about the risks involved in smart speakers and the large number of virtual assistants available on the market today are not new. There have been cases in the past of invasion of privacy. But the issue that needs to be clarified...
Read More
Why managing privileged access prevents cyber attacks
November 20th, 2020December 10th, 2024
Jaqueline SantosBlog, Insights, Reviews, Trends

Why managing privileged access prevents cyber attacks

The consequences of a cyber attack are costly. According to Accenture's Ninth Annual Cost of Cybercrime Study, the average financial impact of an intrusion has risen from $1.4 million to $13 million per attack. E...
Read More
1 … 11 12 13 14 15 … 17

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.