Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
January 24, 2024December 10th, 2024
Rebecca BezerraBlog

ISH announces new CEOs: learn more about the company's history and the strategy of the visionaries leading the future of cybersecurity 

The year was 1996. After many years of hyperinflation, Brazil was experiencing a more predictable economic period, with the stabilization provided by the Real Plan launched two years earlier. In terms of technology, the internet was advancing slowly and with a certain...
Read More
January 17th, 2024December 10th, 2024
Rebecca BezerraBlog

Cybercriminals use Stealer-type malware to steal cookies

By Heimdall: With various digital threats emerging every day, cybercriminals are undoubtedly betting on using stealer-type malware (focused on stealing information) to make a profit from the stolen data. As an example, we can mention the malware...
Read More
January 3rd, 2024December 10th, 2024
Rebecca BezerraBlog

The importance of Cyber Threat Intelligence for companies

By Heimdall: The evolution of cyber threats reflects the constant adaptation and sophistication of tactics used by cybercriminals. In the early days of the internet, threats were relatively simple and often limited to viruses and worms that spread via...
Read More
December 13th, 2023December 13th, 2023
Jaqueline SantosBlog

Beware of fraud! Why is Brazil one of the main targets for online shopping scams? 

E-commerce in Brazil has grown exponentially in recent years, with a significant leap in the volume of transactions. At the same time, online fraud has also become more sophisticated. A scenario that reflects not only the expansion of digital activity, but...
Read More
December 5th, 2023December 10th, 2024
Rebecca BezerraBlog

Good practices for using Artificial Intelligence

By Caique Barqueta: Artificial Intelligence (AI) is an area of computer science dedicated to creating systems that can perform tasks that normally require some kind of human intelligence. This includes skills such as: learning, reasoning, problem-solving,...
Read More
November 30th, 2023December 10th, 2024
Rebecca BezerraBlog

Digital transformation: how to overcome the challenges of information security? 

As we move deeper into the digital age, companies across the country are faced with a dual mission: to protect their vital data and drive innovation. The digital transformation brings a wave of challenges, from managing...
Read More
November 29, 2023December 10th, 2024
Rebecca BezerraBlog

The Digital Future of SMEs: Why are managed cybersecurity services essential for business continuity? 

In recent decades, Small and Medium-sized Enterprises (SMEs) have become the engine of the global economy, driving innovation and growth. However, as these companies thrive in an ever-evolving digital environment, they also face challenges...
Read More
November 8th, 2023December 10th, 2024
Rebecca BezerraBlog

SIM Swap: understand how the scam works and how to protect yourself

By Caique Barqueta: SIM swapping poses a significant threat to organizations. Criminals can gain access to sensitive accounts and data by swapping phone SIM cards. Companies, especially telecommunications and process outsourcing companies, are prime targets. Security measures...
Read More
October 25th, 2023December 10th, 2024
Jaqueline SantosBlog

Clickjacking: one click can ruin everything

Brazil is in 2nd place in the ranking of countries most affected by cyber attacks in Latin America. And it leads the world in the rate of data leaks for the second year running, with more than 1 million Brazilians victims of...
Read More
October 20th, 2023December 10th, 2024
Rebecca BezerraBlog

IRoX Team threatens to attack Brazil. Learn how to protect your business

By ISH and SafeLabs: A group of cyber activists called 'IRoX Team' has announced a cyber war against Israel and its supporters, releasing dates for their cyber attacks. According to a post on a public messaging group, the group supports...
Read More
1 2 3 4 5 6 … 17

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.