Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
December 13th, 2022December 13th, 2022
Jessica TrucatBlog

Ransomware as a Service (RaaS): the subscription service that most affects companies

By Caique Barqueta: Ransomware attacks are constantly on the rise. This increase is due to a new sales model, known as "Ransomware-as-a-Service" (RaaS). This model is subscription-based and allows affiliates to...
Read More
7 de dezembro de 2022December 10th, 2024
Jaqueline SantosBlog

Gestão de vulnerabilidade: o que é e por que ela é essencial para proteger a sua empresa? 

A explosão de casos de ciberataques contra empresas e usuários alerta para uma nova pandemia, desta vez, cibernética. De acordo com um estudo, no último ano houve um aumento de 122% em ataques a instituições de ensino e 64% em…
Read More
30 de novembro de 2022December 10th, 2024
Jessica TrucatBlog

Com o crescimento da IoT, as empresas precisam garantir visibilidade e segurança 

Apesar de alguns impactos de escassez de chips e interrupções da cadeia de suprimentos que desaceleraram a recuperação do mercado da Internet das coisas (IoT), a previsão de crescimento para o setor continua otimista devido a uma demanda crescente.  Em…
Read More
November 21, 2022December 10th, 2024
Jaqueline SantosBlog

Black Friday: how to make a safe purchase online? 

Online fraud, cyber attacks and data breaches plague sectors all over the world, especially in retail during Black Friday. The approaching date gets consumers excited to see all the promotions available. However, the high demand...
Read More
November 17th, 2022December 10th, 2024
Jessica TrucatBlog

Prilex Group is back: malware collects bank card data to carry out scams

By Caique Barqueta: Brazil is among the countries that suffer the most cyber attacks in the world, a scenario that has worsened after the pandemic and the global moment related to the armed conflict between Ukraine and Russia. Being up to date on...
Read More
November 10, 2022November 10, 2022
Jaqueline SantosBlog

The importance of cybersecurity in ESG strategy 

Com o avanço natural da tecnologia nas empresas, os dados se tornam ativos intangíveis cada vez mais valiosos e seu uso indevido pode gerar grandes impactos. Como no caso do Ransomware DarkSide que interrompeu as operações de uma empresa de…
Read More
October 27th, 2022December 10th, 2024
Jaqueline SantosBlog

5 dangers hidden in your phone's permissions and fake apps: how to protect yourself from potential data breaches 

Access to the camera, microphone, shared networks, real-time location and even SMS. These are some of the countless permissions that cell phone apps improperly request during installation or use and which, more often than not, go unused...
Read More
October 19, 2022December 10th, 2024
Jessica TrucatBlog

The dangers of LockBit 3.0 Ransomware for companies: understand how the malicious software operates

By Caique Barqueta: Ransomware is a very lethal type of malware for all technology assets. But what actually makes it dangerous? As the name implies, "ransom" means "Ransom" - so it's a piece of software...
Read More
October 13, 2022December 10th, 2024
Jaqueline SantosBlog

Children can be the gateway to hackers: learn how to avoid attacks

À medida que as crianças estão cada vez mais conectadas e possuem fácil acesso a aparelhos eletrônicos, como tablets, celulares e computadores, elas se tornam também uma porta de entrada para os cibercriminosos, que se aproveitam da vulnerabilidade e ingenuidade…
Read More
October 5th, 2022December 10th, 2024
Jessica TrucatBlog

Endpoint Security: Learn how to avoid the main digital threats

Overnight, most endpoints migrated outside the perimeter of the corporate network. Yes, homeworking existed before the pandemic, but not on the same scale, nor with so much at stake. The security of...
Read More
1 … 6 7 8 9 10 … 17

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.