Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
June 4th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Offline

5 behaviors that will make any company safer

Protecting data is a much broader issue than just eliminating vulnerabilities and protecting against hacker attacks. Confidentiality is not about hiding data. It's ensuring that it is only accessed by authorized persons. This pillar of security...
Read More
April 23, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insider, Insights

Human centric: a security concept without borders

In crises such as the one we are experiencing with the coronavirus, technology makes it possible for companies around the world to continue their business with remote access for employees. At the same time, there is a new challenge in the traditional way of...
Read More
How the coronavirus triggered hacker attacks in Brazil
April 23, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, On-the-go

How the coronavirus triggered hacker attacks in Brazil

Almost 60% of Brazilians are staying at home, and social isolation has grown in recent weeks, as shown by data from In Loco, a geolocation technology company whose software is embedded in more than 60 million cell phones. It's possible...
Read More
1 2

Latest posts

  • Aplicativos maliciosos: entenda os riscos e saiba como proteger seus dispositivos 4 de junho de 2025
  • Cibersegurança na saúde: como a conectividade sem proteção coloca pacientes em risco 13 de maio de 2025
  • O que uma VPN realmente protege — e por que ela não basta para sua segurança digital 6 de maio de 2025
  • Como o ransomware Akira usa dupla extorsão, RaaS e táticas psicológicas — e como se defender 15 de abril de 2025

Categories

Blog (215) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.