Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
September 8th, 2022December 10th, 2024
Jaqueline SantosBlog

Why should your company implement a Business Continuity Plan (BCP) now? 

The absence of a risk and crisis management culture, such as a Business Continuity Plan (BCP), is one of the biggest barriers faced by organizations. According to a recent survey by consultancy firm KPMG, only 27% of...
Read More
August 3rd, 2022December 10th, 2024
Jaqueline SantosBlog

Deepfake: technology threatens companies' cyber security

As technology advances and offers countless possibilities for all business sectors, cybercriminals are also taking advantage of its evolution to improve their attack strategies. This is the case with Deepfake, a threat that uses...
Read More
July 27th, 2022December 10th, 2024
Jaqueline SantosBlog

Incident response: what you need to know to support company protection initiatives

For a company to protect itself against cyber attacks, it needs to have a robust security policy, investments in technological resources and specialized manpower, as well as ensuring that employees are trained in security awareness. But to...
Read More
July 6th, 2022December 10th, 2024
Jaqueline SantosBlog, Business, Security

CXOs: Learn how they can combat risks and improve cyber security today

2021 was an overwhelming year for cybersecurity. In this period alone, the average total global cost of a ransomware breach was US$4.62 million according to IBM studies, and this trend will continue in the coming years....
Read More
June 1st, 2022December 10th, 2024
Jessica TrucatBlog, General

Unprotected suppliers? Your company is at risk; understand the attack on the supply chain

As companies are increasingly exposed to the risks of cyber attacks against their supply chains, it has become more important than ever to take protective measures. Since their suppliers...
Read More
May 18th, 2022December 10th, 2024
Jéssica TrucatBlog, Geral, Insider, Reviews, Segurança, Technology, Trends

I've been attacked, now what? Learn how to prevent phishing and ransomware attacks, reducing business risks 

Phishing and Ransomware attacks have become a major security concern for all types of companies, regardless of their size or segment. These attacks are sneaky, but have a major impact on business and are capable of...
Read More
April 20th, 2022December 10th, 2024
Jaqueline SantosBlog

Quick guide to Ransomware: data hijacking and why are companies at risk?

Quando se trata de segurança cibernética, empresas de todos os tamanhos e segmentos precisam lidar com um desafio comum: a abundância e gravidade dos ataques de ransomware. Cada vez mais usado por cibercriminosos, esse tipo de malware pode paralisar toda…
Read More
April 5th, 2022December 10th, 2024
Jéssica TrucatBlog, Insider, Segurança, Technology

BlackCat Ransomware: the attack that has companies around the world worried

BlackCat, also known as ALPHV, is a Ransomware as a Service - RaaS that has been gaining notoriety since November 2021, has been in the spotlight and has caused major damage to several companies around the world. This ransomware is...
Read More
DLL HIJACKING
March 28, 2022December 10th, 2024
Jaqueline SantosBlog, Insider

DLL Hijacking - injecting DLLs for evasion and persistence

There is a MITRE sub-technique for injecting DLLs, called DLL Hijacking. And in this post, you'll find a theoretical explanation and a simple proof of concept, with a DLL programmed in C++ that opens the Windows calculator...
Read More
Top 10 versions of Windows
February 10th, 2022December 10th, 2024
Jaqueline SantosBlog, Trends

The TOP 10 Windows versions with the most patches and how to update them

By Átila Altoé and Laura Cardillo It's now a Microsoft tradition to release updates for different editions of the operating system every Tuesday. That's why it's known as Patch Tuesday. And this week, we found out which 10 versions of Windows...
Read More
1 2 3 4 5 6

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.