Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
November 21, 2022December 10th, 2024
Jaqueline SantosBlog

Black Friday: how to make a safe purchase online? 

Online fraud, cyber attacks and data breaches plague sectors all over the world, especially in retail during Black Friday. The approaching date gets consumers excited to see all the promotions available. However, the high demand...
Read More
October 27th, 2022December 10th, 2024
Jaqueline SantosBlog

5 dangers hidden in your phone's permissions and fake apps: how to protect yourself from potential data breaches 

Access to the camera, microphone, shared networks, real-time location and even SMS. These are some of the countless permissions that cell phone apps improperly request during installation or use and which, more often than not, go unused...
Read More
Data security
February 24, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Trends

Data leaks represent a major security challenge today. Why?

In a reality where there is a veritable explosion of corporate information, companies need to have a thorough understanding of the risks they run and the data security this requires. Today, data are digital treasures coveted by spies...
Read More
Drones are a threat to cyber security
December 3rd, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, Offline, On-the-go

Are drones a threat to cyber security?

The number of drones registered in Brazil increased by 51% from 2018 to 2019, jumping from 18,389 to 27,665 in that period. The data comes from the National Civil Aviation Agency (Anac). The Brazilian market for unmanned aerial vehicles has been growing,...
Read More
Pix scams and why we still fall for phishing attacks
November 6th, 2020December 10th, 2024
Jaqueline SantosBlog, Insights, On-the-go, Trends, Videos

Don't take the bait: Pix scams and why we still fall for phishing attacks

Pix goes live this month and phishing attacks are on the rise. There are Pix scams being registered, in which criminals take advantage of people's adherence to the novelty by creating fake registration links and pages that mimic websites...
Read More
Companies' data environment is more complex; protecting it is too
October 23, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Trends

Companies' data environment is more complex; protecting it is too

More and more companies are moving their server infrastructures, data and workloads to virtual environments, mainly in the cloud. Secure and private clouds, as well as public ones. So if companies' data environments are becoming more complex,...
Read More
web applications
October 22nd, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Reviews, Trends

The best solution for securing web applications

Web applications are programs stored on a remote server, delivered via the Internet to a client through a browser interface. There are challenges in securing applications. And technological history explains why. In the early days of the internet, websites...
Read More
September 5th, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, Trends

Three myths about the cloud

There are still many people who claim that data is more secure on their own networks. This is because there is a natural perception that things outside our control are innately less secure. There is also the other extreme: those who...
Read More
July 8th, 2020December 10th, 2024
Jaqueline SantosBlog, Insights, Trends

Protecting business information in the hybrid cloud

Accessing information, retrieving it and storing it all need to be agile so that companies don't waste time and money doing business. Moving data to the cloud is one way of guaranteeing this speed. This includes emails, sensitive data relating to agreements,...
Read More
April 23, 2020December 10th, 2024
Jaqueline SantosBlog, Insights

The first SOC was born with the first hacker

Have you ever wondered how long Information Security has been a challenge for companies? In a hyper-connected world, protection is a constant concern. And this has been true for many, many years, since...
Read More

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.