Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
August 29, 2024December 10th, 2024
Rebecca BezerraBlog

Smart sensors, global defense: check out the main threats and offenders identified by ISH

By Heimdall ISH: In today's article, we will highlight the key statistics collected by the ISH Intelligence team, Heimdall, which operates a vast network of sensors spread across several countries. These sensors have the capacity to collect, process...
Read More
January 3rd, 2024December 10th, 2024
Rebecca BezerraBlog

The importance of Cyber Threat Intelligence for companies

By Heimdall: The evolution of cyber threats reflects the constant adaptation and sophistication of tactics used by cybercriminals. In the early days of the internet, threats were relatively simple and often limited to viruses and worms that spread via...
Read More
November 29, 2023December 10th, 2024
Rebecca BezerraBlog

The Digital Future of SMEs: Why are managed cybersecurity services essential for business continuity? 

In recent decades, Small and Medium-sized Enterprises (SMEs) have become the engine of the global economy, driving innovation and growth. However, as these companies thrive in an ever-evolving digital environment, they also face challenges...
Read More
October 4th, 2023December 10th, 2024
Rebecca BezerraBlog

The main threat groups targeting Brazil: meet Red Apollo

By Ismael Rocha: An advanced persistent threat (APT) works to access computer networks and systems without being detected or noticed. These threats, sometimes executed by a nation-state or a state-sponsored group, can steal information...
Read More
August 30th, 2023December 10th, 2024
Rebecca BezerraBlog

Main threat groups targeting Brazil: meet APT41

By Ismael Rocha: An advanced persistent threat (APT) works to access computer networks and systems without being detected or noticed. These threats, sometimes executed by a nation-state or a state-sponsored group, can steal information...
Read More
August 2nd, 2023December 10th, 2024
Rebecca BezerraBlog

The main threat groups targeting Brazil: meet the Lazarus Group

By Ismael Rocha: An advanced persistent threat (APT) works to access computer networks and systems without being detected or noticed. These threats, sometimes executed by a nation-state or a state-sponsored group, can steal information...
Read More
June 28, 2023December 10th, 2024
Rebecca BezerraBlog

The danger is in your inbox: exponential increase in phishing puts companies on alert 

The increase in phishing on email and collaboration platforms has been a worrying trend in recent years, according to the State of Email Security report. According to the survey of 1,700 IT professionals, the most significant threats...
Read More
March 22nd, 2023December 10th, 2024
Rebecca BezerraBlog

Quanto custa o acesso à sua empresa? Identificamos operação em conjunto de 4 grupos de Ransomware

Por Caique Barqueta: Os custos de recuperação após um vazamento de dados pode ser mais caro do que o investimento em proteção e cibersegurança. Uma pesquisa mostra que o valor médio de um incidente é de R$ 23 milhões e,…
Read More
11 de janeiro de 2023December 10th, 2024
Jessica TrucatBlog

Conscientização dos usuários: o elo mais fraco da segurança cibernética 

Ao examinar um vazamento de dados, quase sempre é possível apontar práticas de segurança inadequadas dos usuários, e essa prática deve continuar em 2023.   Imagine a seguinte situação: você está no trabalho e recebe uma mensagem na sua caixa de…
Read More
30 de novembro de 2022December 10th, 2024
Jessica TrucatBlog

Com o crescimento da IoT, as empresas precisam garantir visibilidade e segurança 

Apesar de alguns impactos de escassez de chips e interrupções da cadeia de suprimentos que desaceleraram a recuperação do mercado da Internet das coisas (IoT), a previsão de crescimento para o setor continua otimista devido a uma demanda crescente.  Em…
Read More
1 2 3 4 … 6

Latest posts

  • Atenção ao risco digital: por que o setor aéreo precisa olhar para a cibersegurança com foco estratégico  10 de novembro de 2025
  • ISH é reconhecida mais uma vez como a maior empresa de TI do Espírito Santo no Anuário IEL 2025 6 de novembro de 2025
  • Banco Central reforça a cibersegurança e a governança com novas resoluções para o sistema financeiro  28 de outubro de 2025
  • Mês da Cibersegurança: o alerta que o Brasil não pode ignorar mais 22 de outubro de 2025

Categories

Blog (226) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.