Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
Group involved in the SolarWinds case
October 27th, 2021December 10th, 2024
Jaqueline SantosInsider, Blog

Group involved in SolarWinds case makes new attacks on supply chain

Nobelium, the group involved in the SolarWinds case, is replicating tactics from previous supply chain attacks with new approaches. Such attacks have been taking place in the United States and Europe since May 2021....
Read More
ongoing phishing campaign using Trickbot
April 8th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

We have identified a scam using Trickbot and here are our recommendations

ISH's threat intelligence team has detected an ongoing phishing campaign using Trickbot, a sophisticated Trojan first identified in 2016 and constantly updated. Trickbot is used to steal information from...
Read More
Costs of ransomware attack
March 11, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

This is one of the biggest costs in the event of a ransomware attack

Companies that are victims of a ransomware attack can take days, sometimes even weeks, to restore their systems after an event. And downtime can be very expensive. If services and operations are interrupted, there are many...
Read More
The key to security is threat response time
January 5th, 2021December 10th, 2024
Jaqueline SantosBlog, Trends

The key to containing attacks is the speed of the response time to threats

The impact of a cyber attack is measured by how long an attacker remains in a company's systems unnoticed. The longer inside an environment, the more access to critical systems. Therefore, the key to containing attacks...
Read More
Be careful what you ask your virtual assistant to do at home
November 26, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, Offline, Reviews, Trends

Be careful what you ask your virtual assistant to do in your home

Warnings about the risks involved in smart speakers and the large number of virtual assistants available on the market today are not new. There have been cases in the past of invasion of privacy. But the issue that needs to be clarified...
Read More
Why managing privileged access prevents cyber attacks
November 20th, 2020December 10th, 2024
Jaqueline SantosBlog, Insights, Reviews, Trends

Why managing privileged access prevents cyber attacks

The consequences of a cyber attack are costly. According to Accenture's Ninth Annual Cost of Cybercrime Study, the average financial impact of an intrusion has risen from $1.4 million to $13 million per attack. E...
Read More
Companies' data environment is more complex; protecting it is too
October 23, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Trends

Companies' data environment is more complex; protecting it is too

More and more companies are moving their server infrastructures, data and workloads to virtual environments, mainly in the cloud. Secure and private clouds, as well as public ones. So if companies' data environments are becoming more complex,...
Read More
Investir em cibersegurança é o futuro da fidelização de clientes
October 22nd, 2020December 10th, 2024
Jaqueline SantosBlog, Insights

Investir em cibersegurança é o futuro da fidelização de clientes

Investir em cibersegurança é o futuro da fidelização de clientes. Houve um tempo em que um consumidor substituía um celular por outro, de uma marca diferente, simplesmente porque o preço era mais vantajoso. Em pouco tempo, outros critérios foram acrescentados…
Read More
August 20th, 2020December 10th, 2024
Jaqueline SantosBlog, General, On-the-go, Trends

For ISG Provider Lens™, ISH Tecnologia is a leader in the Brazilian digital security market

The digital transformation not only places an obligation on companies to increase efficiency. Nor is it about modernizing. It's about envisioning new approaches to business and markets. And organizations that choose not to transform themselves digitally,...
Read More
August 3rd, 2020December 10th, 2024
Jaqueline SantosBlog, General, Insights, On-the-go, Trends

Companies migrate to the cloud and cybercriminals follow closely behind

The pandemic has created not just one, but many new normalities. For people, for businesses and also for cybersecurity operations. One of the transformations concerns the storage and use of data. Companies are rapidly migrating...
Read More
1 2 3

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.