Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
Be careful what you ask your virtual assistant to do at home
November 26, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insider, Insights, Offline, Reviews, Trends

Be careful what you ask your virtual assistant to do in your home

Warnings about the risks involved in smart speakers and the large number of virtual assistants available on the market today are not new. There have been cases in the past of invasion of privacy. But the issue that needs to be clarified...
Read More
Evolving cybersecurity to keep pace with accelerated digitalization
October 28, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insider, Insights, Trends

Evolving cybersecurity to keep pace with accelerated digitalization

Assim como o mundo mudou para atender ao "novo normal" da pandemia, as pessoas e as empresas também devem reavaliar o futuro da sua postura de segurança cibernética. Há uma guerra virtual, em que os ataques cibernéticos estão em constante…
Read More
August 3rd, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Insights, On-the-go, Trends

Companies migrate to the cloud and cybercriminals follow closely behind

The pandemic has created not just one, but many new normalities. For people, for businesses and also for cybersecurity operations. One of the transformations concerns the storage and use of data. Companies are rapidly migrating...
Read More
July 20th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insider, Insights, On-the-go, Trends

Ransomware attacks are still the most common and the most destructive

In recent years, hackers who block entire computer networks, demanding payments to allow users back into their systems, have made ransomware one of the scariest and most expensive cyber attacks. It's not easy to count cases because many...
Read More
June 30th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Insights, Trends, Vídeos

Is a Security Operations Center (SOC) essential for business today?

Companies need to align security initiatives with business goals. And a Security Operations Center (SOC) provides the necessary foundation for the organization to protect data and information by detecting and responding more quickly to threats. We have created a...
Read More
June 27th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Insights, Trends

The evolution of security in business: why invest in a SOC?

If you've come this far, in the last post in our series on the evolution of security in the SOC, you've already understood how information security has evolved, how tools have become more complex and how a modern SOC is...
Read More
May 28, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Insights, On-the-go, Trends

If the biggest cyber attack in history is approaching, here's how to survive it

The routine hasn't been the same since the coronavirus. And, as we said in this post, there will be consequences. So if, in the coming months, we could be facing one of the biggest cyber attacks of all time, what...
Read More
May 21st, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insider, Insights, Trends

The biggest cyber attack in history is just around the corner and no one is talking about it

Fighting hackers is one of the last things on the minds of most people and companies right now, when keeping businesses running and healthy is the top priority. But the disruption that the coronavirus has caused to our...
Read More

Latest posts

  • Do login à invasão: como a Porta 22 se tornou alvo global e o que fazer para evitar ataques 25 de junho de 2025
  • Aplicativos maliciosos: entenda os riscos e saiba como proteger seus dispositivos 4 de junho de 2025
  • Cibersegurança na saúde: como a conectividade sem proteção coloca pacientes em risco 13 de maio de 2025
  • O que uma VPN realmente protege — e por que ela não basta para sua segurança digital 6 de maio de 2025

Categories

Blog (216) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.