Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
November 21, 202210 de dezembro de 2024
Jaqueline SantosBlog

Black Friday: how to make a safe purchase online? 

Online fraud, cyber attacks and data breaches plague sectors all over the world, especially in retail during Black Friday. The approaching date gets consumers excited to see all the promotions available. However, the high demand...
Read More
October 27th, 202210 de dezembro de 2024
Jaqueline SantosBlog

5 dangers hidden in your phone's permissions and fake apps: how to protect yourself from potential data breaches 

Access to the camera, microphone, shared networks, real-time location and even SMS. These are some of the countless permissions that cell phone apps improperly request during installation or use and which, more often than not, go unused...
Read More
Colonial Pipeline case
May 19th, 202110 de dezembro de 2024
Jaqueline SantosBlog, General, Insider, Trends

The Colonial Pipeline case shows that ransomware is more sophisticated; so is protecting yourself from it

When a giant like Colonial Pipeline, the largest oil pipeline operator in the United States, falls victim to ransomware with such catastrophic results, even triggering a crisis in the fuel market, the warning goes out to all other companies, from...
Read More
false sense of security
April 29, 202110 de dezembro de 2024
Jaqueline SantosBlog, Insider, Insights, On-the-go, Trends

The false sense of security - the greatest vulnerability

The ability of companies to adapt is as crucial to a business as their ability to generate profit. To do this, organizations depend on prepared leaders, who visualize and calculate actions considering the worst-case scenarios, from the loss of key...
Read More
The key to security is threat response time
January 5th, 202110 de dezembro de 2024
Jaqueline SantosBlog, Trends

The key to containing attacks is the speed of the response time to threats

The impact of a cyber attack is measured by how long an attacker remains in a company's systems unnoticed. The longer inside an environment, the more access to critical systems. Therefore, the key to containing attacks...
Read More
It's not digital security in Brazil that needs to evolve, but the mentality
November 12th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insider, Insights, On-the-go, Trends

It's not digital security in Brazil that needs to evolve, but the mentality

It's not digital security in Brazil that needs to evolve, but the mentality. Today we have at our disposal the same technologies used in other countries. What has advanced abroad, and not here, is that companies and institutions don't...
Read More
Investir em cibersegurança é o futuro da fidelização de clientes
October 22nd, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insights

Investir em cibersegurança é o futuro da fidelização de clientes

Investir em cibersegurança é o futuro da fidelização de clientes. Houve um tempo em que um consumidor substituía um celular por outro, de uma marca diferente, simplesmente porque o preço era mais vantajoso. Em pouco tempo, outros critérios foram acrescentados…
Read More
September 5th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insider, Insights, Trends

Três mitos sobre a nuvem

Ainda há muitas pessoas que afirmam que os dados são mais seguros em redes próprias. Isso porque há uma percepção natural de que as coisas fora do nosso controle são inatamente menos seguras. Há também o outro extremo: aqueles que…
Read More
July 8th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insights, Trends

Protecting business information in the hybrid cloud

Accessing information, retrieving it and storing it all need to be agile so that companies don't waste time and money doing business. Moving data to the cloud is one way of guaranteeing this speed. This includes emails, sensitive data relating to agreements,...
Read More
June 16th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Trends

The evolution of security in business: how was the SOC concept born?

The evolution of security in business and how the SOC concept was born

Read More
1 2

Latest posts

  • Do login à invasão: como a Porta 22 se tornou alvo global e o que fazer para evitar ataques 25 de junho de 2025
  • Aplicativos maliciosos: entenda os riscos e saiba como proteger seus dispositivos 4 de junho de 2025
  • Cibersegurança na saúde: como a conectividade sem proteção coloca pacientes em risco 13 de maio de 2025
  • O que uma VPN realmente protege — e por que ela não basta para sua segurança digital 6 de maio de 2025

Categories

Blog (216) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.