Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
September 5th, 2020December 10th, 2024
Jaqueline SantosBlog, Insider, Trends

Do you know which cyber security service is right for your company?

Around 53% of companies worldwide feel they don't have the necessary skills on staff to keep data safe from cyber threats and attacks, according to Gartner. On the other hand, to thrive in the technologically supercharged future, companies need...
Read More
July 29, 2020December 10th, 2024
Jaqueline SantosBlog, General

7 reasons to pay for antivirus and ditch the free versions

Versions of antivirus software are gaining increasingly comprehensive protection features for operating systems such as Windows 10 and MacOS. As a result, the thinking is growing that paying for an antivirus service is no longer...
Read More
July 8th, 2020December 10th, 2024
Jaqueline SantosBlog, Insights, Trends

Protecting business information in the hybrid cloud

Accessing information, retrieving it and storing it all need to be agile so that companies don't waste time and money doing business. Moving data to the cloud is one way of guaranteeing this speed. This includes emails, sensitive data relating to agreements,...
Read More
June 30th, 2020December 10th, 2024
Jaqueline SantosBlog, General, Insights, Trends, Videos

Is a Security Operations Center (SOC) essential for business today?

Companies need to align security initiatives with business goals. And a Security Operations Center (SOC) provides the necessary foundation for the organization to protect data and information by detecting and responding more quickly to threats. We have created a...
Read More
June 27th, 2020December 10th, 2024
Jaqueline SantosBlog, General, Insights, Trends

The evolution of security in business: why invest in a SOC?

If you've come this far, in the last post in our series on the evolution of security in the SOC, you've already understood how information security has evolved, how tools have become more complex and how a modern SOC is...
Read More
June 23, 2020December 10th, 2024
Jaqueline SantosBlog, General, Insights, Trends

The evolution of security in business: a hunting team

A SOC has a traditional structure, but we decided to organize it a little differently from the classic concept. Why? Well, before answering that question, we need to explain what the traditional structure is like, which was born out of inspiration from exercises...
Read More
June 19th, 2020December 10th, 2024
Jaqueline SantosBlog, General, Insights, Trends, Videos

The evolution of business security: how to protect in a hyperconnected world

Monitoring used to mean the following: having a solution that detected events that were already known and recorded. Did it work? Yes, but it was incomplete. Because, not infrequently, what we call zero-day threats ended up going unnoticed, those that are new and...
Read More

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.