Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
February 15th, 202310 de dezembro de 2024
Jaqueline SantosBlog, Business

ChatGPT: The new ally of cybercriminals 

ChatGPT has become the internet's new favorite toy. The AI-driven natural language processing tool has quickly amassed over 1 million users worldwide. Technologies like ChatGPT have emerged to revolutionize and...
Read More
January 24, 202310 de dezembro de 2024
Jessica TrucatBlog

Artificial Intelligence and IoT: see the main cybersecurity trends for 2023

Por Caique Barqueta: O ano de 2022 foi marcado com diversos tipos de ataques cibernéticos, trazendo muita turbulência para as equipes de cibersegurança das organizações. Diante disto, mencionamos os principais aspectos e tendências para que as empresas adotem e monitorem…
Read More
Costs of ransomware attack
March 11, 202110 de dezembro de 2024
Jaqueline SantosBlog, Insider, Insights

This is one of the biggest costs in the event of a ransomware attack

Companies that are victims of a ransomware attack can take days, sometimes even weeks, to restore their systems after an event. And downtime can be very expensive. If services and operations are interrupted, there are many...
Read More
The key to security is threat response time
January 5th, 202110 de dezembro de 2024
Jaqueline SantosBlog, Trends

The key to containing attacks is the speed of the response time to threats

The impact of a cyber attack is measured by how long an attacker remains in a company's systems unnoticed. The longer inside an environment, the more access to critical systems. Therefore, the key to containing attacks...
Read More
It's not digital security in Brazil that needs to evolve, but the mentality
November 12th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insider, Insights, On-the-go, Trends

It's not digital security in Brazil that needs to evolve, but the mentality

It's not digital security in Brazil that needs to evolve, but the mentality. Today we have at our disposal the same technologies used in other countries. What has advanced abroad, and not here, is that companies and institutions don't...
Read More
Pix scams and why we still fall for phishing attacks
November 6th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insights, On-the-go, Trends, Videos

Don't take the bait: Pix scams and why we still fall for phishing attacks

Pix goes live this month and phishing attacks are on the rise. There are Pix scams being registered, in which criminals take advantage of people's adherence to the novelty by creating fake registration links and pages that mimic websites...
Read More
Companies' data environment is more complex; protecting it is too
October 23, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insider, Trends

Companies' data environment is more complex; protecting it is too

More and more companies are moving their server infrastructures, data and workloads to virtual environments, mainly in the cloud. Secure and private clouds, as well as public ones. So if companies' data environments are becoming more complex,...
Read More
Careers in information security
October 22nd, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insider

Starting a career in Information Security

Information Security reduces the risks inherent in business and provides peace of mind for companies operating under protection. For a professional to start their career in the field, they need to have a clear understanding of what I call...
Read More
July 8th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insights, Trends

Protecting business information in the hybrid cloud

Accessing information, retrieving it and storing it all need to be agile so that companies don't waste time and money doing business. Moving data to the cloud is one way of guaranteeing this speed. This includes emails, sensitive data relating to agreements,...
Read More
June 30th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Insights, Trends, Vídeos

Is a Security Operations Center (SOC) essential for business today?

Companies need to align security initiatives with business goals. And a Security Operations Center (SOC) provides the necessary foundation for the organization to protect data and information by detecting and responding more quickly to threats. We have created a...
Read More
1 2

Latest posts

  • Do login à invasão: como a Porta 22 se tornou alvo global e o que fazer para evitar ataques 25 de junho de 2025
  • Aplicativos maliciosos: entenda os riscos e saiba como proteger seus dispositivos 4 de junho de 2025
  • Cibersegurança na saúde: como a conectividade sem proteção coloca pacientes em risco 13 de maio de 2025
  • O que uma VPN realmente protege — e por que ela não basta para sua segurança digital 6 de maio de 2025

Categories

Blog (216) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.