Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
The key to security is threat response time
January 5th, 202110 de dezembro de 2024
Jaqueline SantosBlog, Trends

The key to containing attacks is the speed of the response time to threats

The impact of a cyber attack is measured by how long an attacker remains in a company's systems unnoticed. The longer inside an environment, the more access to critical systems. Therefore, the key to containing attacks...
Read More
It's not digital security in Brazil that needs to evolve, but the mentality
November 12th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insider, Insights, On-the-go, Trends

It's not digital security in Brazil that needs to evolve, but the mentality

It's not digital security in Brazil that needs to evolve, but the mentality. Today we have at our disposal the same technologies used in other countries. What has advanced abroad, and not here, is that companies and institutions don't...
Read More
Companies' data environment is more complex; protecting it is too
October 23, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insider, Trends

Companies' data environment is more complex; protecting it is too

More and more companies are moving their server infrastructures, data and workloads to virtual environments, mainly in the cloud. Secure and private clouds, as well as public ones. So if companies' data environments are becoming more complex,...
Read More
Careers in information security
October 22nd, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insider

Starting a career in Information Security

Information Security reduces the risks inherent in business and provides peace of mind for companies operating under protection. For a professional to start their career in the field, they need to have a clear understanding of what I call...
Read More
August 3rd, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Insights, On-the-go, Trends

Companies migrate to the cloud and cybercriminals follow closely behind

The pandemic has created not just one, but many new normalities. For people, for businesses and also for cybersecurity operations. One of the transformations concerns the storage and use of data. Companies are rapidly migrating...
Read More
July 8th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insights, Trends

Protecting business information in the hybrid cloud

Accessing information, retrieving it and storing it all need to be agile so that companies don't waste time and money doing business. Moving data to the cloud is one way of guaranteeing this speed. This includes emails, sensitive data relating to agreements,...
Read More
June 19th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Insights, Trends, Vídeos

The evolution of business security: how to protect in a hyperconnected world

Monitoring used to mean the following: having a solution that detected events that were already known and recorded. Did it work? Yes, but it was incomplete. Because, not infrequently, what we call zero-day threats ended up going unnoticed, those that are new and...
Read More
June 16th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Trends

The evolution of security in business: how was the SOC concept born?

The evolution of security in business and how the SOC concept was born

Read More
May 28, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Insights, On-the-go, Trends

If the biggest cyber attack in history is approaching, here's how to survive it

The routine hasn't been the same since the coronavirus. And, as we said in this post, there will be consequences. So if, in the coming months, we could be facing one of the biggest cyber attacks of all time, what...
Read More

Latest posts

  • Cibersegurança na saúde: como a conectividade sem proteção coloca pacientes em risco 13 de maio de 2025
  • O que uma VPN realmente protege — e por que ela não basta para sua segurança digital 6 de maio de 2025
  • Como o ransomware Akira usa dupla extorsão, RaaS e táticas psicológicas — e como se defender 15 de abril de 2025
  • Criptografia de ponta a ponta: como funciona e como ela protege seus dados? 8 de abril de 2025

Categories

Blog (214) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.