Zero Trust Edge x VPN – what’s the most secure model?

Zero Trust Edge x VPN: what’s the most secure model? Remote work, driven by the pandemic, raised a major concern for Executives: the need to adopt “borderless” mechanisms to protect the data and employees of the Companies where they were, and at the same time, be effective against the increase in cyber attacks In all […]

Cyber War – how it works

Cyber War: how it works Cyberspace has become an extension of traditional battlefields, allowing nations to sustain damaging conflicts without physical confrontation, troops or machines.   What is Cyber War? Cyber War involves the intentional invasion of another nations’ networks and computer systems for the purpose of causing damage to these systems.  These attacks are carried about by international organizations or state-sponsored entities with the knowledge […]

Social Engineering Part 2 – Learn all about Phishing

Social Engineering Part 2: Learn all about Phishing As we saw in the last article, cybercriminals can also use non-digital methods to attack users and organizations.   Today we will discuss the social engineering method called Phishing. We will learn how to identify them, remove them, and prevent them from happening.  Definition Social engineering is a manipulation technique that exploits […]

Stop Sharing Company Passwords

Stop Sharing Company Passwords Password sharing is one of the biggest security issues affecting business today, and yet it is one of the least managed security risks. There are many reasons your employees’ share passwords – work delegation, being out of the office, covering holiday leave, a new employee without access, lack of risk awareness, etc.  […]

Malware – signs that you have been infected and tips to protect yourself – Part 2

Malware: signs that you have been infected and tips to protect yourself – Part 2 As we explained in the previous article, malware is any software designed to cause damage to a computer, server, client, or computer network.   Understanding the different types of malware is essential to the user’s ability to identify, contain, and remove the […]

Types of Malware

Types of Malware Malware, the abbreviated word for ‘malicious software’ is the name for any code that can be used to steal data, cause damage, circumvent access, or compromise systems.   How does it work? Once installed on the device, the malware gains access to the data stored on the device and can perform actions on […]

October 19 – IT Professional Day

October 19: IT Professional Day With Digital Transformation, information technology is one of the fastest growing areas in the market, both in search of professionals and in the development of new solutions.  According to IDC forecasts for this year, Brazil will have a 7.6% growth in this sector. Driven by the acceleration in the software market, by […]

2020 security and risk trends

2020 security and risk trends The digitalization of businesses caused the expansion of the Companies’ perimeter, expanding the circulation of data outside the Organization, requiring greater risk management and the adoption of a more complex level of security in order to ensure business continuity.  Points of attention for CISOs According to Gartner, a North American consulting company, in reference to Technology, some points must […]

IT compliance challenges

IT compliance challenges The word “compliance” comes from the English verb “to comply”. It is a term widely used in the corporate world to show conformity to regulations, laws, and standards related to the market in which it operates.  On August 1, 2013, Law no. 12,846, popularly known as the Anti-Corruption Law was enacted, making internal audit […]

5 Best Practices for Secure Access

5 Best Practices for Secure Access Social detachment has profoundly transformed people’s lives, becoming the “new normal.” This reality changed the way we experience some things, such as time and space, instituting a new routine for how we work, have fun and relate. This change has also influenced the way we express and consume products, […]