Your Passwords are Not Secure

Your Passwords are Not Secure You have secrets. We all do. Yesterday, your accounts were protected by a seven-digit password. Today, they are unlocked and might be used to hurt you. Your credit card number, your email, your bank account. You think your secrets are safe online, but they are being targeted on a massive […]

Access security is a priority in the cloud

Access security is a priority in the cloud The pandemic has accelerated the migration process of many companies to the cloud. In search of mobility and maintaining business continuity, many systems and applications have been moved to this environment. With the lack of preparedness for most companies in the migration process, two problems occurred:  the […]

Identity protection for more resilient businesses and secure access

Identity protection for more resilient businesses and secure access The pandemic has accelerated digital transformation and the need for organizations to adapt to rapid technological, organizational and social changes.  The scenario favored an increase in concern with Identity Management (IAM) and Access Privilege Management (PAM).  Mainly due to the adoption of the cloud, business processes needed […]

Zero Trust Edge x VPN – what’s the most secure model?

Zero Trust Edge x VPN: what’s the most secure model? Remote work, driven by the pandemic, raised a major concern for Executives: the need to adopt “borderless” mechanisms to protect the data and employees of the Companies where they were, and at the same time, be effective against the increase in cyber attacks In all […]

Cyber War – how it works

Cyber War: how it works Cyberspace has become an extension of traditional battlefields, allowing nations to sustain damaging conflicts without physical confrontation, troops or machines.   What is Cyber War? Cyber War involves the intentional invasion of another nations’ networks and computer systems for the purpose of causing damage to these systems.  These attacks are carried about by international organizations or state-sponsored entities with the knowledge […]

Social Engineering Part 2 – Learn all about Phishing

Social Engineering Part 2: Learn all about Phishing As we saw in the last article, cybercriminals can also use non-digital methods to attack users and organizations.   Today we will discuss the social engineering method called Phishing. We will learn how to identify them, remove them, and prevent them from happening.  Definition Social engineering is a manipulation technique that exploits […]

Stop Sharing Company Passwords

Stop Sharing Company Passwords Password sharing is one of the biggest security issues affecting business today, and yet it is one of the least managed security risks. There are many reasons your employees’ share passwords – work delegation, being out of the office, covering holiday leave, a new employee without access, lack of risk awareness, etc.  […]

Malware – signs that you have been infected and tips to protect yourself – Part 2

Malware: signs that you have been infected and tips to protect yourself – Part 2 As we explained in the previous article, malware is any software designed to cause damage to a computer, server, client, or computer network.   Understanding the different types of malware is essential to the user’s ability to identify, contain, and remove the […]

Types of Malware

Types of Malware Malware, the abbreviated word for ‘malicious software’ is the name for any code that can be used to steal data, cause damage, circumvent access, or compromise systems.   How does it work? Once installed on the device, the malware gains access to the data stored on the device and can perform actions on […]

October 19 – IT Professional Day

October 19: IT Professional Day With Digital Transformation, information technology is one of the fastest growing areas in the market, both in search of professionals and in the development of new solutions.  According to IDC forecasts for this year, Brazil will have a 7.6% growth in this sector. Driven by the acceleration in the software market, by […]