
Jun 8, 2023
How to set up your security and privacy in Telegram
Learn how to activate the security and privacy settings on Telegram, using the application in a safer way.

Jun 8, 2023
Main types of scams focused on social engineering
Threats related to social engineering are nothing new. Learn about the main methods of social engineering used.

Jun 4, 2023
TikTok: Tips for using the platform with more privacy and security
heck out the safety tips to increase your security and privacy on Tik Tok.

Jun 4, 2023
How to implement a Clean Table policy
: A Clean Table Policy defines practices that ensure the security of information, both paper and digital, that may be considered sensitive.

May 30, 2023
Zero Confidence: How to think about the security of your organization
Many cyber attacks start using credentials. To get around this obstacle, organizations are looking at new strategies.

May 26, 2023
What are the risks behind SMS messaging?
Learn what security risks exist behind SMS messages and how we can protect ourselves from them.

May 8, 2023
ChatGPT: How can this technology impact people's lives?
Learn what are the risks of using ChatGPT in people's lives and how to deal with the new technology.

Apr 25, 2023
What are the impacts of cyber attacks on organizations?
Learn what impacts cyber attacks have on organizations and how to protect yourself from them.

Apr 24, 2023
What were the top ransomware attacks in 2022
Learn what the top ransomware attacks were in 2022 and how to prevent it from happening to my organization.

Apr 19, 2023
Artificial Intelligence: What are the risks that technology can cause in people's lives?
Learn what are the risks of using artificial intelligence in people's daily lives and how to deal with the advancement of technology.

Dec 16, 2022
How to run phishing simulations to increase your organization's security
Learn how phishing simulations can help people in your organization recognize cyberthreats. That way, you keep your organization safe.

Feb 25, 2022
Passwordless World: How to reimagine the authentication
Passwords have been the most popular authentication security layer for decades. But can you imagine a passwordless world?

Feb 16, 2022
Security ambassadors: how to create a culture that protects your organization
Creating a culture of information security can be quite a challenge. So learn how an ambassador program can help you.

Feb 9, 2022
Tips for more security and privacy on Facebook
With two billion users, Facebook is still one of the most widely used networks. However, users are still not concerned about security.

Jan 12, 2022
Application security: how to protect your organization from the main types of attacks
Know why application security is an essential factor for organizations to protect themselves from cyber attacks.

Nov 17, 2021
Secure data disposal: how to ensure the security of your information
Every day we store and move a large amount of data and information within our devices. In the corporate context, this information can be...

Nov 8, 2021
LGPD: how does the law impact organizations' budgets for 2022
The growth of cybercrime has led to the need for specific regulation to limit possible abuses. The LGPD (General Data Protection Act)...

Oct 29, 2021
Acceptable use of computing resources: policies that ensure more security
Defining acceptable use policies for computing resources is critical to your organization's security.

Oct 26, 2021
Black Friday: how to shop online more safely
With promotional dates approaching, such as Black Friday, which takes place in November, many stores also offer great discounts. But it's...

Oct 14, 2021
SDLC: How software development life cycles can reduce risks and costs
Exposed to increasing threats within the virtual world, organizations need to be prepared to protect themselves and reduce potential...