
How to set up your security and privacy in Telegram
Learn how to activate the security and privacy settings on Telegram, using the application in a safer way.
Jun 8, 2023

Main types of scams focused on social engineering
Threats related to social engineering are nothing new. Learn about the main methods of social engineering used.
Jun 8, 2023

TikTok: Tips for using the platform with more privacy and security
heck out the safety tips to increase your security and privacy on Tik Tok.
Jun 4, 2023

How to implement a Clean Table policy
: A Clean Table Policy defines practices that ensure the security of information, both paper and digital, that may be considered sensitive.
Jun 4, 2023

Zero Confidence: How to think about the security of your organization
Many cyber attacks start using credentials. To get around this obstacle, organizations are looking at new strategies.
May 30, 2023

What are the risks behind SMS messaging?
Learn what security risks exist behind SMS messages and how we can protect ourselves from them.
May 26, 2023

ChatGPT: How can this technology impact people's lives?
Learn what are the risks of using ChatGPT in people's lives and how to deal with the new technology.
May 8, 2023

What are the impacts of cyber attacks on organizations?
Learn what impacts cyber attacks have on organizations and how to protect yourself from them.
Apr 25, 2023

What were the top ransomware attacks in 2022
Learn what the top ransomware attacks were in 2022 and how to prevent it from happening to my organization.
Apr 24, 2023

Artificial Intelligence: What are the risks that technology can cause in people's lives?
Learn what are the risks of using artificial intelligence in people's daily lives and how to deal with the advancement of technology.
Apr 19, 2023

How to run phishing simulations to increase your organization's security
Learn how phishing simulations can help people in your organization recognize cyberthreats. That way, you keep your organization safe.
Dec 16, 2022

Passwordless World: How to reimagine the authentication
Passwords have been the most popular authentication security layer for decades. But can you imagine a passwordless world?
Feb 25, 2022

Security ambassadors: how to create a culture that protects your organization
Creating a culture of information security can be quite a challenge. So learn how an ambassador program can help you.
Feb 16, 2022

Tips for more security and privacy on Facebook
With two billion users, Facebook is still one of the most widely used networks. However, users are still not concerned about security.
Feb 9, 2022

Application security: how to protect your organization from the main types of attacks
Know why application security is an essential factor for organizations to protect themselves from cyber attacks.
Jan 12, 2022

Secure data disposal: how to ensure the security of your information
Every day we store and move a large amount of data and information within our devices. In the corporate context, this information can be...
Nov 17, 2021

LGPD: how does the law impact organizations' budgets for 2022
The growth of cybercrime has led to the need for specific regulation to limit possible abuses. The LGPD (General Data Protection Act)...
Nov 8, 2021

Acceptable use of computing resources: policies that ensure more security
Defining acceptable use policies for computing resources is critical to your organization's security.
Oct 29, 2021

Black Friday: how to shop online more safely
With promotional dates approaching, such as Black Friday, which takes place in November, many stores also offer great discounts. But it's...
Oct 26, 2021

SDLC: How software development life cycles can reduce risks and costs
Exposed to increasing threats within the virtual world, organizations need to be prepared to protect themselves and reduce potential...
Oct 14, 2021