
Jun 8, 2023
Main types of scams focused on social engineering
Threats related to social engineering are nothing new. Learn about the main methods of social engineering used.

Jun 4, 2023
How to implement a Clean Table policy
: A Clean Table Policy defines practices that ensure the security of information, both paper and digital, that may be considered sensitive.

May 30, 2023
Zero Confidence: How to think about the security of your organization
Many cyber attacks start using credentials. To get around this obstacle, organizations are looking at new strategies.

May 30, 2023
Tips to keep your WhatsApp safe
Learn how you can strengthen your security on WhatsApp.

Apr 25, 2023
What are the impacts of cyber attacks on organizations?
Learn what impacts cyber attacks have on organizations and how to protect yourself from them.

Apr 24, 2023
What were the top ransomware attacks in 2022
Learn what the top ransomware attacks were in 2022 and how to prevent it from happening to my organization.

Feb 9, 2022
Tips for more security and privacy on Facebook
With two billion users, Facebook is still one of the most widely used networks. However, users are still not concerned about security.

Jan 12, 2022
Application security: how to protect your organization from the main types of attacks
Know why application security is an essential factor for organizations to protect themselves from cyber attacks.

Nov 17, 2021
Secure data disposal: how to ensure the security of your information
Every day we store and move a large amount of data and information within our devices. In the corporate context, this information can be...

Nov 8, 2021
LGPD: how does the law impact organizations' budgets for 2022
The growth of cybercrime has led to the need for specific regulation to limit possible abuses. The LGPD (General Data Protection Act)...

Oct 29, 2021
Acceptable use of computing resources: policies that ensure more security
Defining acceptable use policies for computing resources is critical to your organization's security.

Oct 14, 2021
SDLC: How software development life cycles can reduce risks and costs
Exposed to increasing threats within the virtual world, organizations need to be prepared to protect themselves and reduce potential...

Oct 7, 2021
Customer success: our journey searching for strategic results
In today's world, cybersecurity has become a strategic element for organizations. With this, it is natural for large institutions and...

Sep 30, 2021
How you can improve your security and privacy on LinkedIn
LinkedIn is a tool where we seek professional connections. For this reason, it is very common that data, such as email and phone, can be...