
Main types of scams focused on social engineering
Threats related to social engineering are nothing new. Learn about the main methods of social engineering used.
Jun 8, 2023

How to implement a Clean Table policy
: A Clean Table Policy defines practices that ensure the security of information, both paper and digital, that may be considered sensitive.
Jun 4, 2023

Zero Confidence: How to think about the security of your organization
Many cyber attacks start using credentials. To get around this obstacle, organizations are looking at new strategies.
May 30, 2023

Tips to keep your WhatsApp safe
Learn how you can strengthen your security on WhatsApp.
May 30, 2023

What are the impacts of cyber attacks on organizations?
Learn what impacts cyber attacks have on organizations and how to protect yourself from them.
Apr 25, 2023

What were the top ransomware attacks in 2022
Learn what the top ransomware attacks were in 2022 and how to prevent it from happening to my organization.
Apr 24, 2023

Tips for more security and privacy on Facebook
With two billion users, Facebook is still one of the most widely used networks. However, users are still not concerned about security.
Feb 9, 2022

Application security: how to protect your organization from the main types of attacks
Know why application security is an essential factor for organizations to protect themselves from cyber attacks.
Jan 12, 2022

Secure data disposal: how to ensure the security of your information
Every day we store and move a large amount of data and information within our devices. In the corporate context, this information can be...
Nov 17, 2021

LGPD: how does the law impact organizations' budgets for 2022
The growth of cybercrime has led to the need for specific regulation to limit possible abuses. The LGPD (General Data Protection Act)...
Nov 8, 2021

Acceptable use of computing resources: policies that ensure more security
Defining acceptable use policies for computing resources is critical to your organization's security.
Oct 29, 2021

SDLC: How software development life cycles can reduce risks and costs
Exposed to increasing threats within the virtual world, organizations need to be prepared to protect themselves and reduce potential...
Oct 14, 2021

Customer success: our journey searching for strategic results
In today's world, cybersecurity has become a strategic element for organizations. With this, it is natural for large institutions and...
Oct 7, 2021

How you can improve your security and privacy on LinkedIn
LinkedIn is a tool where we seek professional connections. For this reason, it is very common that data, such as email and phone, can be...
Sep 30, 2021