In the 36th edition of Information Security Week, we'll share tips for protecting your data, identifying WhatsApp cloning, legacy firewalls, busy IT, and more.
News
3 information security tips to protect your data
We've listed some valuable information security tips to help you protect your data and preserve the integrity of your employees and customers.
By Rafaela Ricardo in Privacy Tech
How to identify WhatsApp theft and cloning?
WhatsApp is the most widely used messaging app in Brazil, and as such, it has also become a common target for scams of all kinds. From phishing attempts involving the sharing of fraudulent links with contacts to the use of the app to spread fake news, cloning is perhaps the most dangerous form of attack. After all, it puts not only the victims' own data at risk, but also the money of close contacts.
By Felipe Demartini on Canal Tech
Companies are eliminating legacy firewalls due to high costs and inability to prevent cyberattacks.
According to the Ponemon Institute, companies believe that firewalls are ineffective in preventing attacks against applications, data centers and cloud data.
In CIO
Security awareness: do you really know how to protect yourself in the office?
With the exception of critical activities that must be performed in person, remote work remains the norm for most Brazilian professionals. Offices remain closed due to the novel coronavirus (SARS-CoV-2) pandemic and will likely remain so until a COVID-19 vaccine is available. But what happens next? What will actually happen under the new normal?
By Ramon de Souza in The Hack
Busy IT: More team productivity with less effort
In this article, we will address the main difficulties faced by "lone" IT professionals in companies and some ways to improve the productivity of both the team and IT itself in a simple way that can be applied to almost all sectors.
By Kelvin Zimmer on Lumiun Blog
Pix will not have dedicated security and the Central Bank will not be responsible for hacks
The Central Bank of Brazil will launch PIX in a few days and the big question is: is it safe?
By Neto Guaraci in Cointimes
Is Banning the Solution? Social Media Poses Cyber Risks to Businesses
As noted, the list of brands most exploited by criminals to carry out phishing scams against end users is paradoxically the opposite of the order of services whose access is usually blocked within the corporate environment.
By Ramon De Souza in Canal Tech
Material
Event
IGF 2020
Main international forum for discussion on Internet governance From November 6th to November 17th
Not yet subscribed to our newsletter to receive this content weekly in your email? Then sign up using the link below:
https://conteudo.lumiun.com/semana-da-seguranca-na-internet
Share the link with your colleagues and friends.