information security

Information Security Week - Edition No. 36

In the 36th of the Information Safety Week, tips for protecting your data, identifying cloning of WhatsApp, Legacy Firewalls, TI busy and more.


News

3 information security tips to protect your data

We have listed some valuable information security tips so you can protect your data and preserve the integrity of employees and customers.

By Rafaela Ricardo in Privacy Tech

How to identify WhatsApp's theft and cloning?

WhatsApp is the most widely used messenger in Brazil and has also become a common target of blows of all kinds. Between phishing attempts involving sharing fraudulent contact links to the use of the application to disseminate fake news, cloning may be the most dangerous form of attack, after all, not only puts the data from the victims, but also the money from nearby contacts.

By Felipe Demartini in Canal Tech

Companies eliminate legacy firewalls due to high costs and inability to prevent cyber attacks

According to Instituto Ponemon, companies believe Firewalls are ineffective to prevent attacks against applications, data centers and data in the cloud

In heat

Security Awareness: Do you really know how to protect yourself in the office?

With the exception of critical activities that need to be performed in person, remote work remains a standard for most Brazilian professionals. The offices remain closed because of the new coronavirus pandemic (Sars-Cov2) and will probably continue so until a covid-19 vaccine is spread. But and then? What will really happen within the new normal?

By Ramon de Souza in The Hack

Busy IT: more team productivity with less effort

In this article, we will address the main difficulties of “lonely” IT professionals in companies and some ways to improve the productivity of both the team and the IT itself in a simple and applicable way in almost all branches.

By Kelvin Zimmer on Lumiun Blog

Pix will not have dedicated security and BC will not be responsible for hacks

The Central Bank of Brazil will launch Pix in a few days and the big question is: Is it safe?

By Neto Guaraci in Cointimes

Is prohibiting the solution? Social networks represent cyber risks to companies

As noted, the list of brands more explored by criminals to apply phishing blows against the end user is paradoxically inverse to the order of services whose access is often blocked within the corporate environment.

By Ramon de Souza in Canal Tech


Material


Event

IGF 2020

Main international space for discussion on internet governance from 06/11 to 11/17  


Are you not yet registered on our newsletter to receive this content weekly in the email? Then subscribe through the link below:

https://conteudo.lumiun.com/semana-da-eguranca-na-internet

Share the link with your colleagues and friends.

Lumiun DNS Free Trial
Related Posts