In the 36th of the Information Safety Week, tips for protecting your data, identifying cloning of WhatsApp, Legacy Firewalls, TI busy and more.
News
3 information security tips to protect your data
We have listed some valuable information security tips so you can protect your data and preserve the integrity of employees and customers.
By Rafaela Ricardo in Privacy Tech
How to identify WhatsApp's theft and cloning?
WhatsApp is the most widely used messenger in Brazil and has also become a common target of blows of all kinds. Between phishing attempts involving sharing fraudulent contact links to the use of the application to disseminate fake news, cloning may be the most dangerous form of attack, after all, not only puts the data from the victims, but also the money from nearby contacts.
By Felipe Demartini in Canal Tech
Companies eliminate legacy firewalls due to high costs and inability to prevent cyber attacks
According to Instituto Ponemon, companies believe Firewalls are ineffective to prevent attacks against applications, data centers and data in the cloud
In heat
Security Awareness: Do you really know how to protect yourself in the office?
With the exception of critical activities that need to be performed in person, remote work remains a standard for most Brazilian professionals. The offices remain closed because of the new coronavirus pandemic (Sars-Cov2) and will probably continue so until a covid-19 vaccine is spread. But and then? What will really happen within the new normal?
By Ramon de Souza in The Hack
Busy IT: more team productivity with less effort
In this article, we will address the main difficulties of “lonely” IT professionals in companies and some ways to improve the productivity of both the team and the IT itself in a simple and applicable way in almost all branches.
By Kelvin Zimmer on Lumiun Blog
Pix will not have dedicated security and BC will not be responsible for hacks
The Central Bank of Brazil will launch Pix in a few days and the big question is: Is it safe?
By Neto Guaraci in Cointimes
Is prohibiting the solution? Social networks represent cyber risks to companies
As noted, the list of brands more explored by criminals to apply phishing blows against the end user is paradoxically inverse to the order of services whose access is often blocked within the corporate environment.
By Ramon de Souza in Canal Tech
Material
Event
IGF 2020
Main international space for discussion on internet governance from 06/11 to 11/17
Are you not yet registered on our newsletter to receive this content weekly in the email? Then subscribe through the link below:
https://conteudo.lumiun.com/semana-da-eguranca-na-internet
Share the link with your colleagues and friends.