{"id":191022,"date":"2021-03-04T10:45:51","date_gmt":"2021-03-04T13:45:51","guid":{"rendered":"https:\/\/www.lumiun.com\/blog\/?p=191022"},"modified":"2022-05-02T14:57:53","modified_gmt":"2022-05-02T17:57:53","slug":"seguranca-de-e-mail-7-licoes-de-2020","status":"publish","type":"post","link":"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/","title":{"rendered":"Seguran\u00e7a de e-mail: 7 li\u00e7\u00f5es de 2020"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Existe uma diversidade de atua\u00e7\u00f5es empresariais espalhadas pelo mundo, que se unem e se comunicam de uma forma comum entre elas: o e-mail. O e-mail continua sendo a forma de comunica\u00e7\u00e3o mais utilizada no ambiente de neg\u00f3cios e, ao que tudo indica, continuar\u00e1 sendo.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Em 2020 tivemos diversos aprendizados, e talvez o maior deles seja o trabalho \u00e0 dist\u00e2ncia. Mas, al\u00e9m disso, os dados coletados pelas empresas de pesquisa em seguran\u00e7a cibern\u00e9tica, nos trouxeram outras grandes fontes de conhecimento para 2021.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Neste artigo, vamos abordar os dados de ataques cibern\u00e9ticos e amea\u00e7as virtuais vindas por e-mail em 2020 no ambiente empresarial, e tamb\u00e9m, listar as 7 li\u00e7\u00f5es que estes dados nos deixaram, para que profissionais e empresas n\u00e3o cometam novamente os mesmos erros.<\/span><\/p>\n<h2 id=\"7-licoes-de-2020-sobre-seguranca-de-e-mail-empresarial\">7 li\u00e7\u00f5es de 2020 sobre seguran\u00e7a de e-mail empresarial<\/h2>\n<p><span style=\"font-weight: 400;\">Ao longo dos anos a preocupa\u00e7\u00e3o com seguran\u00e7a cibern\u00e9tica foi aumentando, acompanhando o aumento dos ataques cibern\u00e9ticos e principalmente, a efetividade deles, conseguindo roubar dados, extorquir empresas e pessoas e fazer transfer\u00eancias banc\u00e1rias, como \u00e9 poss\u00edvel ver em nossa <\/span><a href=\"https:\/\/conteudo.lumiun.com\/semana-da-seguranca-na-internet\"><span style=\"font-weight: 400;\">newsletter de seguran\u00e7a na internet<\/span><\/a><span style=\"font-weight: 400;\">. Mas, o e-mail empresarial, continua sendo um alvo constante dos criminosos digitais, agravado pela pandemia, com grande parte dos profissionais <\/span><a href=\"https:\/\/www.lumiun.com\/blog\/home-office-permanente-sera-o-novo-normal\/\"><span style=\"font-weight: 400;\">trabalhando em home office<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Diante deste cen\u00e1rio, 2020 trouxe diversas li\u00e7\u00f5es para empresas e profissionais que buscam mais seguran\u00e7a no e-mail, como voc\u00ea pode ver a seguir.<\/span><\/p>\n<h3 id=\"licao-1-preocupacao-com-seguranca-de-e-mail-ainda-e-importante\">Li\u00e7\u00e3o 1: Preocupa\u00e7\u00e3o com seguran\u00e7a de e-mail ainda \u00e9 importante<\/h3>\n<p><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20201.jpg.webp 1601w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20201-500x148.jpg.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20201-1140x337.jpg.webp 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20201-768x227.jpg.webp 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20201-1536x454.jpg.webp 1536w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20201-380x112.jpg.webp 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20201-800x236.jpg.webp 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20201-1160x343.jpg.webp 1160w\" sizes=\"(max-width: 1601px) 100vw, 1601px\" type=\"image\/webp\"><img decoding=\"async\" class=\"alignnone wp-image-195871 size-full webpexpress-processed\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20201.jpg\" alt=\"seguran\u00e7a de e-mail\" width=\"1601\" height=\"473\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20201.jpg 1601w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20201-500x148.jpg 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20201-1140x337.jpg 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20201-768x227.jpg 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20201-1536x454.jpg 1536w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20201-380x112.jpg 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20201-800x236.jpg 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20201-1160x343.jpg 1160w\" sizes=\"(max-width: 1601px) 100vw, 1601px\"><\/picture><\/p>\n<p><span style=\"font-weight: 400;\">Mesmo sendo um meio de comunica\u00e7\u00e3o considerado antigo, o e-mail corporativo ainda \u00e9 muito utilizado, e merece sim a aten\u00e7\u00e3o dos gestores e profissionais respons\u00e1veis pela seguran\u00e7a do mesmo. Segundo a pesquisa <\/span><a href=\"https:\/\/www.mimecast.com\/globalassets\/cyber-resilience-content\/the_state_of_email_security_report_2020.pdf\"><span style=\"font-weight: 400;\">The State of Email Security 2020<\/span><\/a><span style=\"font-weight: 400;\">, 60% dos gestores e profissionais entrevistados na pesquisa, acreditam que inevitavelmente sofrer\u00e3o um ataque por e-mail este ano. Al\u00e9m disso, os mesmos 60% perceberam um aumento de tentativas de fraude e falsifica\u00e7\u00e3o de identidade em seus e-mails corporativos em 2020.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Portanto, preocupar-se em oferecer <\/span><a href=\"https:\/\/www.lumiun.com\/blog\/guia-de-seguranca-na-internet-para-empresas\/\"><span style=\"font-weight: 400;\">ferramentas, sistemas e treinamento de seguran\u00e7a<\/span><\/a><span style=\"font-weight: 400;\"> no e-mail empresarial \u00e9 importante e deve fazer parte do <\/span><a href=\"https:\/\/www.lumiun.com\/blog\/como-montar-um-bom-planejamento-de-ti-para-empresas-em-2021\/\"><span style=\"font-weight: 400;\">planejamento estrat\u00e9gico<\/span><\/a><span style=\"font-weight: 400;\"> dentro das empresas para este ano.<\/span><\/p>\n<h3 id=\"licao-2-ataques-de-phishing-vem-aumentando\">Li\u00e7\u00e3o 2: Ataques de phishing v\u00eam aumentando<\/h3>\n<p><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20202.jpg.webp 1601w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20202-500x148.jpg.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20202-1140x337.jpg.webp 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20202-768x227.jpg.webp 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20202-1536x454.jpg.webp 1536w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20202-380x112.jpg.webp 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20202-800x236.jpg.webp 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20202-1160x343.jpg.webp 1160w\" sizes=\"(max-width: 1601px) 100vw, 1601px\" type=\"image\/webp\"><img decoding=\"async\" class=\"alignnone wp-image-195873 size-full webpexpress-processed\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20202.jpg\" alt=\"Ataques de phishing\" width=\"1601\" height=\"473\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20202.jpg 1601w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20202-500x148.jpg 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20202-1140x337.jpg 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20202-768x227.jpg 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20202-1536x454.jpg 1536w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20202-380x112.jpg 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20202-800x236.jpg 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20202-1160x343.jpg 1160w\" sizes=\"(max-width: 1601px) 100vw, 1601px\"><\/picture><\/p>\n<p><span style=\"font-weight: 400;\">Como falamos anteriormente, os ataques v\u00eam aumentando progressivamente, aproveitando o cen\u00e1rio favor\u00e1vel e campanhas baseadas em dados sobre a pandemia. Na pesquisa <\/span><a href=\"https:\/\/www.mimecast.com\/globalassets\/cyber-resilience-content\/the_state_of_email_security_report_2020.pdf\"><span style=\"font-weight: 400;\">The State of Email Security 2020<\/span><\/a><span style=\"font-weight: 400;\">, 72% dos entrevistados viram um aumento no recebimento de e-mails de phishing em suas empresas e tamb\u00e9m, foi constatado um crescimento de 30% na falsifica\u00e7\u00e3o de identidade de janeiro a abril de 2020.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Procurando por usu\u00e1rios despreparados ou desatentos, o ataque de phishing \u00e9 muito utilizado, em busca de dados banc\u00e1rios e de acesso principalmente.<\/span><\/p>\n<h3 id=\"licao-3-ataques-de-ransomware-ainda-causam-inatividade\">Li\u00e7\u00e3o 3: Ataques de ransomware ainda causam inatividade<\/h3>\n<p><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20203.jpg.webp 1601w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20203-500x148.jpg.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20203-1140x337.jpg.webp 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20203-768x227.jpg.webp 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20203-1536x454.jpg.webp 1536w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20203-380x112.jpg.webp 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20203-800x236.jpg.webp 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20203-1160x343.jpg.webp 1160w\" sizes=\"(max-width: 1601px) 100vw, 1601px\" type=\"image\/webp\"><img decoding=\"async\" class=\"alignnone wp-image-195874 size-full webpexpress-processed\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20203.jpg\" alt=\"Ataques de ransomware\" width=\"1601\" height=\"473\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20203.jpg 1601w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20203-500x148.jpg 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20203-1140x337.jpg 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20203-768x227.jpg 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20203-1536x454.jpg 1536w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20203-380x112.jpg 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20203-800x236.jpg 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20203-1160x343.jpg 1160w\" sizes=\"(max-width: 1601px) 100vw, 1601px\"><\/picture><\/p>\n<p><span style=\"font-weight: 400;\">O que se espera com a evolu\u00e7\u00e3o tecnol\u00f3gica \u00e9 que com o passar do tempo as medidas de prote\u00e7\u00e3o ou de corre\u00e7\u00e3o de problemas relacionados \u00e0 ataques cibern\u00e9ticos melhorem e se tornem mais efetivas. Mas, a verdade \u00e9 que os efeitos colaterais de ataques de ransomware n\u00e3o v\u00eam melhorando ano ap\u00f3s ano. Segundo o <\/span><a href=\"https:\/\/www.mimecast.com\/globalassets\/cyber-resilience-content\/the_state_of_email_security_report_2020.pdf\"><span style=\"font-weight: 400;\">TMTC 2020<\/span><\/a><span style=\"font-weight: 400;\"> (The State of Email Security 2020), entre os entrevistados que sofreram um ataque deste tipo na empresa, a m\u00e9dia de tempo de inatividade da empresa ap\u00f3s o ataque foi de 3 dias.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Imagine 3 dias sem sistema, banco de dados, com funcion\u00e1rios parados esperando a corre\u00e7\u00e3o. Para qualquer tamanho de empresa, isso seria catastr\u00f3fico.<\/span><\/p>\n<h3 id=\"licao-3-treinamento-de-equipe-ainda-nao-e-levado-a-serio\">Li\u00e7\u00e3o 3: Treinamento de equipe ainda n\u00e3o \u00e9 levado a s\u00e9rio<\/h3>\n<p><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20204.jpg.webp 1601w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20204-500x148.jpg.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20204-1140x337.jpg.webp 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20204-768x227.jpg.webp 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20204-1536x454.jpg.webp 1536w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20204-380x112.jpg.webp 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20204-800x236.jpg.webp 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20204-1160x343.jpg.webp 1160w\" sizes=\"(max-width: 1601px) 100vw, 1601px\" type=\"image\/webp\"><img decoding=\"async\" class=\"alignnone wp-image-195876 size-full webpexpress-processed\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20204.jpg\" alt=\"Ataques de spoofing\" width=\"1601\" height=\"473\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20204.jpg 1601w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20204-500x148.jpg 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20204-1140x337.jpg 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20204-768x227.jpg 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20204-1536x454.jpg 1536w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20204-380x112.jpg 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20204-800x236.jpg 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20204-1160x343.jpg 1160w\" sizes=\"(max-width: 1601px) 100vw, 1601px\"><\/picture><\/p>\n<p><span style=\"font-weight: 400;\">J\u00e1 falamos diversas vezes aqui no blog, e repetir nunca \u00e9 demais: <\/span><a href=\"https:\/\/www.lumiun.com\/blog\/conscientizar-os-colaboradores-e-suficiente-para-livrar-sua-empresa-do-phishing\/\"><span style=\"font-weight: 400;\">conscientizar os colaboradores<\/span><\/a><span style=\"font-weight: 400;\"> sobre seguran\u00e7a na internet, principalmente no uso de e-mails, \u00e9 muito importante. Apenas 21% dos entrevistados na pesquisa TMTC 2020 oferecem treinamento mensal aos seus colaboradores sobre seguran\u00e7a do e-mail empresarial. A grande maioria, deixa a cargo do bom senso e conhecimento do funcion\u00e1rio para manter os dados que trafegam no e-mail seguros.<\/span><\/p>\n<h3 id=\"licao-5-falta-de-treinamento-causa-vazamento-de-dados\">Li\u00e7\u00e3o 5: Falta de treinamento causa vazamento de dados<\/h3>\n<p><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20205.jpg.webp 1601w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20205-500x148.jpg.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20205-1140x337.jpg.webp 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20205-768x227.jpg.webp 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20205-1536x454.jpg.webp 1536w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20205-380x112.jpg.webp 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20205-800x236.jpg.webp 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20205-1160x343.jpg.webp 1160w\" sizes=\"(max-width: 1601px) 100vw, 1601px\" type=\"image\/webp\"><img decoding=\"async\" class=\"alignnone wp-image-195878 size-full webpexpress-processed\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20205.jpg\" alt=\"Ataques de spoofing\" width=\"1601\" height=\"473\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20205.jpg 1601w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20205-500x148.jpg 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20205-1140x337.jpg 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20205-768x227.jpg 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20205-1536x454.jpg 1536w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20205-380x112.jpg 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20205-800x236.jpg 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20205-1160x343.jpg 1160w\" sizes=\"(max-width: 1601px) 100vw, 1601px\"><\/picture><\/p>\n<p><span style=\"font-weight: 400;\">Muitos se perguntam se treinar funcion\u00e1rios realmente diminui os riscos de ataques cibern\u00e9ticos. Segundo a pesquisa TMTC 2020, a aus\u00eancia de conscientiza\u00e7\u00e3o de seguran\u00e7a de e-mail empresarial, termina em cliques em links nocivos e vazamento de dados da empresa. Na pesquisa, foi constatado que empresas que n\u00e3o usam m\u00e9todos de treinamento com a equipe, s\u00e3o 5 vezes mais propensos a clicar em arquivos maliciosos. Al\u00e9m disso, 60% dos entrevistados foram atingidos por ataques deste tipo e ainda propagaram o malware com outros colaboradores da empresa.<\/span><\/p>\n<h3 id=\"licao-6-ataques-de-spoofing-estao-crescendo\">Li\u00e7\u00e3o 6: Ataques de spoofing est\u00e3o crescendo<\/h3>\n<p><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20206.jpg.webp 1601w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20206-500x148.jpg.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20206-1140x337.jpg.webp 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20206-768x227.jpg.webp 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20206-1536x454.jpg.webp 1536w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20206-380x112.jpg.webp 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20206-800x236.jpg.webp 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20206-1160x343.jpg.webp 1160w\" sizes=\"(max-width: 1601px) 100vw, 1601px\" type=\"image\/webp\"><img decoding=\"async\" class=\"alignnone wp-image-195879 size-full webpexpress-processed\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20206.jpg\" alt=\"Ataques de spoofing\" width=\"1601\" height=\"473\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20206.jpg 1601w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20206-500x148.jpg 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20206-1140x337.jpg 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20206-768x227.jpg 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20206-1536x454.jpg 1536w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20206-380x112.jpg 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20206-800x236.jpg 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20206-1160x343.jpg 1160w\" sizes=\"(max-width: 1601px) 100vw, 1601px\"><\/picture><\/p>\n<p><span style=\"font-weight: 400;\">Quando algu\u00e9m finge ser uma pessoa da empresa, ou algu\u00e9m conhecido, tentando acessar informa\u00e7\u00f5es sigilosas da empresa, se enquadra como um <\/span><a href=\"https:\/\/www.avast.com\/pt-br\/c-spoofing\"><span style=\"font-weight: 400;\">ataque de spoofing<\/span><\/a><span style=\"font-weight: 400;\">. Normalmente em busca de ganhos financeiros, este ataque \u00e9 muito comum, e bastante utilizado, afinal, nas redes sociais hoje, qualquer pessoa consegue obter muitas informa\u00e7\u00f5es sobre qualquer pessoa, utilizando estas informa\u00e7\u00f5es para persuadir usu\u00e1rios a fornecer acesso a sistemas e dados da empresa.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Em m\u00e9dia ocorrem 9 ataques de spoofing de e-mail por organiza\u00e7\u00e3o a cada ano, segundo a pesquisa TMTC 2020. Portanto, cuidar de quais informa\u00e7\u00f5es sobre a empresa s\u00e3o divulgadas \u00e9 muito importante. Al\u00e9m disso, \u00e9 sempre bom desconfiar de e-mails amig\u00e1veis solicitando dados e acessos.<\/span><\/p>\n<h3 id=\"licao-7-sistemas-de-seguranca-na-internet-da-empresa-nunca-foram-tao-importantes\">Li\u00e7\u00e3o 7: Sistemas de seguran\u00e7a na internet da empresa nunca foram t\u00e3o importantes<\/h3>\n<p><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20207.jpg.webp 1601w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20207-500x148.jpg.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20207-1140x337.jpg.webp 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20207-768x227.jpg.webp 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20207-1536x454.jpg.webp 1536w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20207-380x112.jpg.webp 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20207-800x236.jpg.webp 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Seguranca-de-e-mail-7-licoes-de-20207-1160x343.jpg.webp 1160w\" sizes=\"(max-width: 1601px) 100vw, 1601px\" type=\"image\/webp\"><img decoding=\"async\" class=\"alignnone wp-image-195880 size-full webpexpress-processed\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20207.jpg\" alt=\"seguran\u00e7a de e-mail\" width=\"1601\" height=\"473\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20207.jpg 1601w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20207-500x148.jpg 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20207-1140x337.jpg 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20207-768x227.jpg 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20207-1536x454.jpg 1536w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20207-380x112.jpg 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20207-800x236.jpg 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-20207-1160x343.jpg 1160w\" sizes=\"(max-width: 1601px) 100vw, 1601px\"><\/picture><\/p>\n<p><span style=\"font-weight: 400;\">Podemos concordar que estrat\u00e9gias e sistemas de seguran\u00e7a na internet, principalmente em e-mails, s\u00e3o importantes, mas n\u00e3o s\u00e3o implementados pela grande maioria das empresas. Novamente citando dados da pesquisa TMTC 2020, 40% das empresas entrevistadas n\u00e3o tem um sistema de monitoramento e prote\u00e7\u00e3o contra ataques cibern\u00e9ticos, ou algum plano de conting\u00eancia em caso de vazamento de dados e 60% das organiza\u00e7\u00f5es acreditam que \u00e9 inevit\u00e1vel sofrer um ataque por e-mail este ano.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Resumidamente, a preocupa\u00e7\u00e3o \u00e9 grande, mas os esfor\u00e7os para conter estes ataques nem sempre s\u00e3o.<\/span><\/p>\n<h2 id=\"como-evitar-problemas-de-seguranca-no-e-mail\">Como evitar problemas de seguran\u00e7a no e-mail?<\/h2>\n<p><span style=\"font-weight: 400;\">O que se pensa na maior parte das empresas \u00e9 o que fazer depois de sofrer um ataque cibern\u00e9tico. <\/span><a href=\"https:\/\/www.lumiun.com\/blog\/backup-dicas-e-12-ferramentas-para-empresas\/\"><span style=\"font-weight: 400;\">Ferramentas de backup<\/span><\/a><span style=\"font-weight: 400;\">, por exemplo, podem solucionar problemas como este, mas n\u00e3o livram a empresa de novos ataques, nem d\u00e1 dor de cabe\u00e7a de restaurar todos os dados e ficar um tempo inativo, por exemplo.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">O ideal \u00e9 <\/span><b>evitar<\/b><span style=\"font-weight: 400;\"> vazamento de dados n\u00e3o apenas por e-mail, mas tamb\u00e9m em outras poss\u00edveis portas de entrada para criminosos digitais. <\/span><a href=\"https:\/\/www.lumiun.com\/blog\/confira-8-beneficios-do-controle-de-acesso-a-internet-nas-empresas\/\"><span style=\"font-weight: 400;\">Ferramentas de gest\u00e3o e controle de acesso \u00e0 internet<\/span><\/a><span style=\"font-weight: 400;\"> podem evitar a grande maioria destes ataques, e de quebra, tirar o peso das costas dos funcion\u00e1rios de serem os principais respons\u00e1veis pelas quebras de seguran\u00e7a.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Com o Lumiun Box por exemplo, \u00e9 poss\u00edvel fazer o bloqueio de sites considerados nocivos, evitando que funcion\u00e1rios desatentos ou sem conhecimento acessem sites enviados no e-mail da empresa. Al\u00e9m disso, o sistema de gest\u00e3o do acesso \u00e0 internet do Lumiun, faz o controle de muitos outros sites, como redes sociais e pornografia. Dessa forma \u00e9 poss\u00edvel proteger os dados da empresa e tamb\u00e9m, manter os funcion\u00e1rios focados e produtivos durante o hor\u00e1rio de trabalho.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Se voc\u00ea quiser saber mais sobre as solu\u00e7\u00f5es do Lumiun, <\/span><a href=\"https:\/\/go.lumiun.com\/testar\"><span style=\"font-weight: 400;\">fa\u00e7a um teste gr\u00e1tis<\/span><\/a><span style=\"font-weight: 400;\">, ou <\/span><a href=\"https:\/\/go.lumiun.com\/fale-consultor\"><span style=\"font-weight: 400;\">agende uma demonstra\u00e7\u00e3o<\/span><\/a><span style=\"font-weight: 400;\"> sem compromisso com nosso consultor, e veja na pr\u00e1tica como podemos ajudar a proteger seus dispositivos de amea\u00e7as por e-mail.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"Existe uma diversidade de atua\u00e7\u00f5es empresariais espalhadas pelo mundo, que se unem e se comunicam de uma forma&hellip;\n","protected":false},"author":11,"featured_media":191023,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"content-type":"","footnotes":""},"categories":[327],"tags":[328,201,106,72,21,58,125,44,137,236,138],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Seguran\u00e7a de e-mail: 7 li\u00e7\u00f5es de 2020 | Lumiun Blog<\/title>\n<meta name=\"description\" content=\"Veja no artigo 7 li\u00e7\u00f5es importantes sobre seguran\u00e7a de e-mail que aprendemos em 2020, e tamb\u00e9m, algumas formas de se proteger na internet.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seguran\u00e7a de e-mail: 7 li\u00e7\u00f5es de 2020 | Lumiun Blog\" \/>\n<meta property=\"og:description\" content=\"Veja no artigo 7 li\u00e7\u00f5es importantes sobre seguran\u00e7a de e-mail que aprendemos em 2020, e tamb\u00e9m, algumas formas de se proteger na internet.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"Lumiun Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LumiunTecnologia\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-04T13:45:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-02T17:57:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-2020.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1601\" \/>\n\t<meta property=\"og:image:height\" content=\"945\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kelvin Zimmer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kelvin Zimmer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/\"},\"author\":{\"name\":\"Kelvin Zimmer\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77\"},\"headline\":\"Seguran\u00e7a de e-mail: 7 li\u00e7\u00f5es de 2020\",\"datePublished\":\"2021-03-04T13:45:51+00:00\",\"dateModified\":\"2022-05-02T17:57:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/\"},\"wordCount\":1250,\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-2020.jpg\",\"keywords\":[\"ataque cibern\u00e9tico\",\"ciberataque\",\"ciberseguran\u00e7a\",\"e-mail\",\"lumiun\",\"phishing\",\"prote\u00e7\u00e3o de dados\",\"ransomware\",\"seguran\u00e7a da informa\u00e7\u00e3o\",\"seguran\u00e7a de dados\",\"seguran\u00e7a na internet\"],\"articleSection\":[\"Ciberseguran\u00e7a\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/\",\"name\":\"Seguran\u00e7a de e-mail: 7 li\u00e7\u00f5es de 2020 | Lumiun Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-2020.jpg\",\"datePublished\":\"2021-03-04T13:45:51+00:00\",\"dateModified\":\"2022-05-02T17:57:53+00:00\",\"description\":\"Veja no artigo 7 li\u00e7\u00f5es importantes sobre seguran\u00e7a de e-mail que aprendemos em 2020, e tamb\u00e9m, algumas formas de se proteger na internet.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/#primaryimage\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-2020.jpg\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-2020.jpg\",\"width\":1601,\"height\":945,\"caption\":\"seguran\u00e7a de e-mail\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.lumiun.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguran\u00e7a de e-mail: 7 li\u00e7\u00f5es de 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"name\":\"Lumiun Blog\",\"description\":\"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI\",\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\",\"name\":\"Lumiun Tecnologia\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"width\":1500,\"height\":930,\"caption\":\"Lumiun Tecnologia\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/LumiunTecnologia\/\",\"https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/\",\"https:\/\/www.youtube.com\/LumiunNetwork\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77\",\"name\":\"Kelvin Zimmer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g\",\"caption\":\"Kelvin Zimmer\"},\"description\":\"Colunista de ciberseguran\u00e7a, especialista em produtividade e Analista de Marketing na Lumiun.\",\"sameAs\":[\"http:\/\/lumiun.com\"],\"url\":\"https:\/\/www.lumiun.com\/blog\/author\/kelvin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seguran\u00e7a de e-mail: 7 li\u00e7\u00f5es de 2020 | Lumiun Blog","description":"Veja no artigo 7 li\u00e7\u00f5es importantes sobre seguran\u00e7a de e-mail que aprendemos em 2020, e tamb\u00e9m, algumas formas de se proteger na internet.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/","og_locale":"pt_BR","og_type":"article","og_title":"Seguran\u00e7a de e-mail: 7 li\u00e7\u00f5es de 2020 | Lumiun Blog","og_description":"Veja no artigo 7 li\u00e7\u00f5es importantes sobre seguran\u00e7a de e-mail que aprendemos em 2020, e tamb\u00e9m, algumas formas de se proteger na internet.","og_url":"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/","og_site_name":"Lumiun Blog","article_publisher":"https:\/\/www.facebook.com\/LumiunTecnologia\/","article_published_time":"2021-03-04T13:45:51+00:00","article_modified_time":"2022-05-02T17:57:53+00:00","og_image":[{"width":1601,"height":945,"url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-2020.jpg","type":"image\/jpeg"}],"author":"Kelvin Zimmer","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Kelvin Zimmer","Est. tempo de leitura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/#article","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/"},"author":{"name":"Kelvin Zimmer","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77"},"headline":"Seguran\u00e7a de e-mail: 7 li\u00e7\u00f5es de 2020","datePublished":"2021-03-04T13:45:51+00:00","dateModified":"2022-05-02T17:57:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/"},"wordCount":1250,"publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-2020.jpg","keywords":["ataque cibern\u00e9tico","ciberataque","ciberseguran\u00e7a","e-mail","lumiun","phishing","prote\u00e7\u00e3o de dados","ransomware","seguran\u00e7a da informa\u00e7\u00e3o","seguran\u00e7a de dados","seguran\u00e7a na internet"],"articleSection":["Ciberseguran\u00e7a"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/","url":"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/","name":"Seguran\u00e7a de e-mail: 7 li\u00e7\u00f5es de 2020 | Lumiun Blog","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/#primaryimage"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-2020.jpg","datePublished":"2021-03-04T13:45:51+00:00","dateModified":"2022-05-02T17:57:53+00:00","description":"Veja no artigo 7 li\u00e7\u00f5es importantes sobre seguran\u00e7a de e-mail que aprendemos em 2020, e tamb\u00e9m, algumas formas de se proteger na internet.","breadcrumb":{"@id":"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/#primaryimage","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-2020.jpg","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Seguranca-de-e-mail-7-licoes-de-2020.jpg","width":1601,"height":945,"caption":"seguran\u00e7a de e-mail"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lumiun.com\/blog\/seguranca-de-e-mail-7-licoes-de-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.lumiun.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Seguran\u00e7a de e-mail: 7 li\u00e7\u00f5es de 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.lumiun.com\/blog\/#website","url":"https:\/\/www.lumiun.com\/blog\/","name":"Lumiun Blog","description":"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI","publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.lumiun.com\/blog\/#organization","name":"Lumiun Tecnologia","url":"https:\/\/www.lumiun.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","width":1500,"height":930,"caption":"Lumiun Tecnologia"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LumiunTecnologia\/","https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/","https:\/\/www.youtube.com\/LumiunNetwork"]},{"@type":"Person","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77","name":"Kelvin Zimmer","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g","caption":"Kelvin Zimmer"},"description":"Colunista de ciberseguran\u00e7a, especialista em produtividade e Analista de Marketing na Lumiun.","sameAs":["http:\/\/lumiun.com"],"url":"https:\/\/www.lumiun.com\/blog\/author\/kelvin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/191022"}],"collection":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/comments?post=191022"}],"version-history":[{"count":4,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/191022\/revisions"}],"predecessor-version":[{"id":195890,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/191022\/revisions\/195890"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media\/191023"}],"wp:attachment":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media?parent=191022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/categories?post=191022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/tags?post=191022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}