{"id":385691,"date":"2021-11-29T11:43:30","date_gmt":"2021-11-29T14:43:30","guid":{"rendered":"https:\/\/www.lumiun.com\/blog\/?p=385691"},"modified":"2022-08-31T14:48:58","modified_gmt":"2022-08-31T17:48:58","slug":"a-semana-da-seguranca-na-internet-edicao-no-92","status":"publish","type":"post","link":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/","title":{"rendered":"A Semana da Seguran\u00e7a na Internet \u2013 Edi\u00e7\u00e3o N\u00ba 92"},"content":{"rendered":"<p>Na edi\u00e7\u00e3o n\u00ba 92 da Semana da Seguran\u00e7a na Internet, com\u00e9rcio criminoso de dados corporativos facilita os ataques de ransomware, Proxyware gera dor de cabe\u00e7a para empresa, tend\u00eancias de ciberseguran\u00e7a para 2022 e muito mais.<\/p>\n<hr \/>\n<h2 id=\"noticias\">Not\u00edcias<\/h2>\n<h3 id=\"comercio-criminoso-de-dados-corporativos-e-o-maior-facilitador-de-ransomware\" class=\"margin-bottom-10 title titulo-principal\"><a href=\"https:\/\/canaltech.com.br\/seguranca\/comercio-criminoso-de-dados-corporativos-e-o-maior-facilitador-de-ransomware-202730\/\">Com\u00e9rcio criminoso de dados corporativos \u00e9 o maior facilitador de ransomware<\/a><\/h3>\n<p>Um levantamento feito pela empresa de seguran\u00e7a digital Trend Micro apontou o com\u00e9rcio de credenciais corporativas como o principal facilitador dos ataques de ransomware<\/p>\n<p><span style=\"color: #999999;\"><em>Por Felipe Demartini em Canaltech<\/em><\/span><\/p>\n<h3 id=\"maioria-dos-ataques-de-forca-bruta-tenta-violar-senhas-curtas\"><a href=\"https:\/\/www.welivesecurity.com\/br\/2021\/11\/26\/a-maioria-dos-ataques-de-forca-bruta-tenta-violar-senhas-curtas\/\">Maioria dos ataques de for\u00e7a bruta tenta violar senhas curtas<\/a><\/h3>\n<p>De acordo com uma an\u00e1lise baseada em 25 milh\u00f5es de ataques de for\u00e7a bruta, 77% das tentativas de viola\u00e7\u00e3o de senhas estavam direcionadas a chaves de entre 1 e 7 caracteres.<\/p>\n<p><span style=\"color: #999999;\"><em>Por Juan Manuel Har\u00e1n em Welivesecurity<\/em><\/span><\/p>\n<h3 id=\"proxyware-dor-de-cabeca-para-empresas\" class=\"c-article__title\"><a href=\"https:\/\/www.kaspersky.com.br\/blog\/proxyware\/18554\/\">Proxyware: dor de cabe\u00e7a para empresas<\/a><\/h3>\n<p>Os funcion\u00e1rios podem instalar proxyware sem o conhecimento de seu empregador, introduzindo riscos cibern\u00e9ticos adicionais.<\/p>\n<p><span style=\"color: #999999;\"><em>Em Kaspersky Daily<\/em><\/span><\/p>\n<h3 id=\"o-trabalho-hibrido-ainda-esta-colocando-algumas-empresas-em-risco-de-ataque-cibernetico\"><a href=\"https:\/\/www.techradar.com\/news\/hybrid-working-is-still-putting-some-businesses-at-risk-of-cyberattack\">O trabalho h\u00edbrido ainda est\u00e1 colocando algumas empresas em risco de ataque cibern\u00e9tico<\/a><\/h3>\n<p>Endpoints remotos servem como gateways de ataque, temem os especialistas<\/p>\n<p><span style=\"color: #999999;\"><em>Em Techradar<\/em><\/span><\/p>\n<h3 id=\"tendencias-em-ciberseguranca-2022-entre-a-evolucao-das-ameacas-e-os-desafios-do-trabalho-hibrido\"><a href=\"https:\/\/www.welivesecurity.com\/br\/2021\/11\/24\/tendencias-em-ciberseguranca-2022-evolucao-ameacas-desafios-trabalho-hibrido\/\">Tend\u00eancias em ciberseguran\u00e7a 2022: entre a evolu\u00e7\u00e3o das amea\u00e7as e os desafios do trabalho h\u00edbrido<\/a><\/h3>\n<p>O trabalho h\u00edbrido ser\u00e1 um dos principais desafios enfrentados por muitas organiza\u00e7\u00f5es no caminho para o novo normal.<\/p>\n<p><span style=\"color: #999999;\"><em>Por Cecilia Pastorino em Welivesecurity<\/em><\/span><\/p>\n<h3 id=\"sofreu-um-ataque-de-ransomware-certifique-se-de-nao-cometer-este-erros\"><a href=\"https:\/\/www.zdnet.com\/article\/hit-by-ransomware-make-sure-you-dont-make-this-first-obvious-mistake\/\">Sofreu um ataque de ransomware? Certifique-se de n\u00e3o cometer este erros<\/a><\/h3>\n<p>Os pesquisadores de seguran\u00e7a cibern\u00e9tica analisaram 700 negocia\u00e7\u00f5es de ransomware entre v\u00edtimas e criminosos.\u00a0Aqui est\u00e1 o que eles encontraram.<\/p>\n<p><span style=\"color: #999999;\"><em>Por\u00a0Danny Palmer em ZDNet<\/em><\/span><\/p>\n<h3 id=\"cronrat-um-novo-malware-linux-programado-para-execucao-em-31-de-fevereiro\" class=\"story-title\"><a href=\"https:\/\/thehackernews.com\/2021\/11\/cronrat-new-linux-malware-thats.html\">CronRAT: um novo malware Linux programado para execu\u00e7\u00e3o em 31 de fevereiro<\/a><\/h3>\n<p>Os pesquisadores descobriram um novo trojan de acesso remoto (RAT) para Linux que emprega uma t\u00e9cnica furtiva nunca antes vista que envolve mascarar suas a\u00e7\u00f5es maliciosas, agendando-as para execu\u00e7\u00e3o em 31 de fevereiro, um dia de calend\u00e1rio inexistente.<\/p>\n<p><span style=\"color: #999999;\"><em>Em Thehackrnews<\/em><\/span><\/p>\n<hr \/>\n<h2 id=\"videos\">V\u00eddeos<\/h2>\n<p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/NtPH1HxqK2I\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/2LLBpH3nsg4\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<hr \/>\n<p>Voc\u00ea ainda n\u00e3o est\u00e1 inscrito na nossa newsletter para receber esse conte\u00fado semanalmente no e-mail? Ent\u00e3o se inscreva atrav\u00e9s do link abaixo:<\/p>\n<p><a href=\"https:\/\/br.lumiun.com\/semana-da-seguranca-na-internet\">https:\/\/br.lumiun.com\/semana-da-seguranca-na-internet<\/a><\/p>\n<p>Compartilhe o link com seus colegas e amigos.<\/p>\n","protected":false},"excerpt":{"rendered":"Na edi\u00e7\u00e3o n\u00ba 92 da Semana da Seguran\u00e7a na Internet, com\u00e9rcio criminoso de dados corporativos facilita os ataques&hellip;\n","protected":false},"author":1,"featured_media":385074,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"content-type":"","footnotes":""},"categories":[143],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Semana da Seguran\u00e7a na Internet \u2013 Edi\u00e7\u00e3o N\u00ba 92 | Lumiun Blog<\/title>\n<meta name=\"description\" content=\"Na edi\u00e7\u00e3o n\u00ba 92 da Semana da Seguran\u00e7a na Internet, com\u00e9rcio criminoso de dados corporativos facilita os ataques de ransomware, Proxyware gera dor de cabe\u00e7a para empresa, tend\u00eancias de ciberseguran\u00e7a para 2022 e muito mais.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Semana da Seguran\u00e7a na Internet \u2013 Edi\u00e7\u00e3o N\u00ba 92 | Lumiun Blog\" \/>\n<meta property=\"og:description\" content=\"Na edi\u00e7\u00e3o n\u00ba 92 da Semana da Seguran\u00e7a na Internet, com\u00e9rcio criminoso de dados corporativos facilita os ataques de ransomware, Proxyware gera dor de cabe\u00e7a para empresa, tend\u00eancias de ciberseguran\u00e7a para 2022 e muito mais.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/\" \/>\n<meta property=\"og:site_name\" content=\"Lumiun Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LumiunTecnologia\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-29T14:43:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-31T17:48:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-na-Internet-blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"945\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Al\u00e9x de Oliveira\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Al\u00e9x de Oliveira\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/\"},\"author\":{\"name\":\"Al\u00e9x de Oliveira\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/12a17ed19bd7b3c3a482f7ef1077590d\"},\"headline\":\"A Semana da Seguran\u00e7a na Internet \u2013 Edi\u00e7\u00e3o N\u00ba 92\",\"datePublished\":\"2021-11-29T14:43:30+00:00\",\"dateModified\":\"2022-08-31T17:48:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/\"},\"wordCount\":376,\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-na-Internet-blog.jpg\",\"articleSection\":[\"Semana da Seguran\u00e7a na Internet\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/\",\"name\":\"A Semana da Seguran\u00e7a na Internet \u2013 Edi\u00e7\u00e3o N\u00ba 92 | Lumiun Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-na-Internet-blog.jpg\",\"datePublished\":\"2021-11-29T14:43:30+00:00\",\"dateModified\":\"2022-08-31T17:48:58+00:00\",\"description\":\"Na edi\u00e7\u00e3o n\u00ba 92 da Semana da Seguran\u00e7a na Internet, com\u00e9rcio criminoso de dados corporativos facilita os ataques de ransomware, Proxyware gera dor de cabe\u00e7a para empresa, tend\u00eancias de ciberseguran\u00e7a para 2022 e muito mais.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/#primaryimage\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-na-Internet-blog.jpg\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-na-Internet-blog.jpg\",\"width\":1600,\"height\":945,\"caption\":\"semana da seguran\u00e7a na internet\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.lumiun.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Semana da Seguran\u00e7a na Internet \u2013 Edi\u00e7\u00e3o N\u00ba 92\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"name\":\"Lumiun Blog\",\"description\":\"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI\",\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\",\"name\":\"Lumiun Tecnologia\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"width\":1500,\"height\":930,\"caption\":\"Lumiun Tecnologia\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/LumiunTecnologia\/\",\"https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/\",\"https:\/\/www.youtube.com\/LumiunNetwork\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/12a17ed19bd7b3c3a482f7ef1077590d\",\"name\":\"Al\u00e9x de Oliveira\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7eb470d4e7f28f1be606747261c0b187?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7eb470d4e7f28f1be606747261c0b187?s=96&d=mm&r=g\",\"caption\":\"Al\u00e9x de Oliveira\"},\"description\":\"Sou cofundador e CTO da Lumiun, onde lidero o desenvolvimento das nossas solu\u00e7\u00f5es de seguran\u00e7a de rede, com foco em usabilidade, performance e escalabilidade, atendendo tanto MSPs quanto decisores de TI em empresas que buscam controle e prote\u00e7\u00e3o eficaz da navega\u00e7\u00e3o corporativa.\",\"url\":\"https:\/\/www.lumiun.com\/blog\/author\/alex\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Semana da Seguran\u00e7a na Internet \u2013 Edi\u00e7\u00e3o N\u00ba 92 | Lumiun Blog","description":"Na edi\u00e7\u00e3o n\u00ba 92 da Semana da Seguran\u00e7a na Internet, com\u00e9rcio criminoso de dados corporativos facilita os ataques de ransomware, Proxyware gera dor de cabe\u00e7a para empresa, tend\u00eancias de ciberseguran\u00e7a para 2022 e muito mais.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/","og_locale":"pt_BR","og_type":"article","og_title":"A Semana da Seguran\u00e7a na Internet \u2013 Edi\u00e7\u00e3o N\u00ba 92 | Lumiun Blog","og_description":"Na edi\u00e7\u00e3o n\u00ba 92 da Semana da Seguran\u00e7a na Internet, com\u00e9rcio criminoso de dados corporativos facilita os ataques de ransomware, Proxyware gera dor de cabe\u00e7a para empresa, tend\u00eancias de ciberseguran\u00e7a para 2022 e muito mais.","og_url":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/","og_site_name":"Lumiun Blog","article_publisher":"https:\/\/www.facebook.com\/LumiunTecnologia\/","article_published_time":"2021-11-29T14:43:30+00:00","article_modified_time":"2022-08-31T17:48:58+00:00","og_image":[{"width":1600,"height":945,"url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-na-Internet-blog.jpg","type":"image\/jpeg"}],"author":"Al\u00e9x de Oliveira","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Al\u00e9x de Oliveira","Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/#article","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/"},"author":{"name":"Al\u00e9x de Oliveira","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/12a17ed19bd7b3c3a482f7ef1077590d"},"headline":"A Semana da Seguran\u00e7a na Internet \u2013 Edi\u00e7\u00e3o N\u00ba 92","datePublished":"2021-11-29T14:43:30+00:00","dateModified":"2022-08-31T17:48:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/"},"wordCount":376,"publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-na-Internet-blog.jpg","articleSection":["Semana da Seguran\u00e7a na Internet"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/","url":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/","name":"A Semana da Seguran\u00e7a na Internet \u2013 Edi\u00e7\u00e3o N\u00ba 92 | Lumiun Blog","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/#primaryimage"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-na-Internet-blog.jpg","datePublished":"2021-11-29T14:43:30+00:00","dateModified":"2022-08-31T17:48:58+00:00","description":"Na edi\u00e7\u00e3o n\u00ba 92 da Semana da Seguran\u00e7a na Internet, com\u00e9rcio criminoso de dados corporativos facilita os ataques de ransomware, Proxyware gera dor de cabe\u00e7a para empresa, tend\u00eancias de ciberseguran\u00e7a para 2022 e muito mais.","breadcrumb":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/#primaryimage","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-na-Internet-blog.jpg","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-na-Internet-blog.jpg","width":1600,"height":945,"caption":"semana da seguran\u00e7a na internet"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-na-internet-edicao-no-92\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.lumiun.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Semana da Seguran\u00e7a na Internet \u2013 Edi\u00e7\u00e3o N\u00ba 92"}]},{"@type":"WebSite","@id":"https:\/\/www.lumiun.com\/blog\/#website","url":"https:\/\/www.lumiun.com\/blog\/","name":"Lumiun Blog","description":"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI","publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.lumiun.com\/blog\/#organization","name":"Lumiun Tecnologia","url":"https:\/\/www.lumiun.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","width":1500,"height":930,"caption":"Lumiun Tecnologia"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LumiunTecnologia\/","https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/","https:\/\/www.youtube.com\/LumiunNetwork"]},{"@type":"Person","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/12a17ed19bd7b3c3a482f7ef1077590d","name":"Al\u00e9x de Oliveira","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7eb470d4e7f28f1be606747261c0b187?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7eb470d4e7f28f1be606747261c0b187?s=96&d=mm&r=g","caption":"Al\u00e9x de Oliveira"},"description":"Sou cofundador e CTO da Lumiun, onde lidero o desenvolvimento das nossas solu\u00e7\u00f5es de seguran\u00e7a de rede, com foco em usabilidade, performance e escalabilidade, atendendo tanto MSPs quanto decisores de TI em empresas que buscam controle e prote\u00e7\u00e3o eficaz da navega\u00e7\u00e3o corporativa.","url":"https:\/\/www.lumiun.com\/blog\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/385691"}],"collection":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/comments?post=385691"}],"version-history":[{"count":1,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/385691\/revisions"}],"predecessor-version":[{"id":385692,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/385691\/revisions\/385692"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media\/385074"}],"wp:attachment":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media?parent=385691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/categories?post=385691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/tags?post=385691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}