{"id":4893,"date":"2020-03-16T14:25:53","date_gmt":"2020-03-16T17:25:53","guid":{"rendered":"https:\/\/www.lumiun.com\/blog\/?p=4893"},"modified":"2022-05-02T15:01:11","modified_gmt":"2022-05-02T18:01:11","slug":"semana-da-seguranca-da-informacao-edicao-no3","status":"publish","type":"post","link":"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/","title":{"rendered":"Semana da Seguran\u00e7a da Informa\u00e7\u00e3o \u2013 Edi\u00e7\u00e3o N\u00ba3"},"content":{"rendered":"<p>Nesta terceira edi\u00e7\u00e3o da <strong>Semana da Seguran\u00e7a da Informa\u00e7\u00e3o<\/strong>, pol\u00edtica de gest\u00e3o de dados, riscos de outros v\u00edrus com o home office, 40% das empresas brasileiras sem pol\u00edticas de ciberseguran\u00e7a, ataques dirigidos a dispositivos m\u00f3veis, falha no site &#8220;Galo na Veia&#8221;, vantagens da VPN para empresas e manual de utiliza\u00e7\u00e3o segura na internet.<\/p>\n<hr \/>\n<h2 id=\"noticias\">Not\u00edcias<\/h2>\n<h3 id=\"controle-id\" class=\"historia-titulo\"><span id=\"por-que-e-tao-importante-criar-uma-politica-de-gestao-de-dados\"><a href=\"https:\/\/cio.com.br\/por-que-e-tao-importante-criar-uma-politica-de-gestao-de-dados\/?utm_source=blog&amp;utm_medium=post&amp;utm_campaign=semana-seguranca-informacao\" target=\"_blank\" rel=\"noopener noreferrer\">Por que \u00e9 t\u00e3o importante criar uma pol\u00edtica de gest\u00e3o de dados?<\/a><\/span><\/h3>\n<p class=\"historia-subtitulo\">LGPD n\u00e3o vai impactar apenas \u00e1rea de tecnologia das empresas. Em um mundo cada vez mais interconectado, dados pessoais est\u00e3o cada vez mais expostos.<\/p>\n<p><span style=\"color: #808080;\"><em>Por Maximiliano de Carvalho J\u00e1como em CIO<\/em><\/span><\/p>\n<h3 id=\"home-office-traz-risco-de-outros-virus-para-as-empresas-saiba-se-proteger\" class=\"page-title-1\"><a href=\"https:\/\/www.infomoney.com.br\/mercados\/covid-19-tambem-e-risco-para-empresas-em-home-office-mas-o-virus-e-outro\/?utm_source=blog&amp;utm_medium=post&amp;utm_campaign=semana-seguranca-informacao\" target=\"_blank\" rel=\"noopener noreferrer\">Home office traz risco de outros v\u00edrus para as empresas. Saiba se proteger<\/a><\/h3>\n<p>Medidas b\u00e1sicas podem ser adotadas pelos funcion\u00e1rios para fortalecer a seguran\u00e7a digital dos sistemas da companhia.<\/p>\n<p><span style=\"color: #808080;\"><em>Por\u00a0Allan Gavioli em InfoMoney<\/em><\/span><\/p>\n<h3 id=\"controle-id\" class=\"historia-titulo\"><span id=\"cerca-de-40-das-empresas-brasileiras-nao-tem-politicas-de-ciberseguranca-estabelecidas\"><a href=\"https:\/\/cio.com.br\/cerca-de-40-das-empresas-brasileiras-nao-tem-politicas-de-ciberseguranca-estabelecidas\/?utm_source=blog&amp;utm_medium=post&amp;utm_campaign=semana-seguranca-informacao\" target=\"_blank\" rel=\"noopener noreferrer\">Cerca de 40% das empresas brasileiras n\u00e3o t\u00eam pol\u00edticas de ciberseguran\u00e7a estabelecidas<\/a><\/span><\/h3>\n<p class=\"historia-subtitulo\">Pesquisa revela ainda riscos que empresas e funcion\u00e1rios est\u00e3o expostos por n\u00e3o implementarem adequadamente medidas de prote\u00e7\u00e3o contra golpes online.<\/p>\n<p><span style=\"color: #808080;\"><em>Em CIO<\/em><\/span><\/p>\n<h3 id=\"como-funcionam-os-ataques-dirigidos-a-dispositivos-moveis\" class=\"entry-title h1\"><a href=\"https:\/\/inforchannel.com.br\/como-funcionam-os-ataques-dirigidos-a-dispositivos-moveis\/?utm_source=blog&amp;utm_medium=post&amp;utm_campaign=semana-seguranca-informacao\" target=\"_blank\" rel=\"noopener noreferrer\">Como funcionam os ataques dirigidos a dispositivos m\u00f3veis<\/a><\/h3>\n<p>Eset Am\u00e9rica Latina explica o funcionamento de amea\u00e7as em smartphones e tablets, desde os m\u00e9todos mais comuns de distribui\u00e7\u00e3o at\u00e9 os mecanismos que se implementam para n\u00e3o serem detectados.<\/p>\n<p><span style=\"color: #808080;\"><em>Em INFOR CHANNEL<\/em><\/span><\/p>\n<h3 id=\"site-do-galo-na-veia-falha-e-vaza-dados-de-usuarios-do-sistema\"><a href=\"https:\/\/www.terra.com.br\/esportes\/lance\/site-do-galo-na-veia-falha-e-vaza-dados-de-usuarios-do-sistema,fd123fa81002923f733a035fd120f036ni5ab1mu.html?utm_source=blog&amp;utm_medium=post&amp;utm_campaign=semana-seguranca-informacao\" target=\"_blank\" rel=\"noopener noreferrer\">Site do &#8216;Galo na Veia&#8217; falha e vaza dados de usu\u00e1rios do sistema<\/a><\/h3>\n<p>A ferramenta, lan\u00e7ada na ter\u00e7a-feira, 10 de mar\u00e7o, apresentou falhas, que foram relatadas por um torcedor, que recebeu apoio at\u00e9 de Alexandre Kalil.<\/p>\n<p><span style=\"color: #808080;\"><em>Em Terra<\/em><\/span><\/p>\n<h3 id=\"ciberataques-corrida-contra-o-tempo\" class=\"entry-title h1\"><a href=\"https:\/\/inforchannel.com.br\/ciberataques-corrida-contra-o-tempo\/?utm_source=blog&amp;utm_medium=post&amp;utm_campaign=semana-seguranca-informacao\" target=\"_blank\" rel=\"noopener noreferrer\">Ciberataques: corrida contra o tempo<\/a><\/h3>\n<p>Esta reportagem d\u00e1 conta de que o ritmo e sofistica\u00e7\u00e3o de ataques cibern\u00e9ticos crescem, enquanto empresas brasileiras s\u00e3o alvo priorit\u00e1rio de hackers. Cen\u00e1rio amea\u00e7ador e proximidade da LGPD aumentam cobran\u00e7a sobre fornecedores, que tamb\u00e9m enxergam oportunidades de neg\u00f3cio.<\/p>\n<p><span style=\"color: #808080;\"><em>Por Marcelo Gimenez Vieira em INFOR CHANNEL<\/em><\/span><\/p>\n<h3 id=\"vantagens-da-rede-virtual-privada-vpn-para-empresas\" class=\"entry-title post-content__title h2\"><a href=\"https:\/\/www.lumiun.com\/blog\/vantagens-da-rede-virtual-privada-vpn-para-empresas\/?utm_source=blog&amp;utm_medium=post&amp;utm_campaign=semana-seguranca-informacao\" target=\"_blank\" rel=\"noopener noreferrer\">Vantagens da Rede Virtual Privada (VPN) para empresas<\/a><\/h3>\n<p>Neste artigo, voc\u00ea vai conhecer o que \u00e9 rede virtual privada (VPN), como funciona e quais as vantagens e benef\u00edcios da VPN para empresas.<\/p>\n<p><span style=\"color: #808080;\"><em>Por Al\u00e9x de Oliveira em Blog do Lumiun<\/em><\/span><\/p>\n<hr \/>\n<h2 id=\"e-book\">E-book<\/h2>\n<h3 id=\"manual-de-utilizacao-segura-da-internet-para-profissionais-e-empresas-versao-2\" class=\"text-white\"><a href=\"https:\/\/www.lumiun.com\/materiais\/manual-uso-seguro-internet-para-profissionais-empresas-v2?utm_source=blog&amp;utm_medium=post&amp;utm_campaign=semana-seguranca-informacao\" target=\"_blank\" rel=\"noopener noreferrer\">Manual de utiliza\u00e7\u00e3o segura da internet para profissionais e empresas &#8211; Vers\u00e3o 2<\/a><\/h3>\n<p>No material \u00e9 abordado as principais formas de utiliza\u00e7\u00e3o da internet e como se proteger em cada caso. Tamb\u00e9m s\u00e3o mostrados quais os tipos de conex\u00e3o existentes e como identificar amea\u00e7as na rede.<\/p>\n<hr \/>\n<h2 id=\"videos\">V\u00eddeos<\/h2>\n<h3 id=\"conceitos-indispensaveis-da-seguranca-da-informacao\" class=\"title style-scope ytd-video-primary-info-renderer\"><a href=\"https:\/\/www.youtube.com\/watch?v=ESL9LP7kO8E&amp;utm_source=blog&amp;utm_medium=post&amp;utm_campaign=semana-seguranca-informacao\" target=\"_blank\" rel=\"noopener noreferrer\">Conceitos Indispens\u00e1veis da Seguran\u00e7a da Informa\u00e7\u00e3o<\/a><\/h3>\n<div  id=\"_ytid_77258\"  width=\"800\" height=\"450\"  data-origwidth=\"800\" data-origheight=\"450\"  data-relstop=\"1\" data-facadesrc=\"https:\/\/www.youtube.com\/embed\/ESL9LP7kO8E?enablejsapi=1&#038;autoplay=0&#038;cc_load_policy=0&#038;iv_load_policy=1&#038;loop=0&#038;modestbranding=1&#038;fs=1&#038;playsinline=0&#038;controls=1&#038;color=red&#038;cc_lang_pref=&#038;rel=0&#038;autohide=2&#038;theme=dark&#038;\" class=\"__youtube_prefs__ epyt-facade epyt-is-override  no-lazyload\" data-epautoplay=\"1\" ><img decoding=\"async\" data-spai-excluded=\"true\" class=\"epyt-facade-poster skip-lazy\" loading=\"lazy\"  alt=\"YouTube player\"  src=\"https:\/\/i.ytimg.com\/vi\/ESL9LP7kO8E\/maxresdefault.jpg\"  \/><button class=\"epyt-facade-play\" aria-label=\"Play\"><svg data-no-lazy=\"1\" height=\"100%\" version=\"1.1\" viewBox=\"0 0 68 48\" width=\"100%\"><path class=\"ytp-large-play-button-bg\" d=\"M66.52,7.74c-0.78-2.93-2.49-5.41-5.42-6.19C55.79,.13,34,0,34,0S12.21,.13,6.9,1.55 C3.97,2.33,2.27,4.81,1.48,7.74C0.06,13.05,0,24,0,24s0.06,10.95,1.48,16.26c0.78,2.93,2.49,5.41,5.42,6.19 C12.21,47.87,34,48,34,48s21.79-0.13,27.1-1.55c2.93-0.78,4.64-3.26,5.42-6.19C67.94,34.95,68,24,68,24S67.94,13.05,66.52,7.74z\" fill=\"#f00\"><\/path><path d=\"M 45,24 27,14 27,34\" fill=\"#fff\"><\/path><\/svg><\/button><\/div>\n<h3 id=\"seguranca-da-informacao-para-concursos-prof-josis-alves\" class=\"title style-scope ytd-video-primary-info-renderer\"><a href=\"https:\/\/www.youtube.com\/watch?v=rldvBCsjxXE&amp;utm_source=blog&amp;utm_medium=post&amp;utm_campaign=semana-seguranca-informacao\" target=\"_blank\" rel=\"noopener noreferrer\">Seguran\u00e7a da Informa\u00e7\u00e3o para Concursos: Prof. J\u00f3sis Alves<\/a><\/h3>\n<div  id=\"_ytid_28598\"  width=\"800\" height=\"450\"  data-origwidth=\"800\" data-origheight=\"450\"  data-relstop=\"1\" data-facadesrc=\"https:\/\/www.youtube.com\/embed\/rldvBCsjxXE?enablejsapi=1&#038;autoplay=0&#038;cc_load_policy=0&#038;iv_load_policy=1&#038;loop=0&#038;modestbranding=1&#038;fs=1&#038;playsinline=0&#038;controls=1&#038;color=red&#038;cc_lang_pref=&#038;rel=0&#038;autohide=2&#038;theme=dark&#038;\" class=\"__youtube_prefs__ epyt-facade epyt-is-override  no-lazyload\" data-epautoplay=\"1\" ><img decoding=\"async\" data-spai-excluded=\"true\" class=\"epyt-facade-poster skip-lazy\" loading=\"lazy\"  alt=\"YouTube player\"  src=\"https:\/\/i.ytimg.com\/vi\/rldvBCsjxXE\/maxresdefault.jpg\"  \/><button class=\"epyt-facade-play\" aria-label=\"Play\"><svg data-no-lazy=\"1\" height=\"100%\" version=\"1.1\" viewBox=\"0 0 68 48\" width=\"100%\"><path class=\"ytp-large-play-button-bg\" d=\"M66.52,7.74c-0.78-2.93-2.49-5.41-5.42-6.19C55.79,.13,34,0,34,0S12.21,.13,6.9,1.55 C3.97,2.33,2.27,4.81,1.48,7.74C0.06,13.05,0,24,0,24s0.06,10.95,1.48,16.26c0.78,2.93,2.49,5.41,5.42,6.19 C12.21,47.87,34,48,34,48s21.79-0.13,27.1-1.55c2.93-0.78,4.64-3.26,5.42-6.19C67.94,34.95,68,24,68,24S67.94,13.05,66.52,7.74z\" fill=\"#f00\"><\/path><path d=\"M 45,24 27,14 27,34\" fill=\"#fff\"><\/path><\/svg><\/button><\/div>\n<hr \/>\n<p>Voc\u00ea ainda n\u00e3o est\u00e1 inscrito na nossa newsletter para receber esse conte\u00fado semanalmente no e-mail? Ent\u00e3o inscreva-se atrav\u00e9s do link abaixo:<\/p>\n<p><a href=\"https:\/\/conteudo.lumiun.com\/semana-da-seguranca-na-internet\">https:\/\/conteudo.lumiun.com\/semana-da-seguranca-na-internet<\/a><\/p>\n<p>Compartilhe o link com seus colegas e amigos.<\/p>\n","protected":false},"excerpt":{"rendered":"Nesta terceira edi\u00e7\u00e3o da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, pol\u00edtica de gest\u00e3o de dados, riscos de outros v\u00edrus&hellip;\n","protected":false},"author":1,"featured_media":4903,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"content-type":"","footnotes":""},"categories":[143],"tags":[160,106,158,159,149],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Semana da Seguran\u00e7a da Informa\u00e7\u00e3o \u2013 Edi\u00e7\u00e3o N\u00ba3 | Lumiun Blog<\/title>\n<meta name=\"description\" content=\"Terceira edi\u00e7\u00e3o: Neste post voc\u00ea vai encontrar links com not\u00edcias, dicas, artigos, materiais e eventos sobre seguran\u00e7a da informa\u00e7\u00e3o.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Semana da Seguran\u00e7a da Informa\u00e7\u00e3o \u2013 Edi\u00e7\u00e3o N\u00ba3 | Lumiun Blog\" \/>\n<meta property=\"og:description\" content=\"Terceira edi\u00e7\u00e3o: Neste post voc\u00ea vai encontrar links com not\u00edcias, dicas, artigos, materiais e eventos sobre seguran\u00e7a da informa\u00e7\u00e3o.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/\" \/>\n<meta property=\"og:site_name\" content=\"Lumiun Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LumiunTecnologia\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-16T17:25:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-02T18:01:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/POST-SEMANA3-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"592\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Al\u00e9x de Oliveira\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Al\u00e9x de Oliveira\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/\"},\"author\":{\"name\":\"Al\u00e9x de Oliveira\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/12a17ed19bd7b3c3a482f7ef1077590d\"},\"headline\":\"Semana da Seguran\u00e7a da Informa\u00e7\u00e3o \u2013 Edi\u00e7\u00e3o N\u00ba3\",\"datePublished\":\"2020-03-16T17:25:53+00:00\",\"dateModified\":\"2022-05-02T18:01:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/\"},\"wordCount\":517,\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/POST-SEMANA3-1.jpg\",\"keywords\":[\"ataques dirigidos\",\"ciberseguran\u00e7a\",\"gest\u00e3o de dados\",\"home office\",\"vpn\"],\"articleSection\":[\"Semana da Seguran\u00e7a na Internet\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/\",\"name\":\"Semana da Seguran\u00e7a da Informa\u00e7\u00e3o \u2013 Edi\u00e7\u00e3o N\u00ba3 | Lumiun Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/POST-SEMANA3-1.jpg\",\"datePublished\":\"2020-03-16T17:25:53+00:00\",\"dateModified\":\"2022-05-02T18:01:11+00:00\",\"description\":\"Terceira edi\u00e7\u00e3o: Neste post voc\u00ea vai encontrar links com not\u00edcias, dicas, artigos, materiais e eventos sobre seguran\u00e7a da informa\u00e7\u00e3o.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/#primaryimage\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/POST-SEMANA3-1.jpg\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/POST-SEMANA3-1.jpg\",\"width\":1000,\"height\":592},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.lumiun.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Semana da Seguran\u00e7a da Informa\u00e7\u00e3o \u2013 Edi\u00e7\u00e3o N\u00ba3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"name\":\"Lumiun Blog\",\"description\":\"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI\",\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\",\"name\":\"Lumiun Tecnologia\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"width\":1500,\"height\":930,\"caption\":\"Lumiun Tecnologia\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/LumiunTecnologia\/\",\"https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/\",\"https:\/\/www.youtube.com\/LumiunNetwork\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/12a17ed19bd7b3c3a482f7ef1077590d\",\"name\":\"Al\u00e9x de Oliveira\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7eb470d4e7f28f1be606747261c0b187?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7eb470d4e7f28f1be606747261c0b187?s=96&d=mm&r=g\",\"caption\":\"Al\u00e9x de Oliveira\"},\"description\":\"Sou cofundador e CTO da Lumiun, onde lidero o desenvolvimento das nossas solu\u00e7\u00f5es de seguran\u00e7a de rede, com foco em usabilidade, performance e escalabilidade, atendendo tanto MSPs quanto decisores de TI em empresas que buscam controle e prote\u00e7\u00e3o eficaz da navega\u00e7\u00e3o corporativa.\",\"url\":\"https:\/\/www.lumiun.com\/blog\/author\/alex\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Semana da Seguran\u00e7a da Informa\u00e7\u00e3o \u2013 Edi\u00e7\u00e3o N\u00ba3 | Lumiun Blog","description":"Terceira edi\u00e7\u00e3o: Neste post voc\u00ea vai encontrar links com not\u00edcias, dicas, artigos, materiais e eventos sobre seguran\u00e7a da informa\u00e7\u00e3o.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/","og_locale":"pt_BR","og_type":"article","og_title":"Semana da Seguran\u00e7a da Informa\u00e7\u00e3o \u2013 Edi\u00e7\u00e3o N\u00ba3 | Lumiun Blog","og_description":"Terceira edi\u00e7\u00e3o: Neste post voc\u00ea vai encontrar links com not\u00edcias, dicas, artigos, materiais e eventos sobre seguran\u00e7a da informa\u00e7\u00e3o.","og_url":"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/","og_site_name":"Lumiun Blog","article_publisher":"https:\/\/www.facebook.com\/LumiunTecnologia\/","article_published_time":"2020-03-16T17:25:53+00:00","article_modified_time":"2022-05-02T18:01:11+00:00","og_image":[{"width":1000,"height":592,"url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/POST-SEMANA3-1.jpg","type":"image\/jpeg"}],"author":"Al\u00e9x de Oliveira","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Al\u00e9x de Oliveira","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/#article","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/"},"author":{"name":"Al\u00e9x de Oliveira","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/12a17ed19bd7b3c3a482f7ef1077590d"},"headline":"Semana da Seguran\u00e7a da Informa\u00e7\u00e3o \u2013 Edi\u00e7\u00e3o N\u00ba3","datePublished":"2020-03-16T17:25:53+00:00","dateModified":"2022-05-02T18:01:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/"},"wordCount":517,"publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/POST-SEMANA3-1.jpg","keywords":["ataques dirigidos","ciberseguran\u00e7a","gest\u00e3o de dados","home office","vpn"],"articleSection":["Semana da Seguran\u00e7a na Internet"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/","url":"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/","name":"Semana da Seguran\u00e7a da Informa\u00e7\u00e3o \u2013 Edi\u00e7\u00e3o N\u00ba3 | Lumiun Blog","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/#primaryimage"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/POST-SEMANA3-1.jpg","datePublished":"2020-03-16T17:25:53+00:00","dateModified":"2022-05-02T18:01:11+00:00","description":"Terceira edi\u00e7\u00e3o: Neste post voc\u00ea vai encontrar links com not\u00edcias, dicas, artigos, materiais e eventos sobre seguran\u00e7a da informa\u00e7\u00e3o.","breadcrumb":{"@id":"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/#primaryimage","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/POST-SEMANA3-1.jpg","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/POST-SEMANA3-1.jpg","width":1000,"height":592},{"@type":"BreadcrumbList","@id":"https:\/\/www.lumiun.com\/blog\/semana-da-seguranca-da-informacao-edicao-no3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.lumiun.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Semana da Seguran\u00e7a da Informa\u00e7\u00e3o \u2013 Edi\u00e7\u00e3o N\u00ba3"}]},{"@type":"WebSite","@id":"https:\/\/www.lumiun.com\/blog\/#website","url":"https:\/\/www.lumiun.com\/blog\/","name":"Lumiun Blog","description":"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI","publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.lumiun.com\/blog\/#organization","name":"Lumiun Tecnologia","url":"https:\/\/www.lumiun.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","width":1500,"height":930,"caption":"Lumiun Tecnologia"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LumiunTecnologia\/","https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/","https:\/\/www.youtube.com\/LumiunNetwork"]},{"@type":"Person","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/12a17ed19bd7b3c3a482f7ef1077590d","name":"Al\u00e9x de Oliveira","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7eb470d4e7f28f1be606747261c0b187?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7eb470d4e7f28f1be606747261c0b187?s=96&d=mm&r=g","caption":"Al\u00e9x de Oliveira"},"description":"Sou cofundador e CTO da Lumiun, onde lidero o desenvolvimento das nossas solu\u00e7\u00f5es de seguran\u00e7a de rede, com foco em usabilidade, performance e escalabilidade, atendendo tanto MSPs quanto decisores de TI em empresas que buscam controle e prote\u00e7\u00e3o eficaz da navega\u00e7\u00e3o corporativa.","url":"https:\/\/www.lumiun.com\/blog\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/4893"}],"collection":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/comments?post=4893"}],"version-history":[{"count":6,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/4893\/revisions"}],"predecessor-version":[{"id":7985,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/4893\/revisions\/7985"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media\/4903"}],"wp:attachment":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media?parent=4893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/categories?post=4893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/tags?post=4893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}