{"id":6548,"date":"2020-08-10T11:08:09","date_gmt":"2020-08-10T14:08:09","guid":{"rendered":"https:\/\/www.lumiun.com\/blog\/?p=6548"},"modified":"2022-05-02T15:02:10","modified_gmt":"2022-05-02T18:02:10","slug":"a-semana-da-seguranca-da-informacao-edicao-no24","status":"publish","type":"post","link":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/","title":{"rendered":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba24"},"content":{"rendered":"<p>Na edi\u00e7\u00e3o N\u00ba 24 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, alerta do FBI, curso gratuito do Senai, Dark Web, falhas de seguran\u00e7a nos sistemas de reconhecimento facial , prazo de Trump para compra do TikTok, as maiores falhas de seguran\u00e7a de 2020 e muito mais.<\/p>\n<hr \/>\n<h2 id=\"noticias\">Not\u00edcias<\/h2>\n<h3 id=\"fbi-alerta-sobre-os-riscos-de-seguranca-de-continuar-usando-o-windows-7\" class=\"content-head__title\"><a href=\"https:\/\/www.segs.com.br\/info-ti\/245537-fbi-alerta-sobre-os-riscos-de-seguranca-de-continuar-usando-o-windows-7\" target=\"_blank\" rel=\"noopener noreferrer\">FBI alerta sobre os riscos de seguran\u00e7a de continuar usando o Windows 7<\/a><\/h3>\n<p class=\"content-head__subtitle\">Desde janeiro deste ano, o Windows 7 parou de receber atualiza\u00e7\u00f5es de seguran\u00e7a e chegou ao fim de sua vida \u00fatil. A Microsoft anunciou, no in\u00edcio de 2019, que o sistema operacional deixaria de receber atualiza\u00e7\u00f5es gratuitas de suporte e seguran\u00e7a.<\/p>\n<p class=\"content-publication-data__from\" title=\"Isabela Cabral, para o TechTudo\"><span style=\"color: #808080;\"><em>Por Manuel Quilarque em Segs<\/em><\/span><\/p>\n<h3 id=\"senai-abre-curso-gratuito-e-a-distancia-sobre-seguranca-cibernetica\" class=\"content-head__title\"><a href=\"https:\/\/istoe.com.br\/senai-abre-curso-gratuito-e-a-distancia-sobre-seguranca-cibernetica\/\" target=\"_blank\" rel=\"noopener noreferrer\">Senai abre curso gratuito e a dist\u00e2ncia sobre seguran\u00e7a cibern\u00e9tica<\/a><\/h3>\n<p>Programa em parceria com a Cisco oferece capacita\u00e7\u00e3o e selecionar\u00e1 jovens para segunda etapa de qualifica\u00e7\u00e3o. Melhores candidatos poder\u00e3o ser selecionados por empresas parceiras da multinacional.<\/p>\n<p><span style=\"color: #808080;\"><i>Em Isto\u00e9<\/i><\/span><\/p>\n<h3 id=\"como-se-proteger-de-fraudes-quando-dados-pessoais-estao-na-dark-web\" class=\"materia-manchete entry-title\"><a href=\"https:\/\/g1.globo.com\/economia\/tecnologia\/blog\/altieres-rohr\/post\/2020\/08\/06\/como-se-proteger-de-fraudes-quando-dados-pessoais-estao-na-dark-web.ghtml\" target=\"_blank\" rel=\"noopener noreferrer\">Como se proteger de fraudes quando dados pessoais est\u00e3o na &#8216;dark web&#8217;?<\/a><\/h3>\n<p>A &#8220;dark web&#8221; \u00e9 apenas um meio por onde circulam dados extraviados de outras fontes, mas muitos vazamentos surgem na nossa &#8220;web normal&#8221;.<\/p>\n<p><span style=\"color: #808080;\"><em>Por Altieres Rohr em G1<\/em><\/span><\/p>\n<h3 id=\"deus-do-cibercrime-a-ascensao-e-a-queda-do-maior-defacer-do-brasil\"><a href=\"https:\/\/canaltech.com.br\/hacker\/deus-do-cibercrime-a-ascensao-e-a-queda-de-vandathegod-o-maior-defacer-do-brasil-169529\/\" target=\"_blank\" rel=\"noopener noreferrer\">Deus do Cibercrime: a ascens\u00e3o e a queda do maior defacer do Brasil<\/a><\/h3>\n<p>A Pol\u00edcia Federal, bateu na casa de seis indiv\u00edduos nas cidades de Belo Horizonte (MG), Bras\u00edlia (DF) e Novo Hamburgo (RS). O objetivo era coletar computadores, notebooks e smartphones que poderiam ser usados como prova para identificar e responsabilizar os autores de invas\u00f5es ao site da autoridade sergipana.<\/p>\n<p><span style=\"color: #808080;\"><em>Em CanalTech<\/em><\/span><\/p>\n<h3 id=\"como-ficar-mais-seguro-no-uso-da-internet\" class=\"ArticleHeader_headline\"><a href=\"https:\/\/mais.opovo.com.br\/jornal\/economia\/2020\/08\/08\/como-ficar-mais-seguro-no-uso-da-internet.html\" target=\"_blank\" rel=\"noopener noreferrer\">Como ficar mais seguro no uso da internet<\/a><\/h3>\n<p>O POVO traz um manual de boas pr\u00e1ticas na internet que ajudam no processo de conscientiza\u00e7\u00e3o digital, al\u00e9m dos desafios do mercado financeiro e legais.<\/p>\n<p><span style=\"color: #808080;\"><i>Por Bruna Damasceno Em O Povo<\/i><\/span><\/p>\n<h3 id=\"mcafee-encontra-falhas-de-seguranca-em-sistemas-de-reconhecimento-facial\"><a href=\"https:\/\/canaltech.com.br\/seguranca\/mcafee-encontra-falhas-de-seguranca-em-sistemas-de-reconhecimento-facial-169460\/\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee encontra falhas de seguran\u00e7a em sistemas de reconhecimento facial<\/a><\/h3>\n<p>O velho bug mental de vermos uma pessoa e a confundirmos com outra pode ser uma realidade, tamb\u00e9m, para as m\u00e1quinas.<\/p>\n<p><span style=\"color: #808080;\"><em>Por Felipe Demartini em CanalTech<\/em><\/span><\/p>\n<h3 id=\"compliance-digital-entenda-as-boas-praticas-de-governanca-na-protecao-de-dados\"><a href=\"https:\/\/www.jornalcontabil.com.br\/compliance-digital-entenda-as-boas-praticas-de-governanca-na-protecao-de-dados\/\" target=\"_blank\" rel=\"noopener noreferrer\">Compliance Digital: Entenda as Boas Pr\u00e1ticas de Governan\u00e7a na Prote\u00e7\u00e3o de Dados<\/a><\/h3>\n<p>A Governan\u00e7a corporativa pode ser entendida como o sistema que dirige, monitora e incentiva as empresas, abarca os relacionamentos entre os s\u00f3cios, o conselho de administra\u00e7\u00e3o, a diretoria, os \u00f3rg\u00e3os de fiscaliza\u00e7\u00e3o e de controle e as partes interessadas.<\/p>\n<p><span style=\"color: #808080;\"><em>Em Jornal Cont\u00e1bil<\/em><\/span><\/p>\n<h3 id=\"tres-pontos-problematicos-de-seguranca-a-serem-abordados-para-melhorar-a-defesa\" class=\"margin-bottom-10 title\"><a href=\"https:\/\/www.infoq.com\/br\/articles\/cybersecurity-pain-points\/\" target=\"_blank\" rel=\"noopener noreferrer\">Tr\u00eas pontos problem\u00e1ticos de seguran\u00e7a a serem abordados para melhorar a defesa<\/a><\/h3>\n<p>A ciberseguran\u00e7a \u00e9 um dos problemas mais cr\u00edticos que qualquer empresa precisa resolver, atualmente. O que muitos n\u00e3o est\u00e3o cientes, \u00e9 que isso requer lidar com diversos aspectos.<\/p>\n<p><span style=\"color: #808080;\"><em>Por Jonathan Zhang em InfoQ<\/em><\/span><\/p>\n<h3 id=\"instituto-abre-16-000-vagas-para-cursos-online-e-gratuitos-de-tecnologia\" class=\"margin-bottom-10 title\"><a href=\"https:\/\/exame.com\/carreira\/instituto-abre-16-000-vagas-para-cursos-online-e-gratuitos-de-tecnologia\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instituto abre 16.000 vagas para cursos online e gratuitos de tecnologia<\/a><\/h3>\n<p>As vagas s\u00e3o distribu\u00eddas entre 22 cursos online e de gra\u00e7a em diversos temas envolvendo tecnologia, desde educa\u00e7\u00e3o a ci\u00eancia de dados.<\/p>\n<p><span style=\"color: #808080;\"><em>Por Lu\u00edsa Granato em Exame<\/em><\/span><\/p>\n<h3 id=\"trump-da-45-dias-a-microsoft-para-fechar-compra-do-tiktok\" class=\"margin-bottom-10 title\"><a href=\"https:\/\/br.noticias.yahoo.com\/trump-da-45-dias-a-microsoft-para-fechar-compra-do-tik-tok-131418772.html\" target=\"_blank\" rel=\"noopener noreferrer\">Trump d\u00e1 45 dias \u00e0 Microsoft para fechar compra do TikTok<\/a><\/h3>\n<p>O mundo da tecnologia est\u00e1 de olho em um dos maiores neg\u00f3cios do ano, com a possibilidade de a fabricante de software Microsoft comprar o aplicativo de v\u00eddeos TikTok, atualmente propriedade da chinesa Bytedance.<\/p>\n<p><span style=\"color: #808080;\"><em>Por Marcus Couto em Yahoo Not\u00edcias<\/em><\/span><\/p>\n<h3 id=\"10-maiores-falhas-de-seguranca-de-dados-em-2020\" class=\"margin-bottom-10 title\"><a href=\"https:\/\/www.lumiun.com\/blog\/10-maiores-falhas-de-seguranca-de-dados-em-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">10 maiores falhas de seguran\u00e7a de dados em 2020<\/a><\/h3>\n<p>Normalmente, as falhas de seguran\u00e7a de dados acontecem no mundo digital, e pode ter v\u00e1rios objetivos, desde ganhar respeito diante da comunidade hacker, roubar informa\u00e7\u00f5es sigilosas ou, at\u00e9 mesmo, causar a perda de uma informa\u00e7\u00e3o para prejudicar um concorrente, por exemplo.<\/p>\n<p><span style=\"color: #808080;\"><em>Por Kelvin Zimmer em Blog do Lumiun<\/em><\/span><\/p>\n<hr \/>\n<h2 id=\"dicas-de-ferramentas-e-mail-empresarial\">Dicas de Ferramentas: E-mail Empresarial<\/h2>\n<p>Juntamos neste t\u00f3pico as melhores solu\u00e7\u00f5es de e-mail empresarial:<\/p>\n<p>\u2709 &#8211; <a href=\"https:\/\/www.google.com\/intl\/pt\/gmail\/about\/#\">Gmail<\/a><\/p>\n<p>\u2709 &#8211; <a href=\"https:\/\/outlook.live.com\/owa\/\">Outlook<\/a><\/p>\n<p>\u2709 &#8211; <a href=\"https:\/\/www.zoho.com\/mail\/\">Zoho<\/a><\/p>\n<p>\u2709 &#8211; <a href=\"https:\/\/www.locaweb.com.br\/solucoes-de-email\/email-locaweb\/\">Locaweb<\/a><\/p>\n<hr \/>\n<h2 id=\"materiais\">Materiais<\/h2>\n<div class=\"rock-convert-banner\"><a href=\"https:\/\/conteudo.lumiun.com\/ebook-falhas-seguranca-2020?utm_medium=rock-convert\" target=\"_blank\" class=\"rock-convert-cta-link\" data-cta-id=\"6511\" data-cta-title=\"eBook Grandes Falhas de Seguran\u00e7a\"><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-ebook-1.jpg.webp 619w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-ebook-1-500x203.jpg.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-ebook-1-380x154.jpg.webp 380w\" sizes=\"(max-width: 619px) 100vw, 619px\" type=\"image\/webp\"><img fetchpriority=\"high\" decoding=\"async\" width=\"619\" height=\"251\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-ebook-1.jpg\" class=\"attachment-full size-full webpexpress-processed\" alt=\"\" title=\"eBook Grandes Falhas de Seguran\u00e7a\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-ebook-1.jpg 619w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-ebook-1-500x203.jpg 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-ebook-1-380x154.jpg 380w\" sizes=\"(max-width: 619px) 100vw, 619px\" loading=\"eager\"><\/picture><\/a><\/div>\n<div class=\"rock-convert-banner\"><a href=\"https:\/\/www.lumiun.com\/blog\/guia-de-ti-para-pequenas-e-medias-empresas\/?utm_medium=rock-convert\" target=\"_blank\" class=\"rock-convert-cta-link\" data-cta-id=\"6002\" data-cta-title=\"Banner Guia de TI para Pequenas Empresas\"><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock12344.jpg.webp 1201w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock12344-500x202.jpg.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock12344-1140x461.jpg.webp 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock12344-768x311.jpg.webp 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock12344-380x154.jpg.webp 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock12344-800x324.jpg.webp 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock12344-1160x469.jpg.webp 1160w\" sizes=\"(max-width: 1201px) 100vw, 1201px\" type=\"image\/webp\"><img decoding=\"async\" width=\"1201\" height=\"486\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock12344.jpg\" class=\"attachment-full size-full webpexpress-processed\" alt=\"\" title=\"Banner Guia de TI para Pequenas Empresas\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock12344.jpg 1201w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock12344-500x202.jpg 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock12344-1140x461.jpg 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock12344-768x311.jpg 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock12344-380x154.jpg 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock12344-800x324.jpg 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock12344-1160x469.jpg 1160w\" sizes=\"(max-width: 1201px) 100vw, 1201px\" loading=\"eager\"><\/picture><\/a><\/div>\n<hr \/>\n<h2 id=\"videos\">V\u00eddeos<\/h2>\n<h3 id=\"ethical-hacking-em-uma-abordagem-pratica-e-ilustrada\" class=\"title style-scope ytd-video-primary-info-renderer\"><a href=\"https:\/\/www.youtube.com\/watch?time_continue=3&amp;v=BWuH0fQ5QJE&amp;feature=emb_title\" target=\"_blank\" rel=\"noopener noreferrer\">Ethical Hacking em uma abordagem pr\u00e1tica e ilustrada<\/a><\/h3>\n<div  id=\"_ytid_15444\"  width=\"800\" height=\"450\"  data-origwidth=\"800\" data-origheight=\"450\"  data-relstop=\"1\" data-facadesrc=\"https:\/\/www.youtube.com\/embed\/BWuH0fQ5QJE?enablejsapi=1&#038;autoplay=0&#038;cc_load_policy=0&#038;iv_load_policy=1&#038;loop=0&#038;modestbranding=1&#038;fs=1&#038;playsinline=0&#038;controls=1&#038;color=red&#038;cc_lang_pref=&#038;rel=0&#038;autohide=2&#038;theme=dark&#038;\" class=\"__youtube_prefs__ epyt-facade epyt-is-override  no-lazyload\" data-epautoplay=\"1\" ><img decoding=\"async\" data-spai-excluded=\"true\" class=\"epyt-facade-poster skip-lazy\" loading=\"lazy\"  alt=\"YouTube player\"  src=\"https:\/\/i.ytimg.com\/vi\/BWuH0fQ5QJE\/maxresdefault.jpg\"  \/><button class=\"epyt-facade-play\" aria-label=\"Play\"><svg data-no-lazy=\"1\" height=\"100%\" version=\"1.1\" viewBox=\"0 0 68 48\" width=\"100%\"><path class=\"ytp-large-play-button-bg\" d=\"M66.52,7.74c-0.78-2.93-2.49-5.41-5.42-6.19C55.79,.13,34,0,34,0S12.21,.13,6.9,1.55 C3.97,2.33,2.27,4.81,1.48,7.74C0.06,13.05,0,24,0,24s0.06,10.95,1.48,16.26c0.78,2.93,2.49,5.41,5.42,6.19 C12.21,47.87,34,48,34,48s21.79-0.13,27.1-1.55c2.93-0.78,4.64-3.26,5.42-6.19C67.94,34.95,68,24,68,24S67.94,13.05,66.52,7.74z\" fill=\"#f00\"><\/path><path d=\"M 45,24 27,14 27,34\" fill=\"#fff\"><\/path><\/svg><\/button><\/div>\n<h3 id=\"computacao-em-acao-seguranca-da-informacao-tecnicas-de-ataques-de-defesas-em-ambientes-de-rede\" class=\"title style-scope ytd-video-primary-info-renderer\"><a href=\"https:\/\/www.youtube.com\/watch?v=T8R8Bug3dwA\" target=\"_blank\" rel=\"noopener noreferrer\">Computa\u00e7\u00e3o em A\u00e7\u00e3o &#8211; Seguran\u00e7a da Informa\u00e7\u00e3o: T\u00e9cnicas de Ataques de Defesas em Ambientes de Rede<\/a><\/h3>\n<div  id=\"_ytid_14297\"  width=\"800\" height=\"450\"  data-origwidth=\"800\" data-origheight=\"450\"  data-relstop=\"1\" data-facadesrc=\"https:\/\/www.youtube.com\/embed\/T8R8Bug3dwA?enablejsapi=1&#038;autoplay=0&#038;cc_load_policy=0&#038;iv_load_policy=1&#038;loop=0&#038;modestbranding=1&#038;fs=1&#038;playsinline=0&#038;controls=1&#038;color=red&#038;cc_lang_pref=&#038;rel=0&#038;autohide=2&#038;theme=dark&#038;\" class=\"__youtube_prefs__ epyt-facade epyt-is-override  no-lazyload\" data-epautoplay=\"1\" ><img decoding=\"async\" data-spai-excluded=\"true\" class=\"epyt-facade-poster skip-lazy\" loading=\"lazy\"  alt=\"YouTube player\"  src=\"https:\/\/i.ytimg.com\/vi\/T8R8Bug3dwA\/maxresdefault.jpg\"  \/><button class=\"epyt-facade-play\" aria-label=\"Play\"><svg data-no-lazy=\"1\" height=\"100%\" version=\"1.1\" viewBox=\"0 0 68 48\" width=\"100%\"><path class=\"ytp-large-play-button-bg\" d=\"M66.52,7.74c-0.78-2.93-2.49-5.41-5.42-6.19C55.79,.13,34,0,34,0S12.21,.13,6.9,1.55 C3.97,2.33,2.27,4.81,1.48,7.74C0.06,13.05,0,24,0,24s0.06,10.95,1.48,16.26c0.78,2.93,2.49,5.41,5.42,6.19 C12.21,47.87,34,48,34,48s21.79-0.13,27.1-1.55c2.93-0.78,4.64-3.26,5.42-6.19C67.94,34.95,68,24,68,24S67.94,13.05,66.52,7.74z\" fill=\"#f00\"><\/path><path d=\"M 45,24 27,14 27,34\" fill=\"#fff\"><\/path><\/svg><\/button><\/div>\n<hr \/>\n<h2 id=\"info\" class=\"style-scope ytd-video-primary-info-renderer\"><span id=\"eventos\">Eventos<\/span><\/h2>\n<h3 id=\"comite-de-estudos-gestao-e-governanca-de-sistemas-de-informacao\" class=\"title style-scope ytd-video-primary-info-renderer\"><a href=\"https:\/\/www.sympla.com.br\/comite-de-estudos--gestao-e-governanca-de-sistemas-de-informacao__901984\" target=\"_blank\" rel=\"noopener noreferrer\">Comit\u00ea de Estudos | Gest\u00e3o e Governan\u00e7a de Sistemas de Informa\u00e7\u00e3o<\/a><\/h3>\n<ul>\n<li class=\"title style-scope ytd-video-primary-info-renderer\">10 de agosto de 2020, 19h &#8211; 20h30<\/li>\n<li class=\"title style-scope ytd-video-primary-info-renderer\">Evento on-line<\/li>\n<\/ul>\n<h3 id=\"seguranca-da-infomacao-estruturada-para-a-nova-realidade\" class=\"event-name\"><a href=\"https:\/\/www.sympla.com.br\/seguranca-da-infomacao-estruturada-para-a-nova-realidade__927265\" target=\"_blank\" rel=\"noopener noreferrer\">Seguran\u00e7a da Infoma\u00e7\u00e3o estruturada para a nova realidade<\/a><\/h3>\n<ul>\n<li>13 de agosto de 2020, 18h &#8211; 18h30<\/li>\n<li>Evento on-line<\/li>\n<\/ul>\n<div class=\"row\">\n<div class=\"col-md-12\">\n<div class=\"\"><\/div>\n<\/div>\n<\/div>\n<hr \/>\n<p>Voc\u00ea ainda n\u00e3o est\u00e1 inscrito na nossa newsletter para receber esse conte\u00fado semanalmente no e-mail? Ent\u00e3o se inscreva atrav\u00e9s do link abaixo:<\/p>\n<p><a href=\"https:\/\/conteudo.lumiun.com\/semana-da-seguranca-na-internet\">https:\/\/conteudo.lumiun.com\/semana-da-seguranca-na-internet<\/a><\/p>\n<p>Compartilhe o link com seus colegas e amigos.<\/p>\n","protected":false},"excerpt":{"rendered":"Na edi\u00e7\u00e3o N\u00ba 24 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, alerta do FBI, curso gratuito do Senai, Dark&hellip;\n","protected":false},"author":11,"featured_media":6553,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"content-type":"","footnotes":""},"categories":[143],"tags":[251,253,250,254,252,247],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba24 | Lumiun Blog<\/title>\n<meta name=\"description\" content=\"Na edi\u00e7\u00e3o N\u00ba 24 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, alerta do FBI, Dark Web, falhas de seguran\u00e7a do McAfee e muito mais.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba24 | Lumiun Blog\" \/>\n<meta property=\"og:description\" content=\"Na edi\u00e7\u00e3o N\u00ba 24 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, alerta do FBI, Dark Web, falhas de seguran\u00e7a do McAfee e muito mais.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/\" \/>\n<meta property=\"og:site_name\" content=\"Lumiun Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LumiunTecnologia\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-10T14:08:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-02T18:02:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o24blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"708\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kelvin Zimmer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kelvin Zimmer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/\"},\"author\":{\"name\":\"Kelvin Zimmer\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77\"},\"headline\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba24\",\"datePublished\":\"2020-08-10T14:08:09+00:00\",\"dateModified\":\"2022-05-02T18:02:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/\"},\"wordCount\":787,\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o24blog.jpg\",\"keywords\":[\"cursos\",\"dark web\",\"FBI\",\"McAfee\",\"senai\",\"tiktok\"],\"articleSection\":[\"Semana da Seguran\u00e7a na Internet\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/\",\"name\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba24 | Lumiun Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o24blog.jpg\",\"datePublished\":\"2020-08-10T14:08:09+00:00\",\"dateModified\":\"2022-05-02T18:02:10+00:00\",\"description\":\"Na edi\u00e7\u00e3o N\u00ba 24 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, alerta do FBI, Dark Web, falhas de seguran\u00e7a do McAfee e muito mais.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/#primaryimage\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o24blog.jpg\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o24blog.jpg\",\"width\":1200,\"height\":708},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.lumiun.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba24\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"name\":\"Lumiun Blog\",\"description\":\"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI\",\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\",\"name\":\"Lumiun Tecnologia\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"width\":1500,\"height\":930,\"caption\":\"Lumiun Tecnologia\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/LumiunTecnologia\/\",\"https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/\",\"https:\/\/www.youtube.com\/LumiunNetwork\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77\",\"name\":\"Kelvin Zimmer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g\",\"caption\":\"Kelvin Zimmer\"},\"description\":\"Colunista de ciberseguran\u00e7a, especialista em produtividade e Analista de Marketing na Lumiun.\",\"sameAs\":[\"http:\/\/lumiun.com\"],\"url\":\"https:\/\/www.lumiun.com\/blog\/author\/kelvin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba24 | Lumiun Blog","description":"Na edi\u00e7\u00e3o N\u00ba 24 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, alerta do FBI, Dark Web, falhas de seguran\u00e7a do McAfee e muito mais.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/","og_locale":"pt_BR","og_type":"article","og_title":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba24 | Lumiun Blog","og_description":"Na edi\u00e7\u00e3o N\u00ba 24 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, alerta do FBI, Dark Web, falhas de seguran\u00e7a do McAfee e muito mais.","og_url":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/","og_site_name":"Lumiun Blog","article_publisher":"https:\/\/www.facebook.com\/LumiunTecnologia\/","article_published_time":"2020-08-10T14:08:09+00:00","article_modified_time":"2022-05-02T18:02:10+00:00","og_image":[{"width":1200,"height":708,"url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o24blog.jpg","type":"image\/jpeg"}],"author":"Kelvin Zimmer","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Kelvin Zimmer","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/#article","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/"},"author":{"name":"Kelvin Zimmer","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77"},"headline":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba24","datePublished":"2020-08-10T14:08:09+00:00","dateModified":"2022-05-02T18:02:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/"},"wordCount":787,"publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o24blog.jpg","keywords":["cursos","dark web","FBI","McAfee","senai","tiktok"],"articleSection":["Semana da Seguran\u00e7a na Internet"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/","url":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/","name":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba24 | Lumiun Blog","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/#primaryimage"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o24blog.jpg","datePublished":"2020-08-10T14:08:09+00:00","dateModified":"2022-05-02T18:02:10+00:00","description":"Na edi\u00e7\u00e3o N\u00ba 24 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, alerta do FBI, Dark Web, falhas de seguran\u00e7a do McAfee e muito mais.","breadcrumb":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/#primaryimage","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o24blog.jpg","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguran\u00e7a-da-Informa\u00e7\u00e3o24blog.jpg","width":1200,"height":708},{"@type":"BreadcrumbList","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no24\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.lumiun.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba24"}]},{"@type":"WebSite","@id":"https:\/\/www.lumiun.com\/blog\/#website","url":"https:\/\/www.lumiun.com\/blog\/","name":"Lumiun Blog","description":"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI","publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.lumiun.com\/blog\/#organization","name":"Lumiun Tecnologia","url":"https:\/\/www.lumiun.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","width":1500,"height":930,"caption":"Lumiun Tecnologia"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LumiunTecnologia\/","https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/","https:\/\/www.youtube.com\/LumiunNetwork"]},{"@type":"Person","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77","name":"Kelvin Zimmer","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g","caption":"Kelvin Zimmer"},"description":"Colunista de ciberseguran\u00e7a, especialista em produtividade e Analista de Marketing na Lumiun.","sameAs":["http:\/\/lumiun.com"],"url":"https:\/\/www.lumiun.com\/blog\/author\/kelvin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/6548"}],"collection":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/comments?post=6548"}],"version-history":[{"count":9,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/6548\/revisions"}],"predecessor-version":[{"id":8006,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/6548\/revisions\/8006"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media\/6553"}],"wp:attachment":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media?parent=6548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/categories?post=6548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/tags?post=6548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}