{"id":6808,"date":"2020-08-24T11:22:34","date_gmt":"2020-08-24T14:22:34","guid":{"rendered":"https:\/\/www.lumiun.com\/blog\/?p=6808"},"modified":"2022-05-02T15:02:09","modified_gmt":"2022-05-02T18:02:09","slug":"a-semana-da-seguranca-da-informacao-edicao-no26","status":"publish","type":"post","link":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/","title":{"rendered":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba26"},"content":{"rendered":"\r\n<p>Na edi\u00e7\u00e3o N\u00ba 26 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, teste a seguran\u00e7a da sua internet, relat\u00f3rio de amea\u00e7as \u00e0s nuvens p\u00fablicas, empresas podem ser invadidas por hackers em apenas 30 minutos, maior operadora de cruzeiros do mundo foi alvo de ataque, poss\u00edvel v\u00edrus no Android e muito mais.<\/p>\r\n\r\n\r\n<hr class=\"wp-block-separator is-style-wide\" \/>\r\n\r\n\r\n<h2 id=\"noticias\" class=\"wp-block-heading\">Not\u00edcias<\/h2>\r\n\r\n\r\n\r\n<h3 id=\"relatorio-de-seguranca-da-check-point-destaca-ameacas-as-nuvens-publicas\" class=\"wp-block-heading\"><a href=\"https:\/\/inforchannel.com.br\/relatorio-de-seguranca-da-check-point-destaca-ameacas-as-nuvens-publicas\/\" target=\"_blank\" rel=\"noreferrer noopener\">Relat\u00f3rio de Seguran\u00e7a da Check Point destaca amea\u00e7as \u00e0s nuvens p\u00fablicas<\/a><\/h3>\r\n\r\n\r\n\r\n<p>O relat\u00f3rio mostra que a seguran\u00e7a da nuvem p\u00fablica continua a ser um dos maiores desafios: 75% dos entrevistados afirmaram estar &#8220;muito preocupados&#8221; ou &#8220;extremamente preocupados&#8221; com isso.<\/p>\r\n\r\n\r\n\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Em Infor Channel<\/span><\/em><\/p>\r\n\r\n\r\n\r\n<h3 id=\"93-das-empresas-podem-ser-invadidas-por-hackers-em-apenas-30-minutos\" class=\"wp-block-heading\"><a href=\"https:\/\/canaltech.com.br\/seguranca\/93-das-empresas-podem-ser-invadidas-por-hackers-em-apenas-30-minutos-170011\/\" target=\"_blank\" rel=\"noreferrer noopener\">93% das empresas podem ser invadidas por hackers em apenas 30 minutos<\/a><\/h3>\r\n\r\n\r\n\r\n<p>Hackers de n\u00edvel b\u00e1sico podem invadir empresas e suas respectivas redes em apenas 30 minutos, fazendo-se valer de vulnerabilidades de softwares.\u00a0<\/p>\r\n\r\n\r\n\r\n<p><span class=\"has-inline-color has-cyan-bluish-gray-color\"><em>Por Felipe Ribeiro<\/em> <em>em Canal Tech<\/em><\/span><\/p>\r\n\r\n\r\n\r\n<h3 id=\"maior-operadora-de-cruzeiros-do-mundo-e-alvo-de-ataques-de-ransomware\" class=\"wp-block-heading\"><a href=\"https:\/\/olhardigital.com.br\/noticia\/maior-operadora-de-cruzeiros-do-mundo-e-alvo-de-ataques-de-ransomware\/105524\" target=\"_blank\" rel=\"noreferrer noopener\">Maior operadora de cruzeiros do mundo \u00e9 alvo de ataques de ransomware<\/a><\/h3>\r\n\r\n\r\n\r\n<p>Carnival Corporation reconheceu que incidente pode ter afetado dados pessoais de clientes e funcion\u00e1rios; cibercriminosos fizeram download de arquivos dos sistemas da companhia.<\/p>\r\n\r\n\r\n\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Victor Pinheiro em Olhar Digital<\/span><\/em><\/p>\r\n\r\n\r\n\r\n<h3 id=\"android-pode-pegar-virus-apos-conectar-o-celular-ao-computador\" class=\"wp-block-heading\"><a href=\"https:\/\/g1.globo.com\/economia\/tecnologia\/blog\/altieres-rohr\/post\/2020\/08\/20\/saiba-se-android-pode-pegar-virus-apos-conectar-o-celular-ao-computador.ghtml\" target=\"_blank\" rel=\"noreferrer noopener\">Android pode pegar &#8216;v\u00edrus&#8217; ap\u00f3s conectar o celular ao computador?<\/a><\/h3>\r\n\r\n\r\n\r\n<p>Como voc\u00ea sabe que o seu celular est\u00e1 com v\u00edrus? Embora que o computador contamine um smartphone com v\u00edrus por meio da conex\u00e3o USB, esse \u00e9 um cen\u00e1rio bem raro.<\/p>\r\n\r\n\r\n\r\n<p><span class=\"has-inline-color has-cyan-bluish-gray-color\"><em>Por Altieres Rohr <\/em>e<em>m G1<\/em><\/span><\/p>\r\n\r\n\r\n\r\n<h3 id=\"conheca-duas-falhas-basicas-que-deixam-empresas-vulneraveis-a-ciberataques\" class=\"wp-block-heading\"><a href=\"https:\/\/olhardigital.com.br\/fique_seguro\/noticia\/conheca-duas-falhas-basicas-que-deixam-empresas-vulneraveis-a-ciberataques\/105374\" target=\"_blank\" rel=\"noreferrer noopener\">Conhe\u00e7a duas falhas b\u00e1sicas que deixam empresas vulner\u00e1veis a ciberataques<\/a><\/h3>\r\n\r\n\r\n\r\n<p>Uso de senhas fracas e vers\u00f5es vulner\u00e1veis de softwares s\u00e3o os principais problemas apontados em relat\u00f3rio produzido por hackers \u00e9ticos e pesquisadores cient\u00edficos.<\/p>\r\n\r\n\r\n\r\n<p><em><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Em Olhar Digital<\/span><\/em><\/em><\/p>\r\n\r\n\r\n\r\n<h3 id=\"como-verificar-a-seguranca-do-seu-smartphone\" class=\"wp-block-heading\"><a href=\"https:\/\/ndmais.com.br\/tecnologia\/como-verificar-a-seguranca-do-seu-smartphone\/\" target=\"_blank\" rel=\"noreferrer noopener\">Como verificar a seguran\u00e7a do seu smartphone<\/a><\/h3>\r\n\r\n\r\n\r\n<p>Se voc\u00ea se preocupa com a seguran\u00e7a do seu smartphone, \u00e9 essencial sempre se atualizar sobre as principais amea\u00e7as que s\u00e3o criadas para atingir dispositivos m\u00f3veis.<\/p>\r\n\r\n\r\n\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Em 33 Giga<\/span><\/em><\/p>\r\n\r\n\r\n\r\n<h3 id=\"235-milhoes-de-perfis-sao-expostos-a-grande-vazamento-de-dados\" class=\"wp-block-heading\"><a href=\"https:\/\/www.windowsteam.com.br\/235-milhoes-de-perfis-sao-expostos-a-grande-vazamento-de-dados\/\" target=\"_blank\" rel=\"noreferrer noopener\">235 milh\u00f5es de perfis s\u00e3o expostos a grande vazamento de dados<\/a><\/h3>\r\n\r\n\r\n\r\n<p>A equipe de pesquisa de seguran\u00e7a da Comparitech divulgou como um banco de dados inseguro deixou quase 235 milh\u00f5es de perfis de usu\u00e1rios do Instagram, TikTok e YouTube expostos online, o que s\u00f3 pode ser descrito como um vazamento de dados massivo.<\/p>\r\n\r\n\r\n\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Maria Eduarda em Windows Team<\/span><\/em><\/p>\r\n\r\n\r\n\r\n<h3 id=\"crimes-ciberneticos-como-agir-em-caso-de-invasao-e-roubo-de-dados\" class=\"wp-block-heading\"><a href=\"https:\/\/www.lumiun.com\/blog\/crimes-ciberneticos-como-agir-em-caso-de-invasao-e-roubo-de-dados\/\" target=\"_blank\" rel=\"noreferrer noopener\">Crimes cibern\u00e9ticos: Como agir em caso de invas\u00e3o e roubo de dados?<\/a><\/h3>\r\n\r\n\r\n\r\n<p>Crimes cibern\u00e9ticos, um assunto que precisa estar presente e ser debatido no cotidiano, mas que ainda \u00e9 pouco discutido, e principalmente, s\u00e3o poucas as empresas que sabem a import\u00e2ncia de entender sobre esse assunto e manter a seguran\u00e7a para evitar invas\u00e3o e roubo de dados.<\/p>\r\n\r\n\r\n\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Al\u00e9x de Oliveira em Blog do Lumiun<\/span><\/em><\/p>\r\n\r\n\r\n<hr class=\"wp-block-separator is-style-wide\" \/>\r\n\r\n\r\n<h2 id=\"dicas-de-ferramentas\" class=\"wp-block-heading\">Dicas de Ferramentas<\/h2>\r\n\r\n\r\n\r\n<h3 id=\"teste-a-seguranca-da-sua-internet\" class=\"wp-block-heading\"><a href=\"https:\/\/www.lumiun.com\/teste-seguranca-internet\" target=\"_blank\" rel=\"noreferrer noopener\">Teste a Seguran\u00e7a da sua Internet<\/a><\/h3>\r\n\r\n\r\n\r\n<p>Voc\u00ea sabe se seus funcion\u00e1rios, alunos ou fam\u00edlia est\u00e3o protegidos contra sites de\u00a0<strong>phishing<\/strong>,\u00a0<strong>malware<\/strong>,\u00a0<strong>pornografia<\/strong>, conte\u00fado de\u00a0<strong>racismo<\/strong>\u00a0ou\u00a0<strong>terrorista<\/strong>?<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.lumiun.com\/teste-seguranca-internet\" target=\"_blank\" rel=\"noopener noreferrer\"><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-1140x589.jpg.webp 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-500x258.jpg.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-768x396.jpg.webp 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-380x196.jpg.webp 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-800x413.jpg.webp 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-1160x599.jpg.webp 1160w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE.jpg.webp 1201w\" sizes=\"(max-width: 1140px) 100vw, 1140px\" type=\"image\/webp\"><img decoding=\"async\" width=\"1140\" height=\"589\" class=\"wp-image-6824 webpexpress-processed\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-1140x589.jpg\" alt=\"seguran\u00e7a da informa\u00e7\u00e3o\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-1140x589.jpg 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-500x258.jpg 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-768x396.jpg 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-380x196.jpg 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-800x413.jpg 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-1160x599.jpg 1160w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE.jpg 1201w\" sizes=\"(max-width: 1140px) 100vw, 1140px\"><\/picture><\/a><\/figure>\r\n\r\n\r\n\r\n<p>No teste ser\u00e3o feitas requisi\u00e7\u00f5es de acessos a v\u00e1rios sites que est\u00e3o dentro das categorias consideradas inseguras, a partir da sua conex\u00e3o de internet, como:<\/p>\r\n\r\n\r\n\r\n<ul>\r\n<li>Phishing e fraudes online<\/li>\r\n<li>Malware e spyware<\/li>\r\n<li>Anonimizadores de acesso<\/li>\r\n<li>Drogas e bebidas alco\u00f3licas<\/li>\r\n<li>Jogos e apostas<\/li>\r\n<li>Pornografia e nudez<\/li>\r\n<li>Viol\u00eancia, terrorismo e racismo<\/li>\r\n<\/ul>\r\n\r\n\r\n<hr class=\"wp-block-separator is-style-wide\" \/>\r\n\r\n\r\n<h2 id=\"materiais\" class=\"wp-block-heading\">Materiais<\/h2>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.lumiun.com\/blog\/guia-de-home-office-para-pequenas-e-medias-empresas\/\" target=\"_blank\" rel=\"noopener noreferrer\"><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-guia-home-office-1140x461.jpg.webp 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-guia-home-office-500x202.jpg.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-guia-home-office-768x311.jpg.webp 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-guia-home-office-380x154.jpg.webp 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-guia-home-office-800x324.jpg.webp 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-guia-home-office-1160x469.jpg.webp 1160w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-guia-home-office.jpg.webp 1201w\" sizes=\"(max-width: 1140px) 100vw, 1140px\" type=\"image\/webp\"><img decoding=\"async\" width=\"1140\" height=\"461\" class=\"wp-image-6814 webpexpress-processed\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-guia-home-office-1140x461.jpg\" alt=\"guia de home office\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-guia-home-office-1140x461.jpg 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-guia-home-office-500x202.jpg 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-guia-home-office-768x311.jpg 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-guia-home-office-380x154.jpg 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-guia-home-office-800x324.jpg 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-guia-home-office-1160x469.jpg 1160w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-guia-home-office.jpg 1201w\" sizes=\"(max-width: 1140px) 100vw, 1140px\"><\/picture><\/a><\/figure>\r\n\r\n\r\n<div class=\"rock-convert-banner\"><a href=\"https:\/\/conteudo.lumiun.com\/ebook-falhas-seguranca-2020?utm_medium=rock-convert\" target=\"_blank\" class=\"rock-convert-cta-link\" data-cta-id=\"6511\" data-cta-title=\"eBook Grandes Falhas de Seguran\u00e7a\"><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-ebook-1.jpg.webp 619w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-ebook-1-500x203.jpg.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-ebook-1-380x154.jpg.webp 380w\" sizes=\"(max-width: 619px) 100vw, 619px\" type=\"image\/webp\"><img fetchpriority=\"high\" decoding=\"async\" width=\"619\" height=\"251\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-ebook-1.jpg\" class=\"attachment-full size-full webpexpress-processed\" alt=\"\" title=\"eBook Grandes Falhas de Seguran\u00e7a\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-ebook-1.jpg 619w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-ebook-1-500x203.jpg 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-ebook-1-380x154.jpg 380w\" sizes=\"(max-width: 619px) 100vw, 619px\" loading=\"eager\"><\/picture><\/a><\/div>\n\r\n\r\n<hr class=\"wp-block-separator is-style-wide\" \/>\r\n\r\n\r\n<h2 id=\"videos\" class=\"wp-block-heading\">V\u00eddeos<\/h2>\r\n\r\n\r\n\r\n<h3 id=\"webinar-seguranca-da-informacao-e-privacidade-conforme-a-iso-iec-277012019\" class=\"wp-block-heading\"><a href=\"https:\/\/www.youtube.com\/watch?v=sZjkeyPElY8\" target=\"_blank\" rel=\"noreferrer noopener\">Webinar | Seguran\u00e7a da informa\u00e7\u00e3o e privacidade conforme a ISO\/IEC 27701:2019<\/a><\/h3>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/www.youtube.com\/watch?v=sZjkeyPElY8<\/div>\r\n<\/figure>\r\n\r\n\r\n<hr class=\"wp-block-separator is-style-wide\" \/>\r\n\r\n\r\n<h2 class=\"wp-block-heading\" id=\"info\"><span id=\"eventos\">Eventos<\/span><\/h2>\r\n\r\n\r\n\r\n<h3 id=\"treinamento-em-seguranca-da-informacao-organizacional\" class=\"wp-block-heading\"><a href=\"https:\/\/www.sympla.com.br\/treinamento-em-seguranca-da-informacao-organizacional__950601\" target=\"_blank\" rel=\"noreferrer noopener\">Treinamento em Seguran\u00e7a da Informa\u00e7\u00e3o Organizacional<\/a><\/h3>\r\n\r\n\r\n\r\n<ul>\r\n<li>26 de agosto de 2020, 17h &#8211; 18h<\/li>\r\n<li>Evento on-line<\/li>\r\n<\/ul>\r\n\r\n\r\n<hr class=\"wp-block-separator is-style-wide\" \/>\r\n\r\n\r\n<p>Voc\u00ea ainda n\u00e3o est\u00e1 inscrito na nossa newsletter para receber esse conte\u00fado semanalmente no e-mail? Ent\u00e3o se inscreva atrav\u00e9s do link abaixo:<\/p>\r\n\r\n\r\n\r\n<p><a href=\"https:\/\/conteudo.lumiun.com\/semana-da-seguranca-na-internet\">https:\/\/conteudo.lumiun.com\/semana-da-seguranca-na-internet<\/a><\/p>\r\n\r\n\r\n\r\n<p>Compartilhe o link com seus colegas e amigos.<\/p>\r\n","protected":false},"excerpt":{"rendered":"Na edi\u00e7\u00e3o N\u00ba 26 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, teste a seguran\u00e7a da sua internet, relat\u00f3rio de&hellip;\n","protected":false},"author":11,"featured_media":6823,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"content-type":"","footnotes":""},"categories":[143],"tags":[262,201,106,33,146,44],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba26 | Lumiun Blog<\/title>\n<meta name=\"description\" content=\"Na edi\u00e7\u00e3o N\u00ba 26 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, hackers podem invadir empresas em apenas 30 min e muito mais.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba26 | Lumiun Blog\" \/>\n<meta property=\"og:description\" content=\"Na edi\u00e7\u00e3o N\u00ba 26 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, hackers podem invadir empresas em apenas 30 min e muito mais.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/\" \/>\n<meta property=\"og:site_name\" content=\"Lumiun Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LumiunTecnologia\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-24T14:22:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-02T18:02:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao-blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"708\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kelvin Zimmer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kelvin Zimmer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/\"},\"author\":{\"name\":\"Kelvin Zimmer\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77\"},\"headline\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba26\",\"datePublished\":\"2020-08-24T14:22:34+00:00\",\"dateModified\":\"2022-05-02T18:02:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/\"},\"wordCount\":635,\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao-blog.jpg\",\"keywords\":[\"android\",\"ciberataque\",\"ciberseguran\u00e7a\",\"empresas\",\"hackers\",\"ransomware\"],\"articleSection\":[\"Semana da Seguran\u00e7a na Internet\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/\",\"name\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba26 | Lumiun Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao-blog.jpg\",\"datePublished\":\"2020-08-24T14:22:34+00:00\",\"dateModified\":\"2022-05-02T18:02:09+00:00\",\"description\":\"Na edi\u00e7\u00e3o N\u00ba 26 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, hackers podem invadir empresas em apenas 30 min e muito mais.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/#primaryimage\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao-blog.jpg\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao-blog.jpg\",\"width\":1200,\"height\":708,\"caption\":\"seguran\u00e7a da informa\u00e7\u00e3o\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.lumiun.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba26\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"name\":\"Lumiun Blog\",\"description\":\"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI\",\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\",\"name\":\"Lumiun Tecnologia\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"width\":1500,\"height\":930,\"caption\":\"Lumiun Tecnologia\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/LumiunTecnologia\/\",\"https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/\",\"https:\/\/www.youtube.com\/LumiunNetwork\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77\",\"name\":\"Kelvin Zimmer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g\",\"caption\":\"Kelvin Zimmer\"},\"description\":\"Colunista de ciberseguran\u00e7a, especialista em produtividade e Analista de Marketing na Lumiun.\",\"sameAs\":[\"http:\/\/lumiun.com\"],\"url\":\"https:\/\/www.lumiun.com\/blog\/author\/kelvin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba26 | Lumiun Blog","description":"Na edi\u00e7\u00e3o N\u00ba 26 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, hackers podem invadir empresas em apenas 30 min e muito mais.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/","og_locale":"pt_BR","og_type":"article","og_title":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba26 | Lumiun Blog","og_description":"Na edi\u00e7\u00e3o N\u00ba 26 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, hackers podem invadir empresas em apenas 30 min e muito mais.","og_url":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/","og_site_name":"Lumiun Blog","article_publisher":"https:\/\/www.facebook.com\/LumiunTecnologia\/","article_published_time":"2020-08-24T14:22:34+00:00","article_modified_time":"2022-05-02T18:02:09+00:00","og_image":[{"width":1200,"height":708,"url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao-blog.jpg","type":"image\/jpeg"}],"author":"Kelvin Zimmer","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Kelvin Zimmer","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/#article","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/"},"author":{"name":"Kelvin Zimmer","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77"},"headline":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba26","datePublished":"2020-08-24T14:22:34+00:00","dateModified":"2022-05-02T18:02:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/"},"wordCount":635,"publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao-blog.jpg","keywords":["android","ciberataque","ciberseguran\u00e7a","empresas","hackers","ransomware"],"articleSection":["Semana da Seguran\u00e7a na Internet"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/","url":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/","name":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba26 | Lumiun Blog","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/#primaryimage"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao-blog.jpg","datePublished":"2020-08-24T14:22:34+00:00","dateModified":"2022-05-02T18:02:09+00:00","description":"Na edi\u00e7\u00e3o N\u00ba 26 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, hackers podem invadir empresas em apenas 30 min e muito mais.","breadcrumb":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/#primaryimage","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao-blog.jpg","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao-blog.jpg","width":1200,"height":708,"caption":"seguran\u00e7a da informa\u00e7\u00e3o"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no26\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.lumiun.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba26"}]},{"@type":"WebSite","@id":"https:\/\/www.lumiun.com\/blog\/#website","url":"https:\/\/www.lumiun.com\/blog\/","name":"Lumiun Blog","description":"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI","publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.lumiun.com\/blog\/#organization","name":"Lumiun Tecnologia","url":"https:\/\/www.lumiun.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","width":1500,"height":930,"caption":"Lumiun Tecnologia"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LumiunTecnologia\/","https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/","https:\/\/www.youtube.com\/LumiunNetwork"]},{"@type":"Person","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77","name":"Kelvin Zimmer","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g","caption":"Kelvin Zimmer"},"description":"Colunista de ciberseguran\u00e7a, especialista em produtividade e Analista de Marketing na Lumiun.","sameAs":["http:\/\/lumiun.com"],"url":"https:\/\/www.lumiun.com\/blog\/author\/kelvin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/6808"}],"collection":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/comments?post=6808"}],"version-history":[{"count":22,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/6808\/revisions"}],"predecessor-version":[{"id":8010,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/6808\/revisions\/8010"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media\/6823"}],"wp:attachment":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media?parent=6808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/categories?post=6808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/tags?post=6808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}