{"id":6921,"date":"2020-08-31T11:04:06","date_gmt":"2020-08-31T14:04:06","guid":{"rendered":"https:\/\/www.lumiun.com\/blog\/?p=6921"},"modified":"2022-05-02T15:00:26","modified_gmt":"2022-05-02T18:00:26","slug":"a-semana-da-seguranca-da-informacao-edicao-no27","status":"publish","type":"post","link":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/","title":{"rendered":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba27"},"content":{"rendered":"\r\n<p>Na edi\u00e7\u00e3o N\u00ba 27 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, hackers do bem, ciberseguran\u00e7a na organiza\u00e7\u00e3o, como evitar riscos escondidos em an\u00fancios na internet, nome da Netflix \u00e9 usado por hackers, dicas e recomenda\u00e7\u00f5es para criar senhas fortes e seguras, golpes vindos de dom\u00ednios leg\u00edtimos e muito mais.<\/p>\r\n\r\n\r\n<hr class=\"wp-block-separator is-style-wide\" \/>\r\n\r\n\r\n<h2 id=\"noticias\" class=\"wp-block-heading\">Not\u00edcias<\/h2>\r\n\r\n\r\n\r\n<h3 id=\"hackers-do-bem-protegem-sistemas-computacionais-da-universidade\" class=\"wp-block-heading\"><a href=\"https:\/\/jornal.usp.br\/institucional\/hackers-do-bem-protegem-sistemas-computacionais-da-universidade\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hackers do Bem protegem sistemas computacionais da Universidade<\/a><\/h3>\r\n\r\n\r\n\r\n<p>A Superintend\u00eancia de Tecnologia da Informa\u00e7\u00e3o (STI), em parceria com o Instituto de Matem\u00e1tica e Estat\u00edstica (IME), criou o programa Hackers do Bem, uma iniciativa in\u00e9dita da USP que tem como objetivo identificar as vulnerabilidades e recomendar corre\u00e7\u00f5es no sistema computacional da Universidade.<\/p>\r\n\r\n\r\n\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Adriana Cruz<\/span> <span class=\"has-inline-color has-cyan-bluish-gray-color\">em Jornal da USP<\/span><\/em><\/p>\r\n\r\n\r\n\r\n<h3 id=\"e-possivel-um-celular-ser-espionado-sem-nenhum-aplicativo\" class=\"wp-block-heading\"><a href=\"https:\/\/g1.globo.com\/economia\/tecnologia\/blog\/altieres-rohr\/post\/2020\/08\/27\/e-possivel-um-celular-ser-espionado-sem-nenhum-aplicativo.ghtml\" target=\"_blank\" rel=\"noreferrer noopener\">\u00c9 poss\u00edvel um celular ser espionado sem nenhum aplicativo?<\/a><\/h3>\r\n\r\n\r\n\r\n<p>De modo geral, um celular s\u00f3 pode ser espionado de duas formas: com monitoramento de rede ou com altera\u00e7\u00f5es no funcionamento do aparelho.<\/p>\r\n\r\n\r\n\r\n<p><span class=\"has-inline-color has-cyan-bluish-gray-color\"><em>Por Altieres Rohr<\/em> <em>em <\/em><\/span><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">G1<\/span><\/em><\/p>\r\n\r\n\r\n\r\n<h3 id=\"ciberseguranca-e-um-tabu-na-sua-organizacao-traga-o-tema-para-a-mesa\" class=\"wp-block-heading\"><a href=\"https:\/\/computerworld.com.br\/2020\/08\/28\/ciberseguranca-e-um-tabu-na-sua-organizacao-traga-o-tema-para-a-mesa\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ciberseguran\u00e7a \u00e9 um tabu na sua organiza\u00e7\u00e3o? Traga o tema para a mesa<\/a><\/h3>\r\n\r\n\r\n\r\n<p>As organiza\u00e7\u00f5es precisam levar o tema para a alta lideran\u00e7a como um requisito de neg\u00f3cio.<\/p>\r\n\r\n\r\n\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Jo\u00e3o Rocha em Computerworld<\/span><\/em><\/p>\r\n\r\n\r\n\r\n<h3 id=\"o-caminho-da-ciberseguranca-passa-pela-nuvem\" class=\"wp-block-heading\"><a href=\"https:\/\/www.convergenciadigital.com.br\/cgi\/cgilua.exe\/sys\/start.htm?UserActiveTemplate=site&amp;infoid=54667&amp;sid=15\" target=\"_blank\" rel=\"noreferrer noopener\">O caminho da ciberseguran\u00e7a passa pela nuvem<\/a><\/h3>\r\n\r\n\r\n\r\n<p>Com organiza\u00e7\u00f5es cada vez mais distribu\u00eddas, manter dispositivos em todos os locais ou usar produtos diferentes para trabalhadores remotos cria in\u00fameras brechas de seguran\u00e7a, al\u00e9m de custar muito e sobrecarregar os recursos de TI.<\/p>\r\n\r\n\r\n\r\n<p><span class=\"has-inline-color has-cyan-bluish-gray-color\"><em>Por Felipe Canale <\/em>e<em>m Converg\u00eancia Digital<\/em><\/span><\/p>\r\n\r\n\r\n\r\n<h3 id=\"saiba-como-evitar-os-riscos-escondidos-em-anuncios-da-internet\" class=\"wp-block-heading\"><a href=\"https:\/\/infonet.com.br\/noticias\/cidade\/saiba-como-evitar-os-riscos-escondidos-em-anuncios-da-internet\/\" target=\"_blank\" rel=\"noreferrer noopener\">Saiba como evitar os riscos escondidos em an\u00fancios da internet<\/a><\/h3>\r\n\r\n\r\n\r\n<p>Quem nunca ficou encucado com a \u2018coincid\u00eancia\u2019 de an\u00fancios que aparecem ap\u00f3s pesquisar algum produto na internet? De acordo com o analista de sistemas e especialista em seguran\u00e7a da informa\u00e7\u00e3o, Bruno Guerra, essa \u00e9 uma das estrat\u00e9gias mais comuns que os aplicativos e redes sociais usam para gerar monetiza\u00e7\u00e3o diariamente.<\/p>\r\n\r\n\r\n\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Juliana Melo e Raquel Almeida em Infonet<\/span><\/em><\/p>\r\n\r\n\r\n\r\n<h3 id=\"novo-golpe-velho-truque-nome-da-netflix-e-utilizado-por-hackers\" class=\"wp-block-heading\"><a href=\"https:\/\/olhardigital.com.br\/fique_seguro\/noticia\/novo-golpe-velho-truque-nome-da-netflix-e-utilizado-por-hackers\/105833\" target=\"_blank\" rel=\"noreferrer noopener\">Novo golpe, velho truque: nome da Netflix \u00e9 utilizado por hackers<\/a><\/h3>\r\n\r\n\r\n\r\n<p>Mensagem por e-mail que alerta sobre &#8216;atraso no pagamento&#8217; da plataforma de streaming vem sendo utilizada para levar usu\u00e1rios a fornecer seus dados de pagamento.<\/p>\r\n\r\n\r\n\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Renato Mota<\/span><\/em> <em><span class=\"has-inline-color has-cyan-bluish-gray-color\">em Olhar Digital<\/span><\/em><\/p>\r\n\r\n\r\n\r\n<h3 id=\"recomendacoes-e-dicas-para-criar-senhas-fortes-e-seguras\" class=\"wp-block-heading\"><a href=\"https:\/\/www.lumiun.com\/blog\/recomendacoes-e-dicas-para-criar-senhas-fortes-e-seguras\/\" target=\"_blank\" rel=\"noreferrer noopener\">Recomenda\u00e7\u00f5es e dicas para criar senhas fortes e seguras<\/a><\/h3>\r\n\r\n\r\n\r\n<p>Com a\u00e7\u00f5es simples \u00e9 poss\u00edvel aumentar a seguran\u00e7a das suas contas e garantir que n\u00e3o sejam facilmente descobertas por hackers que possam fazer uma m\u00e1 utiliza\u00e7\u00e3o dessas informa\u00e7\u00f5es.<\/p>\r\n\r\n\r\n\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Cledison Eduardo Fritzen em Blog do Lumiun<\/span><\/em><\/p>\r\n\r\n\r\n\r\n<h3 id=\"golpes-para-roubar-credenciais-vindos-de-dominios-legitimos\" class=\"wp-block-heading\"><a href=\"https:\/\/www.armorblox.com\/blog\/blox-tales-credential-phishing-hosted-on-box\/\" target=\"_blank\" rel=\"noreferrer noopener\">Golpes para roubar credenciais vindos de dom\u00ednios leg\u00edtimos<\/a><\/h3>\r\n\r\n\r\n\r\n<p>Resumidamente o golpe se baseia no uso de servi\u00e7os de hospedagem para evadir detec\u00e7\u00f5es autom\u00e1ticas e a utiliza\u00e7\u00e3o de marcas leg\u00edtimas para aumentar a apar\u00eancia de legitimidade da campanha, que tem como objetivo a obten\u00e7\u00e3o de credenciais corporativas e do Office 365.<\/p>\r\n\r\n\r\n\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Arjun Sambamoorthy em Armorblox<\/span><\/em><\/p>\r\n\r\n\r\n\r\n<h3 id=\"golpes-atraves-de-contas-clonadas-do-instagram\" class=\"wp-block-heading\"><a href=\"https:\/\/www.welivesecurity.com\/br\/2020\/08\/21\/golpes-atraves-de-contas-clonadas-do-instagram\/\" target=\"_blank\" rel=\"noreferrer noopener\">Golpes atrav\u00e9s de contas clonadas do Instagram<\/a><\/h3>\r\n\r\n\r\n\r\n<p>Por que algu\u00e9m poderia roubar e clonar uma conta do Instagram? Saiba como evitar ser v\u00edtima desse tipo de golpe.<\/p>\r\n\r\n\r\n\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Jake Moore em Welivesecurity<\/span><\/em><\/p>\r\n\r\n\r\n\r\n<h3 id=\"pesquisadores-alertam-para-dominios-inativos-que-levam-a-paginas-maliciosas\" class=\"wp-block-heading\"><a href=\"https:\/\/canaltech.com.br\/seguranca\/pesquisadores-alertam-para-dominios-inativos-que-levam-a-paginas-maliciosas-170679\/\" target=\"_blank\" rel=\"noreferrer noopener\">Pesquisadores alertam para dom\u00ednios inativos que levam a p\u00e1ginas maliciosas<\/a><\/h3>\r\n\r\n\r\n\r\n<p>No mundo digital, ao registrar um dom\u00ednio, voc\u00ea est\u00e1 pagando por um \u201cterreno virtual\u201d onde poder\u00e1 construir seu site do jeito que quiser. Caso deixe de bancar, por\u00e9m, ele se torna inativo e inacess\u00edvel.<\/p>\r\n\r\n\r\n\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Ramon De Souza em Canaltech<\/span><\/em><\/p>\r\n\r\n\r\n<hr class=\"wp-block-separator is-style-wide\" \/>\r\n\r\n\r\n<h2 id=\"dicas-de-ferramentas\" class=\"wp-block-heading\">Dicas de Ferramentas<\/h2>\r\n\r\n\r\n\r\n<h3 id=\"teste-a-seguranca-da-sua-internet\" class=\"wp-block-heading\"><a href=\"https:\/\/www.lumiun.com\/teste-seguranca-internet\" target=\"_blank\" rel=\"noreferrer noopener\">Teste a Seguran\u00e7a da sua Internet<\/a><\/h3>\r\n\r\n\r\n\r\n<p>Voc\u00ea sabe se seus funcion\u00e1rios, alunos ou fam\u00edlia est\u00e3o protegidos contra sites de <strong>phishing<\/strong>, <strong>malware<\/strong>, <strong>pornografia<\/strong>, conte\u00fado de <strong>racismo<\/strong> ou <strong>terrorista<\/strong>?<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.lumiun.com\/teste-seguranca-internet\" target=\"_blank\" rel=\"noopener noreferrer\"><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-1140x589.jpg.webp 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-500x258.jpg.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-768x396.jpg.webp 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-380x196.jpg.webp 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-800x413.jpg.webp 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-1160x599.jpg.webp 1160w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE.jpg.webp 1201w\" sizes=\"(max-width: 1140px) 100vw, 1140px\" type=\"image\/webp\"><img decoding=\"async\" width=\"1140\" height=\"589\" class=\"wp-image-6824 webpexpress-processed\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-1140x589.jpg\" alt=\"seguran\u00e7a da informa\u00e7\u00e3o\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-1140x589.jpg 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-500x258.jpg 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-768x396.jpg 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-380x196.jpg 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-800x413.jpg 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-1160x599.jpg 1160w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE.jpg 1201w\" sizes=\"(max-width: 1140px) 100vw, 1140px\"><\/picture><\/a><\/figure>\r\n\r\n\r\n\r\n<p>No teste ser\u00e3o feitas requisi\u00e7\u00f5es de acessos a v\u00e1rios sites que est\u00e3o dentro das categorias consideradas inseguras, a partir da sua conex\u00e3o de internet, como:<\/p>\r\n\r\n\r\n\r\n<ul>\r\n<li>Phishing e fraudes online<\/li>\r\n<li>Malware e spyware<\/li>\r\n<li>Anonimizadores de acesso<\/li>\r\n<li>Drogas e bebidas alco\u00f3licas<\/li>\r\n<li>Jogos e apostas<\/li>\r\n<li>Pornografia e nudez<\/li>\r\n<li>Viol\u00eancia, terrorismo e racismo<\/li>\r\n<\/ul>\r\n\r\n\r\n<hr class=\"wp-block-separator is-style-wide\" \/>\r\n\r\n\r\n<h2 id=\"materiais\" class=\"wp-block-heading\">Materiais<\/h2>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.lumiun.com\/blog\/guia-de-home-office-para-pequenas-e-medias-empresas\/\" target=\"_blank\" rel=\"noopener noreferrer\"><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-guia-home-office-1140x461.jpg.webp 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-guia-home-office-500x202.jpg.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-guia-home-office-768x311.jpg.webp 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-guia-home-office-380x154.jpg.webp 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-guia-home-office-800x324.jpg.webp 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-guia-home-office-1160x469.jpg.webp 1160w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-guia-home-office.jpg.webp 1201w\" sizes=\"(max-width: 1140px) 100vw, 1140px\" type=\"image\/webp\"><img decoding=\"async\" width=\"1140\" height=\"461\" class=\"wp-image-6814 webpexpress-processed\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-guia-home-office-1140x461.jpg\" alt=\"guia de home office\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-guia-home-office-1140x461.jpg 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-guia-home-office-500x202.jpg 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-guia-home-office-768x311.jpg 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-guia-home-office-380x154.jpg 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-guia-home-office-800x324.jpg 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-guia-home-office-1160x469.jpg 1160w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-guia-home-office.jpg 1201w\" sizes=\"(max-width: 1140px) 100vw, 1140px\"><\/picture><\/a><\/figure>\r\n\r\n\r\n<div class=\"rock-convert-banner\"><a href=\"https:\/\/conteudo.lumiun.com\/ebook-falhas-seguranca-2020?utm_medium=rock-convert\" target=\"_blank\" class=\"rock-convert-cta-link\" data-cta-id=\"6511\" data-cta-title=\"eBook Grandes Falhas de Seguran\u00e7a\"><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-ebook-1.jpg.webp 619w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-ebook-1-500x203.jpg.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-ebook-1-380x154.jpg.webp 380w\" sizes=\"(max-width: 619px) 100vw, 619px\" type=\"image\/webp\"><img fetchpriority=\"high\" decoding=\"async\" width=\"619\" height=\"251\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-ebook-1.jpg\" class=\"attachment-full size-full webpexpress-processed\" alt=\"\" title=\"eBook Grandes Falhas de Seguran\u00e7a\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-ebook-1.jpg 619w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-ebook-1-500x203.jpg 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-ebook-1-380x154.jpg 380w\" sizes=\"(max-width: 619px) 100vw, 619px\" loading=\"eager\"><\/picture><\/a><\/div>\n\r\n\r\n<hr class=\"wp-block-separator is-style-wide\" \/>\r\n\r\n\r\n<h2 id=\"cursos\" class=\"wp-block-heading\">Cursos<\/h2>\r\n\r\n\r\n\r\n<h3 id=\"cursos-abertos-its-instituto-de-tecnologia-e-sociedade-do-rio\" class=\"wp-block-heading\"><a href=\"https:\/\/itsrio.org\/pt\/cursos\/cursos-abertos\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cursos Abertos &#8211; ITS &#8211; Instituto de Tecnologia e Sociedade do Rio<\/a><\/h3>\r\n\r\n\r\n\r\n<ul>\r\n<li>Gratuitos<\/li>\r\n<li>Online<\/li>\r\n<\/ul>\r\n\r\n\r\n<hr class=\"wp-block-separator is-style-wide\" \/>\r\n\r\n\r\n<p>Voc\u00ea ainda n\u00e3o est\u00e1 inscrito na nossa newsletter para receber esse conte\u00fado semanalmente no e-mail? Ent\u00e3o se inscreva atrav\u00e9s do link abaixo:<\/p>\r\n\r\n\r\n\r\n<p><a href=\"https:\/\/conteudo.lumiun.com\/semana-da-seguranca-na-internet\">https:\/\/conteudo.lumiun.com\/semana-da-seguranca-na-internet<\/a><\/p>\r\n\r\n\r\n\r\n<p>Compartilhe o link com seus colegas e amigos.<\/p>\r\n","protected":false},"excerpt":{"rendered":"Na edi\u00e7\u00e3o N\u00ba 27 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, hackers do bem, ciberseguran\u00e7a na organiza\u00e7\u00e3o, como evitar&hellip;\n","protected":false},"author":11,"featured_media":6938,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"content-type":"","footnotes":""},"categories":[143],"tags":[106,179,146,263,137,236,138,30],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba27 | Lumiun Blog<\/title>\n<meta name=\"description\" content=\"Na edi\u00e7\u00e3o N\u00ba 27 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, hackers do bem protegem sistema, golpes vindos de dom\u00ednios leg\u00edtimos e muito mais.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba27 | Lumiun Blog\" \/>\n<meta property=\"og:description\" content=\"Na edi\u00e7\u00e3o N\u00ba 27 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, hackers do bem protegem sistema, golpes vindos de dom\u00ednios leg\u00edtimos e muito mais.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/\" \/>\n<meta property=\"og:site_name\" content=\"Lumiun Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LumiunTecnologia\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-31T14:04:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-02T18:00:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao27-blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"708\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kelvin Zimmer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kelvin Zimmer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/\"},\"author\":{\"name\":\"Kelvin Zimmer\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77\"},\"headline\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba27\",\"datePublished\":\"2020-08-31T14:04:06+00:00\",\"dateModified\":\"2022-05-02T18:00:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/\"},\"wordCount\":732,\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao27-blog.jpg\",\"keywords\":[\"ciberseguran\u00e7a\",\"golpes\",\"hackers\",\"netflix\",\"seguran\u00e7a da informa\u00e7\u00e3o\",\"seguran\u00e7a de dados\",\"seguran\u00e7a na internet\",\"senhas\"],\"articleSection\":[\"Semana da Seguran\u00e7a na Internet\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/\",\"name\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba27 | Lumiun Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao27-blog.jpg\",\"datePublished\":\"2020-08-31T14:04:06+00:00\",\"dateModified\":\"2022-05-02T18:00:26+00:00\",\"description\":\"Na edi\u00e7\u00e3o N\u00ba 27 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, hackers do bem protegem sistema, golpes vindos de dom\u00ednios leg\u00edtimos e muito mais.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/#primaryimage\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao27-blog.jpg\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao27-blog.jpg\",\"width\":1200,\"height\":708},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.lumiun.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba27\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"name\":\"Lumiun Blog\",\"description\":\"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI\",\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\",\"name\":\"Lumiun Tecnologia\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"width\":1500,\"height\":930,\"caption\":\"Lumiun Tecnologia\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/LumiunTecnologia\/\",\"https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/\",\"https:\/\/www.youtube.com\/LumiunNetwork\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77\",\"name\":\"Kelvin Zimmer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g\",\"caption\":\"Kelvin Zimmer\"},\"description\":\"Colunista de ciberseguran\u00e7a, especialista em produtividade e Analista de Marketing na Lumiun.\",\"sameAs\":[\"http:\/\/lumiun.com\"],\"url\":\"https:\/\/www.lumiun.com\/blog\/author\/kelvin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba27 | Lumiun Blog","description":"Na edi\u00e7\u00e3o N\u00ba 27 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, hackers do bem protegem sistema, golpes vindos de dom\u00ednios leg\u00edtimos e muito mais.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/","og_locale":"pt_BR","og_type":"article","og_title":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba27 | Lumiun Blog","og_description":"Na edi\u00e7\u00e3o N\u00ba 27 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, hackers do bem protegem sistema, golpes vindos de dom\u00ednios leg\u00edtimos e muito mais.","og_url":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/","og_site_name":"Lumiun Blog","article_publisher":"https:\/\/www.facebook.com\/LumiunTecnologia\/","article_published_time":"2020-08-31T14:04:06+00:00","article_modified_time":"2022-05-02T18:00:26+00:00","og_image":[{"width":1200,"height":708,"url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao27-blog.jpg","type":"image\/jpeg"}],"author":"Kelvin Zimmer","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Kelvin Zimmer","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/#article","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/"},"author":{"name":"Kelvin Zimmer","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77"},"headline":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba27","datePublished":"2020-08-31T14:04:06+00:00","dateModified":"2022-05-02T18:00:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/"},"wordCount":732,"publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao27-blog.jpg","keywords":["ciberseguran\u00e7a","golpes","hackers","netflix","seguran\u00e7a da informa\u00e7\u00e3o","seguran\u00e7a de dados","seguran\u00e7a na internet","senhas"],"articleSection":["Semana da Seguran\u00e7a na Internet"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/","url":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/","name":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba27 | Lumiun Blog","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/#primaryimage"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao27-blog.jpg","datePublished":"2020-08-31T14:04:06+00:00","dateModified":"2022-05-02T18:00:26+00:00","description":"Na edi\u00e7\u00e3o N\u00ba 27 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, hackers do bem protegem sistema, golpes vindos de dom\u00ednios leg\u00edtimos e muito mais.","breadcrumb":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/#primaryimage","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao27-blog.jpg","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao27-blog.jpg","width":1200,"height":708},{"@type":"BreadcrumbList","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no27\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.lumiun.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba27"}]},{"@type":"WebSite","@id":"https:\/\/www.lumiun.com\/blog\/#website","url":"https:\/\/www.lumiun.com\/blog\/","name":"Lumiun Blog","description":"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI","publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.lumiun.com\/blog\/#organization","name":"Lumiun Tecnologia","url":"https:\/\/www.lumiun.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","width":1500,"height":930,"caption":"Lumiun Tecnologia"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LumiunTecnologia\/","https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/","https:\/\/www.youtube.com\/LumiunNetwork"]},{"@type":"Person","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77","name":"Kelvin Zimmer","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g","caption":"Kelvin Zimmer"},"description":"Colunista de ciberseguran\u00e7a, especialista em produtividade e Analista de Marketing na Lumiun.","sameAs":["http:\/\/lumiun.com"],"url":"https:\/\/www.lumiun.com\/blog\/author\/kelvin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/6921"}],"collection":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/comments?post=6921"}],"version-history":[{"count":19,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/6921\/revisions"}],"predecessor-version":[{"id":8011,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/6921\/revisions\/8011"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media\/6938"}],"wp:attachment":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media?parent=6921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/categories?post=6921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/tags?post=6921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}