{"id":7138,"date":"2020-09-14T10:46:42","date_gmt":"2020-09-14T13:46:42","guid":{"rendered":"https:\/\/www.lumiun.com\/blog\/?p=7138"},"modified":"2022-05-02T15:00:24","modified_gmt":"2022-05-02T18:00:24","slug":"a-semana-da-seguranca-da-informacao-edicao-no29","status":"publish","type":"post","link":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/","title":{"rendered":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba29"},"content":{"rendered":"<p>Na edi\u00e7\u00e3o N\u00ba 29 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, intelig\u00eancia artificial ajuda a te proteger de fraudes, pandemia acentua falhas de seguran\u00e7a, 8 tipos de ataques cibern\u00e9ticos e como se proteger, empresas brasileiras j\u00e1 sofreram ataques cibern\u00e9ticos em 2020 e muito mais.<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:separator {\"className\":\"is-style-wide\"} --><hr class=\"wp-block-separator is-style-wide\" \/><!-- \/wp:separator -->\r\n\r\n<!-- wp:heading -->\r\n<h2 id=\"noticias\">Not\u00edcias<\/h2>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:heading {\"level\":3} -->\r\n<h3 id=\"golpes-envolvendo-educacao-online-crescem-incriveis-20-000-no-1o-semestre\"><a href=\"https:\/\/canaltech.com.br\/seguranca\/golpes-envolvendo-educacao-online-crescem-incriveis-20000-no-1o-semestre-171404\/\" target=\"_blank\" rel=\"noreferrer noopener\">Golpes envolvendo educa\u00e7\u00e3o online crescem incr\u00edveis 20.000% no 1\u00ba semestre<\/a><\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>O Brasil foi o quinto pa\u00eds mais atacado por campanhas dessa categoria, voltadas para roubar dados, interromper os trabalhos ou infectar dispositivos.<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph -->\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Felipe Demartini<\/span>\u00a0<span class=\"has-inline-color has-cyan-bluish-gray-color\">em Canaltech<\/span><\/em><\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} -->\r\n<h3 id=\"ia-identifica-ate-a-velocidade-da-sua-digitacao-para-te-proteger-de-fraudes\"><a href=\"https:\/\/www.uol.com.br\/tilt\/noticias\/redacao\/2020\/09\/14\/ia-usa-ate-velocidade-da-sua-digitacao-para-te-proteger-de-fraudes.htm\" target=\"_blank\" rel=\"noreferrer noopener\">IA identifica at\u00e9 a velocidade da sua digita\u00e7\u00e3o para te proteger de fraudes<\/a><\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>Agora as tecnologias da seguran\u00e7a da informa\u00e7\u00e3o passam por uma &#8220;quarta revolu\u00e7\u00e3o&#8221; com a biometria comportamental.<\/p>\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Vin\u00edcius de Melo em Uol<\/span><\/em><\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} -->\r\n<h3 id=\"pandemia-acentua-falhas-em-protecao-de-privacidade-dos-usuarios\"><a href=\"https:\/\/tiinside.com.br\/09\/09\/2020\/pandemia-acentua-falhas-em-protecao-de-privacidade-dos-usuarios\/\" target=\"_blank\" rel=\"noreferrer noopener\">Pandemia acentua falhas em prote\u00e7\u00e3o de privacidade dos usu\u00e1rios<\/a><\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>Segundo a Kaspersky, entre fevereiro e abril, ataques direcionados a ferramentas que permitem acesso remoto aumentaram 333%.<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph -->\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Em TI Inside<\/span><\/em><\/p>\r\n<h3 id=\"8-tipos-de-ataques-ciberneticos-e-como-se-proteger\"><a href=\"https:\/\/www.lumiun.com\/blog\/8-tipos-de-ataques-ciberneticos-e-como-se-proteger\/\" target=\"_blank\" rel=\"noreferrer noopener\">8 tipos de ataques cibern\u00e9ticos e como se proteger<\/a><\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>Se voc\u00ea, gestor, empres\u00e1rio, ou profissional de TI quer manter sua empresa livre de qualquer amea\u00e7a hacker, o primeiro passo \u00e9 saber como agem, e quais os principais tipos de ataques existentes hoje.<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph -->\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Kelvin Zimmer em Blog do Lumiun<\/span><\/em><\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} -->\r\n<h3 id=\"ransomware-e-phishing-lideram-golpes-mais-populares-no-segundo-trimestre-de-2020\"><a href=\"https:\/\/canaltech.com.br\/seguranca\/ransomware-e-phishing-lideram-golpes-mais-populares-no-segundo-trimestre-de-2020-171329\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ransomware e phishing lideram golpes mais populares no segundo trimestre de 2020<\/a><\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>De acordo com dados publicados pela ESET, ataques envolvendo ransomware e tentativas de phishing foram os principais destaques do per\u00edodo, com os criminosos se aproveitando das preocupa\u00e7\u00f5es relacionadas \u00e0 doen\u00e7a e do estado de isolamento social e home office para roubar dados sigilosos.<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph -->\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Felipe Demartini<\/span>\u00a0<span class=\"has-inline-color has-cyan-bluish-gray-color\">em Canaltech<\/span><\/em><\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} -->\r\n<h3 id=\"ataques-usando-a-covid-19-como-desculpa-foram-as-principais-ameacas-do-segundo-trimestre-deste-ano-aponta-relatorio-da-eset\"><a href=\"https:\/\/www.segs.com.br\/info-ti\/251025-ataques-usando-a-covid-19-como-desculpa-foram-as-principais-ameacas-do-segundo-trimestre-deste-ano-aponta-relatorio-da-eset\" target=\"_blank\" rel=\"noreferrer noopener\">Ataques usando a Covid-19 como desculpa foram as principais amea\u00e7as do segundo trimestre deste ano, aponta relat\u00f3rio da ESET<\/a><\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>Al\u00e9m disso, pesquisadores tamb\u00e9m identificaram um aumento no n\u00famero de campanhas de phishing e de falhas em protocolos de seguran\u00e7a remotos.<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph -->\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Manuel Quilarque em Segs<\/span><\/em><\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} -->\r\n<h3 id=\"350-empresas-brasileiras-ja-vazaram-dados-de-usuarios-na-internet-em-2020\"><a href=\"https:\/\/www.tecmundo.com.br\/seguranca\/177604-350-empresas-brasileiras-vazaram-dados-usuarios-internet-2020.htm\" target=\"_blank\" rel=\"noreferrer noopener\">350 empresas brasileiras j\u00e1 vazaram dados de usu\u00e1rios na internet em 2020<\/a><\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>Esse movimento refletiu na plataforma, que, em seis meses, conta com a participa\u00e7\u00e3o de mais de 2.000 especialistas em seguran\u00e7a e j\u00e1 identificou mais de 350 vulnerabilidades em empresas brasileiras.<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph -->\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por L\u00e9o M\u00fcller em Tecmundo<\/span><\/em><\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} --><!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} --><!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} --><!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} -->\r\n<h3 id=\"seguranca-da-informacao-nas-empresas-protecao-da-rede-sistemas-atualizados-e-educacao-dos-usuarios\"><a href=\"https:\/\/www.lumiun.com\/blog\/seguranca-da-informacao\/\" target=\"_blank\" rel=\"noreferrer noopener\">Seguran\u00e7a da informa\u00e7\u00e3o nas empresas: prote\u00e7\u00e3o da rede, sistemas atualizados e educa\u00e7\u00e3o dos usu\u00e1rios<\/a><\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>Devido aos riscos gerados por ataques e pelos n\u00fameros de incidentes com seguran\u00e7a da informa\u00e7\u00e3o, dar a devida aten\u00e7\u00e3o a esse tema deve fazer parte da estrat\u00e9gia dos gestores e respons\u00e1veis por setores de tecnologia nas empresas.<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph -->\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Cledison Eduardo Fritzen em Blog do Lumiun<\/span><\/em><\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:separator {\"className\":\"is-style-wide\"} --><hr class=\"wp-block-separator is-style-wide\" \/><!-- \/wp:separator -->\r\n\r\n<!-- wp:heading -->\r\n<h2 id=\"dicas-de-ferramentas\">Dicas de Ferramentas<\/h2>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:heading {\"level\":3} -->\r\n<h3 id=\"teste-a-seguranca-da-sua-internet\"><a href=\"https:\/\/www.lumiun.com\/teste-seguranca-internet\" target=\"_blank\" rel=\"noreferrer noopener\">Teste a Seguran\u00e7a da sua Internet<\/a><\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>Voc\u00ea sabe se seus funcion\u00e1rios, alunos ou fam\u00edlia est\u00e3o protegidos contra sites de <strong>phishing<\/strong>, <strong>malware<\/strong>, <strong>pornografia<\/strong>, conte\u00fado de <strong>racismo<\/strong> ou <strong>terrorista<\/strong>?<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:image {\"id\":6824,\"sizeSlug\":\"large\"} -->\r\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.lumiun.com\/teste-seguranca-internet\" target=\"_blank\" rel=\"noopener noreferrer\"><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-1140x589.jpg.webp 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-500x258.jpg.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-768x396.jpg.webp 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-380x196.jpg.webp 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-800x413.jpg.webp 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE-1160x599.jpg.webp 1160w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock-TESTE.jpg.webp 1201w\" sizes=\"(max-width: 1140px) 100vw, 1140px\" type=\"image\/webp\"><img decoding=\"async\" width=\"1140\" height=\"589\" class=\"wp-image-6824 webpexpress-processed\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-1140x589.jpg\" alt=\"seguran\u00e7a da informa\u00e7\u00e3o\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-1140x589.jpg 1140w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-500x258.jpg 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-768x396.jpg 768w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-380x196.jpg 380w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-800x413.jpg 800w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE-1160x599.jpg 1160w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock-TESTE.jpg 1201w\" sizes=\"(max-width: 1140px) 100vw, 1140px\"><\/picture><\/a><\/figure>\r\n<!-- \/wp:image -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>No teste ser\u00e3o feitas requisi\u00e7\u00f5es de acessos a v\u00e1rios sites que est\u00e3o dentro das categorias consideradas inseguras, a partir da sua conex\u00e3o de internet, como:<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:list -->\r\n<ul>\r\n<li>Phishing e fraudes online<\/li>\r\n<li>Malware e spyware<\/li>\r\n<li>Anonimizadores de acesso<\/li>\r\n<li>Drogas e bebidas alco\u00f3licas<\/li>\r\n<li>Jogos e apostas<\/li>\r\n<li>Pornografia e nudez<\/li>\r\n<li>Viol\u00eancia, terrorismo e racismo<\/li>\r\n<\/ul>\r\n<!-- \/wp:list -->\r\n\r\n<!-- wp:separator {\"className\":\"is-style-wide\"} --><hr class=\"wp-block-separator is-style-wide\" \/><!-- \/wp:separator -->\r\n\r\n<!-- wp:heading -->\r\n<h2 id=\"materiais\">Materiais<\/h2>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:image {\"id\":6814,\"sizeSlug\":\"large\"} --><!-- \/wp:image -->\r\n\r\n<!-- wp:shortcode -->\r\n<div class=\"rock-convert-banner\"><a href=\"https:\/\/conteudo.lumiun.com\/infografico-8-ataques-ciberneticos?utm_medium=rock-convert\" target=\"_blank\" class=\"rock-convert-cta-link\" data-cta-id=\"6757\" data-cta-title=\"Infogr\u00e1fico 8 ataques cibern\u00e9ticos\"><picture><source srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock1-1.jpg.webp 619w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock1-1-500x203.jpg.webp 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/webp-express\/webp-images\/uploads\/Imagens-Banners-Rock1-1-380x154.jpg.webp 380w\" sizes=\"(max-width: 619px) 100vw, 619px\" type=\"image\/webp\"><img fetchpriority=\"high\" decoding=\"async\" width=\"619\" height=\"251\" src=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock1-1.jpg\" class=\"attachment-full size-full webpexpress-processed\" alt=\"\" title=\"Infogr\u00e1fico 8 ataques cibern\u00e9ticos\" srcset=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock1-1.jpg 619w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock1-1-500x203.jpg 500w, https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Imagens-Banners-Rock1-1-380x154.jpg 380w\" sizes=\"(max-width: 619px) 100vw, 619px\" loading=\"eager\"><\/picture><\/a><\/div>\r\n<hr \/><!-- \/wp:shortcode -->\r\n\r\n<!-- wp:separator {\"className\":\"is-style-wide\"} --><!-- \/wp:list -->\r\n\r\n<!-- wp:separator {\"className\":\"is-style-wide\"} -->\r\n<h2 id=\"eventos\">Eventos<\/h2>\r\n<p><!-- \/wp:heading -->\r\n\r\n<!-- wp:image {\"id\":6814,\"sizeSlug\":\"large\"} --><!-- \/wp:image -->\r\n\r\n<!-- wp:shortcode --><\/p>\r\n<p><a href=\"https:\/\/www.sympla.com.br\/webinar--seguranca-da-informacao-e-privacidade-conforme-a-isoiec-277012019__935361\">Webinar | Seguran\u00e7a da informa\u00e7\u00e3o e privacidade conforme a ISO\/IEC 27701:2019<\/a><\/p>\r\n<ul>\r\n<li>5 de setembro de 2020, 19h &#8211; 20h<\/li>\r\n<li>Evento online<\/li>\r\n<\/ul>\r\n<hr class=\"wp-block-separator is-style-wide\" \/><!-- \/wp:separator -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>Voc\u00ea ainda n\u00e3o est\u00e1 inscrito na nossa newsletter para receber esse conte\u00fado semanalmente no e-mail? Ent\u00e3o se inscreva atrav\u00e9s do link abaixo:<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph -->\r\n<p><a href=\"https:\/\/conteudo.lumiun.com\/semana-da-seguranca-na-internet\">https:\/\/conteudo.lumiun.com\/semana-da-seguranca-na-internet<\/a><\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>Compartilhe o link com seus colegas e amigos.<\/p>","protected":false},"excerpt":{"rendered":"Na edi\u00e7\u00e3o N\u00ba 29 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, intelig\u00eancia artificial ajuda a te proteger de fraudes,&hellip;\n","protected":false},"author":11,"featured_media":7144,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"content-type":"","footnotes":""},"categories":[143],"tags":[266,58,44,137,236],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba29 | Lumiun Blog<\/title>\n<meta name=\"description\" content=\"Na edi\u00e7\u00e3o N\u00ba 29 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, empresas brasileiras j\u00e1 sofreram ataques cibern\u00e9ticos em 2020 e muito mais.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba29 | Lumiun Blog\" \/>\n<meta property=\"og:description\" content=\"Na edi\u00e7\u00e3o N\u00ba 29 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, empresas brasileiras j\u00e1 sofreram ataques cibern\u00e9ticos em 2020 e muito mais.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/\" \/>\n<meta property=\"og:site_name\" content=\"Lumiun Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LumiunTecnologia\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-14T13:46:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-02T18:00:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao29-blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"708\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kelvin Zimmer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kelvin Zimmer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/\"},\"author\":{\"name\":\"Kelvin Zimmer\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77\"},\"headline\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba29\",\"datePublished\":\"2020-09-14T13:46:42+00:00\",\"dateModified\":\"2022-05-02T18:00:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/\"},\"wordCount\":603,\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao29-blog.jpg\",\"keywords\":[\"inteligencia artificial\",\"phishing\",\"ransomware\",\"seguran\u00e7a da informa\u00e7\u00e3o\",\"seguran\u00e7a de dados\"],\"articleSection\":[\"Semana da Seguran\u00e7a na Internet\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/\",\"name\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba29 | Lumiun Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao29-blog.jpg\",\"datePublished\":\"2020-09-14T13:46:42+00:00\",\"dateModified\":\"2022-05-02T18:00:24+00:00\",\"description\":\"Na edi\u00e7\u00e3o N\u00ba 29 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, empresas brasileiras j\u00e1 sofreram ataques cibern\u00e9ticos em 2020 e muito mais.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/#primaryimage\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao29-blog.jpg\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao29-blog.jpg\",\"width\":1200,\"height\":708},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.lumiun.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba29\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"name\":\"Lumiun Blog\",\"description\":\"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI\",\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\",\"name\":\"Lumiun Tecnologia\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"width\":1500,\"height\":930,\"caption\":\"Lumiun Tecnologia\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/LumiunTecnologia\/\",\"https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/\",\"https:\/\/www.youtube.com\/LumiunNetwork\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77\",\"name\":\"Kelvin Zimmer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g\",\"caption\":\"Kelvin Zimmer\"},\"description\":\"Colunista de ciberseguran\u00e7a, especialista em produtividade e Analista de Marketing na Lumiun.\",\"sameAs\":[\"http:\/\/lumiun.com\"],\"url\":\"https:\/\/www.lumiun.com\/blog\/author\/kelvin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba29 | Lumiun Blog","description":"Na edi\u00e7\u00e3o N\u00ba 29 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, empresas brasileiras j\u00e1 sofreram ataques cibern\u00e9ticos em 2020 e muito mais.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/","og_locale":"pt_BR","og_type":"article","og_title":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba29 | Lumiun Blog","og_description":"Na edi\u00e7\u00e3o N\u00ba 29 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, empresas brasileiras j\u00e1 sofreram ataques cibern\u00e9ticos em 2020 e muito mais.","og_url":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/","og_site_name":"Lumiun Blog","article_publisher":"https:\/\/www.facebook.com\/LumiunTecnologia\/","article_published_time":"2020-09-14T13:46:42+00:00","article_modified_time":"2022-05-02T18:00:24+00:00","og_image":[{"width":1200,"height":708,"url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao29-blog.jpg","type":"image\/jpeg"}],"author":"Kelvin Zimmer","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Kelvin Zimmer","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/#article","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/"},"author":{"name":"Kelvin Zimmer","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77"},"headline":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba29","datePublished":"2020-09-14T13:46:42+00:00","dateModified":"2022-05-02T18:00:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/"},"wordCount":603,"publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao29-blog.jpg","keywords":["inteligencia artificial","phishing","ransomware","seguran\u00e7a da informa\u00e7\u00e3o","seguran\u00e7a de dados"],"articleSection":["Semana da Seguran\u00e7a na Internet"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/","url":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/","name":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba29 | Lumiun Blog","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/#primaryimage"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao29-blog.jpg","datePublished":"2020-09-14T13:46:42+00:00","dateModified":"2022-05-02T18:00:24+00:00","description":"Na edi\u00e7\u00e3o N\u00ba 29 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, empresas brasileiras j\u00e1 sofreram ataques cibern\u00e9ticos em 2020 e muito mais.","breadcrumb":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/#primaryimage","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao29-blog.jpg","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao29-blog.jpg","width":1200,"height":708},{"@type":"BreadcrumbList","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no29\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.lumiun.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba29"}]},{"@type":"WebSite","@id":"https:\/\/www.lumiun.com\/blog\/#website","url":"https:\/\/www.lumiun.com\/blog\/","name":"Lumiun Blog","description":"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI","publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.lumiun.com\/blog\/#organization","name":"Lumiun Tecnologia","url":"https:\/\/www.lumiun.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","width":1500,"height":930,"caption":"Lumiun Tecnologia"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LumiunTecnologia\/","https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/","https:\/\/www.youtube.com\/LumiunNetwork"]},{"@type":"Person","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77","name":"Kelvin Zimmer","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g","caption":"Kelvin Zimmer"},"description":"Colunista de ciberseguran\u00e7a, especialista em produtividade e Analista de Marketing na Lumiun.","sameAs":["http:\/\/lumiun.com"],"url":"https:\/\/www.lumiun.com\/blog\/author\/kelvin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/7138"}],"collection":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/comments?post=7138"}],"version-history":[{"count":10,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/7138\/revisions"}],"predecessor-version":[{"id":8013,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/7138\/revisions\/8013"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media\/7144"}],"wp:attachment":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media?parent=7138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/categories?post=7138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/tags?post=7138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}