Saiba mais

Blog

No blog da Ingecom fazemos eco de artigos cujo tema está associado ao ambiente de cibersegurança e ciberinteligência. Os posts são assinados por especialistas do nosso departamento técnico, bem como especialistas em segurança dos fabricantes com os quais temos alianças.

| janeiro 22, 2021

Discussing Bitdefender Business Solutions Group’s Growing Momentum

Bitdefender’s Business Solutions Group came off an exceptional year of growth fueled in part by enterprise demand for endpoint protection and threat detection and response services to counter cybercriminals capitalizing on the global pandemic 

| janeiro 11, 2021

The Unseen Risk Facing the Enterprise of Things

The proliferation of agentless IoT, OT and other connected devices will create a potentially far greater attack surface. Within these devices lies a new layer of risk, one now further illuminated by new research by Forescout Research Labs

| janeiro 07, 2021

What Top 10 Cybersecurity Challenges for 2021 can SealPath help with?

There has been a dramatic change in the security landscape following the massive deployment of teleworking, which has brought new priorities for CISOs and organizational security managers.

| dezembro 17, 2020

Phishing remains the predominant type of website attack in Europe

According to the Allot report about Cyber Threat Report (Europe Edition, Q3 2020), phishing represented 54% of blocks during Q3; just 1% below the previous quarter

| novembro 23, 2020

3 Fraud Defense Strategies to Address Coronavirus Scams

During every major holiday, global crisis, or national or global event, bad actors prey on a new crop of potential victims. The COVID-19 pandemic is no exception to the rule, and despite a global recession, scams and phishing attacks are booming

| novembro 10, 2020

Who should encrypt the data in my company?

The encryption of data in companies prevents information leaks and mitigates the cost of its impact

| novembro 05, 2020

How Healthcare Can Combat Ryuk Ransomware

Ransomware poses a serious threat to clinical environments

| outubro 26, 2020

Sealing the Patch Gap

Statistics show 60% of breaches that were related to vulnerabilities could have been prevented with the appropriate patch

| outubro 23, 2020

Vulnerability Remediation vs. Mitigation: What’s the Difference?

Both are different approaches to dealing with a vulnerability, and each has its own merits depending on the specific vulnerability you are dealing with.

| outubro 06, 2020

MobileIron Research Reveals UK Consumers Are Using Loosely Secured Mobile Devices to Scan QR Codes, Putting Themselves and Businesses at Risk

48% of respondents do not have or do not know if they have security software installed on their devices

| setembro 28, 2020

Gartner Report on Handling Challenges with TLS 1.3 and Passive Decryption

Many companies fear that this new, strong encryption standard will negatively impact their ability to monitor their own environments for security threats

| setembro 04, 2020

DNS Security in Healthcare: Paving the Way Toward Secure Health Infrastructure

In recent years, the pace of digitization in the healthcare sector has accelerated rapidly

| agosto 28, 2020

Protection of AutoDesk Inventor CAD Designs

Many companies in the manufacturing and engineering environment use AutoDesk Inventor in their processes, and in these designs, they include highly sensitive and confidential information for them

| agosto 21, 2020

3 Reasons to Add Digital Risk Protection (DRP) to Your Security Defenses

The threat landscape continues to evolve as digitization increases. In an attempt to keep pace, organizations are adding new software to their tech stack, but are they choosing the right solutions and approach to ensure their security?

| agosto 14, 2020

Ripple20 Vulnerabilities Could Impact Hundreds of Millions of Connected Devices

How to understand your exposure and mitigate your risks

| agosto 10, 2020

Which device will be your weakest link this year?

Malicious cyber actors continue to innovate at a rapid pace while the attack surface simultaneously expand. So what are the risks, where are they and what can you do about them?

| agosto 10, 2020

Which device will be your weakest link this year?

Malicious cyber actors continue to innovate at a rapid pace while the attack surface simultaneously expand. So what are the risks, where are they and what can you do about them?

| julho 24, 2020

Protecting the three states of data

When it comes to protecting confidential information, we find that clients require different approaches or pose different protection needs

| julho 03, 2020

How to Centralize Identity for a Rapidly Changing, Distributed Workforce

In the past, centralizing identities has been associated with mergers and acquisitions or domain consolidation efforts. More recently, organizations are being pushed to provide workplace resources to a remote workforce.

| junho 25, 2020

SMB overwhelmingly believe they are ready to deal with cybersecurity incidents

Few SMB are actually ready to deal with the aftermath of a cybersecurity incident, according to new research published by Infrascale.