Saiba mais

Blog

No blog da Ingecom fazemos eco de artigos cujo tema está associado ao ambiente de cibersegurança e ciberinteligência. Os posts são assinados por especialistas do nosso departamento técnico, bem como especialistas em segurança dos fabricantes com os quais temos alianças.

| junho 11, 2020

DNS attacks cost nearly $1 million each, increasingly impacting the cloud

Four out of five companies experienced a DNS attack, according to 2020 Global DNS Threat Report.

| junho 10, 2020

Building A Zero Trust Visibility Architecture

The concept is a departure from perimeter-based cybersecurity as the focus shifts toward individual access

| abril 23, 2020

Protect Files in Teams and Slack

Microsoft Teams and Slack allow more real-time interaction, facilitating efficiency when teleworking.

| março 31, 2020

Privileged Access Management: The Great Cloud Migration

Thycotic has developed a step-by-step methodology that takes the fear and stress out of your PAM cloud migration

| fevereiro 24, 2020

Banking on Security: Growing Risk of Malware Threatens Financial Sector

As the COVID-19 pandemic continues to take its toll on the economy, we recognize more clearly than ever that financial services are among a select group of critical economic services, and it is paramount that they remain secure and operational.

| fevereiro 22, 2020

Keep your confidential documents from being compromised during remote work

Since the first outbreaks of Covid19 in Europe and seeing the containment measures taken by different countries such as Italy or Spain, many companies have been preparing so that their employees could work remotely

| fevereiro 20, 2020

Best Practices and Cyber Security Tips for Working Remotely

Given the unusual recent circumstances, many employees around the world are finding themselves in a situation where they must work from home or remotely.

| fevereiro 19, 2020

Secure Teleworking: Protecting data in the Cloud

Remote work or teleworking has been imposed at a fast pace and CISOs have had to establish procedures and tools to work safely, among the most important, protecting data in the cloud.