Jun 8, 2023
Main types of scams focused on social engineering
Threats related to social engineering are nothing new. Learn about the main methods of social engineering used.
Feb 25, 2022
Passwordless World: How to reimagine the authentication
Passwords have been the most popular authentication security layer for decades. But can you imagine a passwordless world?
Feb 16, 2022
Security ambassadors: how to create a culture that protects your organization
Creating a culture of information security can be quite a challenge. So learn how an ambassador program can help you.
Feb 9, 2022
Tips for more security and privacy on Facebook
With two billion users, Facebook is still one of the most widely used networks. However, users are still not concerned about security.
Jan 12, 2022
Application security: how to protect your organization from the main types of attacks
Know why application security is an essential factor for organizations to protect themselves from cyber attacks.
Nov 8, 2021
LGPD: how does the law impact organizations' budgets for 2022
The growth of cybercrime has led to the need for specific regulation to limit possible abuses. The LGPD (General Data Protection Act)...
Oct 29, 2021
Acceptable use of computing resources: policies that ensure more security
Defining acceptable use policies for computing resources is critical to your organization's security.
Oct 7, 2021
Customer success: our journey searching for strategic results
In today's world, cybersecurity has become a strategic element for organizations. With this, it is natural for large institutions and...
Sep 30, 2021
How you can improve your security and privacy on LinkedIn
LinkedIn is a tool where we seek professional connections. For this reason, it is very common that data, such as email and phone, can be...
Sep 30, 2021
Cyberattacks: what are the harms for organizations and how can they deal with it
Digital security has become one of the key points for organizations in recent years. The growing number of cyberattacks around the world...