information security

Information Security Week – Edition Nº26

In edition No. 26 of Information Security Week, test your internet security, report on threats to public clouds, companies can be invaded by hackers in just 30 minutes, the world's largest cruise operator was the target of attack, possible virus in Android and much more.


News

Check Point Security Report Highlights Threats to Public Clouds

The report shows that public cloud security continues to be one of the biggest challenges: 75% of respondents said they were “very concerned” or “extremely concerned” about it.

On Infor Channel

93% of companies can be hacked in just 30 minutes

Entry-level hackers can invade companies and their respective networks in just 30 minutes, taking advantage of software vulnerabilities. 

By Felipe Ribeiro on Canal Tech

World's largest cruise operator targeted by ransomware attacks

Carnival Corporation acknowledged that the incident may have affected personal data of customers and employees; Cybercriminals downloaded files from the company's systems.

By Victor Pinheiro in Olhar Digital

Can Android get 'viruses' after connecting the cell phone to the computer?

How do you know if your cell phone has a virus? Although the computer infects a smartphone with viruses through the USB connection, this is a very rare scenario.

By Altieres Rohr and m G1

Discover two basic flaws that leave companies vulnerable to cyberattacks

Use of weak passwords and vulnerable versions of software are the main problems highlighted in a report produced by ethical hackers and scientific researchers.

In Olhar Digital

How to check your smartphone security

If you care about the security of your smartphone, it is essential to always be up to date on the main threats created to target mobile devices.

At 33 Giga

235 million profiles are exposed to major data leak

Comparitech's security research team has revealed how an insecure database left nearly 235 million Instagram, TikTok and YouTube user profiles exposed online in what can only be described as a massive data breach.

By Maria Eduarda in Windows Team

Cybercrimes: How to act in case of invasion and data theft?

Cybercrime, a subject that needs to be present and debated in everyday life, but which is still little discussed, and above all, there are few companies that know the importance of understanding this subject and maintaining security to prevent invasion and data theft.

By Aléx de Oliveira on Lumiun Blog


Tooltips

Test your Internet Security

Do you know if your employees, students or family are protected from phishing , malware , pornography racist or terrorist content ?

information security

In the test, access requests will be made to several websites that are within the categories considered insecure, using your internet connection, such as:

  • Phishing and online fraud
  • Malware and spyware
  • Access anonymizers
  • Drugs and alcoholic beverages
  • Games and bets
  • Pornography and nudity
  • Violence, terrorism and racism

Materials

home office guide

videos

Webinar | Information security and privacy in accordance with ISO/IEC 27701:2019

https://www.youtube.com/watch?v=sZjkeyPElY8

Events

Organizational Information Security Training

  • August 26, 2020, 5pm – 6pm
  • Online event

Are you not yet subscribed to our newsletter to receive this content weekly by email? Then sign up using the link below:

https://conteudo.lumiun.com/semana-da-seguranca-na-internet

Share the link with your colleagues and friends.

Related Posts