{"id":14945,"date":"2024-06-28T13:27:22","date_gmt":"2024-06-28T13:27:22","guid":{"rendered":"https:\/\/hsclabs.com\/?p=14945"},"modified":"2025-05-27T13:07:31","modified_gmt":"2025-05-27T13:07:31","slug":"o-que-e-phishing","status":"publish","type":"post","link":"https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/","title":{"rendered":"O que \u00e9 phishing?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"14945\" class=\"elementor elementor-14945\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-26ade54 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"26ade54\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-df531b3\" data-id=\"df531b3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2eb8a1e elementor-widget elementor-widget-ha-post-title happy-addon ha-post-title\" data-id=\"2eb8a1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ha-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"ha-post-title elementor-size-default\">O que \u00e9 phishing?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42670d2 elementor-widget elementor-widget-template\" data-id=\"42670d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"11928\" class=\"elementor elementor-11928\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b71fdbb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b71fdbb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bbf772c\" data-id=\"bbf772c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cd4831a elementor-widget elementor-widget-post-info\" data-id=\"cd4831a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-f5a2311 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/2024\/06\/28\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-calendar-check\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Atualizado em<\/span>\n\t\t\t\t\t\t\t\t\t\t<time>28 junho  2024<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-ecb4e32 elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/author\/hsc\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-user-circle\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t\t\t\tHSC\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-072a961 elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-file-alt\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/category\/cybersecurity\/\" class=\"elementor-post-info__terms-list-item\">Cybersecurity<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f330cd elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"0f330cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1200\" height=\"627\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/o-que-e-phishing.jpg\" class=\"attachment-full size-full wp-image-16162\" alt=\"\" srcset=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/o-que-e-phishing.jpg 1200w, https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/o-que-e-phishing-300x157.jpg 300w, https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/o-que-e-phishing-1024x535.jpg 1024w, https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/o-que-e-phishing-768x401.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ded4b82 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ded4b82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cad793e elementor-widget elementor-widget-text-editor\" data-id=\"cad793e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Phishing \u00e9 um golpe utilizado por cibercriminosos para enganar e persuadir pessoas, fazendo com que elas tomem uma a\u00e7\u00e3o e revelem informa\u00e7\u00f5es sens\u00edveis, como senhas, n\u00fameros de cart\u00f5es de cr\u00e9dito e outros dados pessoais.<\/span><\/p><p><span style=\"font-weight: 400;\">De acordo com o FBI, o phishing ocupa o <\/span><a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2023_IC3Report.pdf\"><span style=\"font-weight: 400;\">primeiro lugar entre os crimes cibern\u00e9ticos em todo o mundo<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p><p><span style=\"font-weight: 400;\">Esse tipo de ataque cibern\u00e9tico geralmente envolve e-mails, sites ou mensagens falsas de telefone que parecem vir de fontes confi\u00e1veis. Ali\u00e1s, o termo tem origem na palavra &#8220;fishing&#8221; (pescar), representando a ideia de atrair e enganar pessoas para obter as suas informa\u00e7\u00f5es pessoais e dados sens\u00edveis.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">A melhor forma de se proteger contra esse tipo de fraude \u00e9 combinando o uso de tecnologias avan\u00e7adas de <\/span><a href=\"https:\/\/hsclabs.com\/pt-br\/mailinspector\/\"><span style=\"font-weight: 400;\">seguran\u00e7a de e-mail<\/span><\/a><span style=\"font-weight: 400;\"> com a educa\u00e7\u00e3o cont\u00ednua dos usu\u00e1rios. Continue lendo este artigo para se aprofundar no assunto e aprender mais sobre phishing e como se proteger.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26cf78b elementor-widget elementor-widget-template\" data-id=\"26cf78b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"11922\" class=\"elementor elementor-11922\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d745e8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d745e8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-82aa485\" data-id=\"82aa485\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-185f194 elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"185f194\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;],&quot;marker_view&quot;:&quot;bullets&quot;,&quot;icon&quot;:{&quot;value&quot;:&quot;far fa-dot-circle&quot;,&quot;library&quot;:&quot;fa-regular&quot;},&quot;no_headings_message&quot;:&quot;N\\u00e3o foram encontrados cabe\\u00e7alhos nesta p\\u00e1gina.&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h2 class=\"elementor-toc__header-title\">\n\t\t\t\tPrincipais t\u00f3picos deste artigo\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__185f194\" aria-expanded=\"true\" aria-label=\"Abrir Tabela de Conte\u00fados\"><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__185f194\" aria-expanded=\"true\" aria-label=\"Fechar Tabela de Conte\u00fados\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__185f194\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9050eb elementor-widget elementor-widget-template\" data-id=\"f9050eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"12009\" class=\"elementor elementor-12009\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section data-ha-partstyle=\"nasa\" data-ha-partcolor=\"\" data-ha-partopacity=\"0.4\" data-ha-partdirection=\"bottom\" class=\"elementor-section elementor-top-section elementor-element elementor-element-6f97dd3 ha-particle-yes elementor-section-boxed elementor-section-height-default elementor-section-height-default ha-particle-adv-no\" data-id=\"6f97dd3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-be74f27\" data-id=\"be74f27\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b3233fa elementor-widget elementor-widget-heading\" data-id=\"b3233fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Veja como a HSC Labs melhorou a <b>seguran\u00e7a de e-mail<\/b> do MP-Bahia<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-541a906 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"541a906\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/hsclabs.com\/pt-br\/case-mpba-mailinspector\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Leia o estudo de caso<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-49045f6\" data-id=\"49045f6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51a2fe2 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"51a2fe2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"401\" height=\"361\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/02\/case-sucesso-mailinspector-mpba.png\" class=\"attachment-large size-large wp-image-14078\" alt=\"\" srcset=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/02\/case-sucesso-mailinspector-mpba.png 401w, https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/02\/case-sucesso-mailinspector-mpba-300x270.png 300w\" sizes=\"(max-width: 401px) 100vw, 401px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3360db4 elementor-widget elementor-widget-heading\" data-id=\"3360db4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Como funciona o phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae90216 elementor-widget elementor-widget-text-editor\" data-id=\"ae90216\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">O phishing \u00e9 um tipo de fraude que explora o fator humano, manipulando emo\u00e7\u00f5es e comportamentos como curiosidade, medo e confian\u00e7a. Os golpistas aproveitam esses sentimentos e momentos de vulnerabilidade para enganar as pessoas, fazendo com que caiam no golpe.<\/span><\/p><p><span style=\"font-weight: 400;\">A primeira etapa de um ataque de phishing envolve a identifica\u00e7\u00e3o da v\u00edtima.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Os criminosos utilizam v\u00e1rias t\u00e1ticas, como pesquisas em redes sociais para obter informa\u00e7\u00f5es pessoais ou o envio de e-mails e mensagens em massa para listas de contatos. Sites comprometidos ou maliciosos tamb\u00e9m podem ser usados para atrair as v\u00edtimas e coletar dados sens\u00edveis.<\/span><\/p><p><span style=\"font-weight: 400;\">Em seguida, os golpistas aplicam t\u00e9cnicas de engenharia social para enganar as v\u00edtimas.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Eles enviam e-mails que parecem ser de empresas leg\u00edtimas, como bancos ou provedores de servi\u00e7os, geralmente criando um senso de urg\u00eancia falso para convencer as pessoas a agir rapidamente. Essas mensagens costumam conter links ou anexos infectados com malware.<\/span><\/p><p><span style=\"font-weight: 400;\">Um exemplo real \u00e9 o <\/span><a href=\"https:\/\/www.bbc.com\/news\/technology-39744007\"><span style=\"font-weight: 400;\">ataque de phishing<\/span><\/a><span style=\"font-weight: 400;\"> contra Google e Facebook, onde os golpistas fingiram ser um fornecedor de hardware leg\u00edtimo e conseguiram enganar funcion\u00e1rios, roubando mais de 100 milh\u00f5es de d\u00f3lares.<\/span><\/p><p><span style=\"font-weight: 400;\">No Brasil, casos comuns e reais envolvem e-mails falsos em nome de <\/span><a href=\"https:\/\/g1.globo.com\/tecnologia\/noticia\/2023\/05\/31\/ir-receita-alerta-para-golpe-com-e-mail-falso-do-governo-sobre-erro-na-declaracao.ghtml\"><span style=\"font-weight: 400;\">\u00f3rg\u00e3os do governo<\/span><\/a><span style=\"font-weight: 400;\">, dos <\/span><a href=\"https:\/\/tecnoblog.net\/noticias\/correios-alertam-para-golpes-de-phishing-via-e-mail-e-redes-sociais\/\"><span style=\"font-weight: 400;\">Correios<\/span><\/a><span style=\"font-weight: 400;\">, de <\/span><a href=\"https:\/\/www.tecmundo.com.br\/seguranca\/215931-falso-email-caixa-finge-bloqueio-pix-roubar-dados.htm\"><span style=\"font-weight: 400;\">bancos<\/span><\/a><span style=\"font-weight: 400;\"> e de <\/span><a href=\"https:\/\/tecnoblog.net\/noticias\/emails-do-instagram-nova-funcao-seguranca\/\"><span style=\"font-weight: 400;\">redes sociais<\/span><\/a><span style=\"font-weight: 400;\">. Em geral, s\u00e3o tentativas de obter dados sens\u00edveis, credenciais de acesso e at\u00e9 mesmo transfer\u00eancias via PIX.<\/span><\/p><p><span style=\"font-weight: 400;\">Para se proteger contra esse tipo de ataque \u00e9 fundamental estar sempre atento e seguir pr\u00e1ticas de seguran\u00e7a recomendadas, como verificar a autenticidade de URLs e desconfiar de e-mails suspeitos.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">A tecnologia e a c<\/span><a href=\"https:\/\/hsclabs.com\/pt-br\/mindaware360\/\"><span style=\"font-weight: 400;\">onscientiza\u00e7\u00e3o em ciberseguran\u00e7a<\/span><\/a><span style=\"font-weight: 400;\"> s\u00e3o as melhores defesas contra essas amea\u00e7as. Inclusive, treinar funcion\u00e1rios para reconhecer e responder adequadamente a tentativas de phishing reduz significativamente os riscos associados a esses ataques.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3f8331 elementor-widget elementor-widget-template\" data-id=\"d3f8331\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"15243\" class=\"elementor elementor-15243\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section data-ha-partstyle=\"nasa\" data-ha-partcolor=\"\" data-ha-partopacity=\"0.4\" data-ha-partdirection=\"bottom\" class=\"elementor-section elementor-top-section elementor-element elementor-element-6f97dd3 ha-particle-yes elementor-section-boxed elementor-section-height-default elementor-section-height-default ha-particle-adv-no\" data-id=\"6f97dd3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-be74f27\" data-id=\"be74f27\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b3233fa elementor-widget elementor-widget-heading\" data-id=\"b3233fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Ensine seus colaboradores a <b>reconhecer golpes e amea\u00e7as<\/b><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-541a906 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"541a906\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/hsclabs.com\/pt-br\/mindaware\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quero saber mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-49045f6\" data-id=\"49045f6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51a2fe2 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"51a2fe2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1272\" height=\"278\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/Logo-Mindaware-06.png\" class=\"attachment-full size-full wp-image-14663\" alt=\"\" srcset=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/Logo-Mindaware-06.png 1272w, https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/Logo-Mindaware-06-300x66.png 300w, https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/Logo-Mindaware-06-1024x224.png 1024w, https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/Logo-Mindaware-06-768x168.png 768w\" sizes=\"(max-width: 1272px) 100vw, 1272px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28b1ea5 elementor-widget elementor-widget-heading\" data-id=\"28b1ea5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Tipos de phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a43603 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"3a43603\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">O phishing pode assumir v\u00e1rias formas, cada uma com caracter\u00edsticas e alvos espec\u00edficos. Confira a seguir alguns formatos comuns desse tipo de golpe.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-956e0fd elementor-widget elementor-widget-heading\" data-id=\"956e0fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Spear Phishing<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f206af elementor-widget elementor-widget-text-editor\" data-id=\"4f206af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/hsclabs.com\/pt-br\/spear-phishing\/\"><span style=\"font-weight: 400;\">Spear phishing<\/span><\/a><span style=\"font-weight: 400;\"> \u00e9 um ataque direcionado a indiv\u00edduos ou organiza\u00e7\u00f5es espec\u00edficas. Ao contr\u00e1rio dos ataques de phishing comuns, o spear phishing \u00e9 altamente personalizado, o que o torna mais convincente. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d35a3d9 elementor-widget elementor-widget-heading\" data-id=\"d35a3d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Business Email Compromise (BEC)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d36a692 elementor-widget elementor-widget-text-editor\" data-id=\"d36a692\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/hsclabs.com\/pt-br\/business-e-mail-compromise\/\"><span style=\"font-weight: 400;\">BEC<\/span><\/a><span style=\"font-weight: 400;\"> \u00e9 um tipo sofisticado de phishing em que os atacantes se passam por executivos ou funcion\u00e1rios da empresa para enganar os destinat\u00e1rios e faz\u00ea-los transferir dinheiro ou informa\u00e7\u00f5es sens\u00edveis. Esses ataques geralmente visam departamentos financeiros e costumam resultar em grandes perdas financeiras.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4eaeb2f elementor-widget elementor-widget-heading\" data-id=\"4eaeb2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Whaling (Fraude do CEO)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1eaba27 elementor-widget elementor-widget-text-editor\" data-id=\"1eaba27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Whaling \u00e9 um tipo de ataque que visa indiv\u00edduos de alto perfil, como executivos ou gerentes. Os cibercriminosos se passam por colegas ou parceiros de neg\u00f3cios confi\u00e1veis para extrair informa\u00e7\u00f5es sens\u00edveis ou solicitar grandes transa\u00e7\u00f5es financeiras.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e9e6cf elementor-widget elementor-widget-heading\" data-id=\"5e9e6cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Vishing (Voice Phishing)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-949ece6 elementor-widget elementor-widget-text-editor\" data-id=\"949ece6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Vishing envolve o uso de chamadas telef\u00f4nicas para enganar as v\u00edtimas e faz\u00ea-las fornecer informa\u00e7\u00f5es pessoais. Os criminosos costumam se passar por representantes de bancos, de empresas telef\u00f4nicas e at\u00e9 de suporte t\u00e9cnico, convencendo a v\u00edtima a compartilhar detalhes sens\u00edveis pelo telefone.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-484e736 elementor-widget elementor-widget-heading\" data-id=\"484e736\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Smishing (SMS Phishing)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d4c4c9 elementor-widget elementor-widget-text-editor\" data-id=\"3d4c4c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/hsclabs.com\/pt-br\/smishing\/\"><span style=\"font-weight: 400;\">Smishing<\/span><\/a><span style=\"font-weight: 400;\"> usa mensagens de texto para enganar as v\u00edtimas. Essas mensagens geralmente cont\u00eam links para sites maliciosos ou induzem o destinat\u00e1rio a ligar para um n\u00famero de telefone.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64fa767 elementor-widget elementor-widget-heading\" data-id=\"64fa767\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Phishing por Redes Sociais<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a64fea1 elementor-widget elementor-widget-text-editor\" data-id=\"a64fea1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">No phishing por redes sociais, os atacantes usam plataformas de m\u00eddia social, como Facebook e Linkedin, para coletar informa\u00e7\u00f5es pessoais ou enviar links maliciosos. Eles costumam, inclusive, criar perfis falsos ou hackear contas existentes para atrair v\u00edtimas a compartilhar dados sens\u00edveis.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81d7f6c elementor-widget elementor-widget-heading\" data-id=\"81d7f6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Pharming<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0cbc2af elementor-widget elementor-widget-text-editor\" data-id=\"0cbc2af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/hsclabs.com\/pt-br\/pharming\/\"><span style=\"font-weight: 400;\">Pharming<\/span><\/a><span style=\"font-weight: 400;\"> redireciona os usu\u00e1rios de sites leg\u00edtimos para sites falsos sem que eles percebam. Isso pode acontecer por meio de malware instalado no dispositivo do usu\u00e1rio ou explorando vulnerabilidades em servidores.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b7cf38 elementor-widget elementor-widget-template\" data-id=\"5b7cf38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"12004\" class=\"elementor elementor-12004\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section data-ha-partstyle=\"nasa\" data-ha-partcolor=\"\" data-ha-partopacity=\"0.2\" data-ha-partdirection=\"bottom\" class=\"elementor-section elementor-top-section elementor-element elementor-element-2155d94 ha-particle-yes elementor-section-boxed elementor-section-height-default elementor-section-height-default ha-particle-adv-no\" data-id=\"2155d94\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3d2acae\" data-id=\"3d2acae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c1a86a1 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"c1a86a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"129\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/07\/Logo-Mailinspector-02-1024x165.png\" class=\"attachment-large size-large wp-image-5485\" alt=\"\" srcset=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/07\/Logo-Mailinspector-02-1024x165.png 1024w, https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/07\/Logo-Mailinspector-02-300x48.png 300w, https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/07\/Logo-Mailinspector-02-768x124.png 768w, https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/07\/Logo-Mailinspector-02-1536x247.png 1536w, https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/07\/Logo-Mailinspector-02.png 1702w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ce5d5b3\" data-id=\"ce5d5b3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a2b872b elementor-widget elementor-widget-heading\" data-id=\"a2b872b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Conhe\u00e7a a melhor solu\u00e7\u00e3o de <b>prote\u00e7\u00e3o de e-mail<\/b><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d7cb2a elementor-align-left elementor-widget elementor-widget-button\" data-id=\"4d7cb2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/hsclabs.com\/pt-br\/free-trial\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Agende seu free trial<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85f3abf elementor-widget elementor-widget-heading\" data-id=\"85f3abf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Como identificar ataques de phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1cf6b1 elementor-widget elementor-widget-text-editor\" data-id=\"c1cf6b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">A melhor maneira de identificar golpes de phishing \u00e9 se aprofundando nas t\u00e1ticas e nos truques usados pelos cibercriminosos. Aqui est\u00e3o algumas dicas para identificar e evitar esses ataques:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76afc8e elementor-widget elementor-widget-heading\" data-id=\"76afc8e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Endere\u00e7os de e-mail suspeitos e spoofing<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-709d4d0 elementor-widget elementor-widget-text-editor\" data-id=\"709d4d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Os cibercriminosos usam endere\u00e7os de e-mail que se assemelham a fontes leg\u00edtimas, mas que cont\u00eam pequenas varia\u00e7\u00f5es ou erros de digita\u00e7\u00e3o. Por exemplo, um e-mail de support@paypai.com em vez de <\/span><span style=\"font-weight: 400;\">support@paypal.com<\/span><span style=\"font-weight: 400;\">. Esta t\u00e9cnica \u00e9 conhecida como spoofing.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ae03ba elementor-widget elementor-widget-heading\" data-id=\"4ae03ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Sauda\u00e7\u00f5es gen\u00e9ricas<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b570302 elementor-widget elementor-widget-text-editor\" data-id=\"b570302\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Os e-mails de phishing frequentemente utilizam sauda\u00e7\u00f5es gen\u00e9ricas, como &#8220;Caro cliente&#8221; ou &#8220;Prezado usu\u00e1rio&#8221;. Empresas leg\u00edtimas geralmente usam o nome do destinat\u00e1rio, especialmente em comunica\u00e7\u00f5es importantes.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1cb2ac9 elementor-widget elementor-widget-heading\" data-id=\"1cb2ac9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Senso de urg\u00eancia e amea\u00e7a<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3322e19 elementor-widget elementor-widget-text-editor\" data-id=\"3322e19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Outro sinal de phishing s\u00e3o mensagens alarmantes ou urgentes que solicitam a\u00e7\u00f5es imediatas, como &#8220;Sua conta ser\u00e1 suspensa!&#8221; ou &#8220;Voc\u00ea precisa verificar sua identidade agora!&#8221;. Essas mensagens s\u00e3o desenhadas para induzir p\u00e2nico e fazer com que a v\u00edtima aja sem pensar.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91f8775 elementor-widget elementor-widget-heading\" data-id=\"91f8775\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Links e anexos suspeitos<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63fb297 elementor-widget elementor-widget-text-editor\" data-id=\"63fb297\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Links e anexos maliciosos s\u00e3o muito utilizados em e-mails de phishing para roubar dados e infectar dispositivos com malware, como ransomware e keyloggers. Por isso, a principal dica \u00e9 sempre n\u00e3o clicar em links ou abrir anexos de remetentes desconhecidos ou inesperados.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acb05a9 elementor-widget elementor-widget-heading\" data-id=\"acb05a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Impersonation<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3abadfc elementor-widget elementor-widget-text-editor\" data-id=\"3abadfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">A t\u00e9cnica de impersonation \u00e9 uma forma de engenharia social em que os criminosos cibern\u00e9ticos imitam indiv\u00edduos ou empresas confi\u00e1veis para ganhar a confian\u00e7a da v\u00edtima. Por exemplo, eles podem enviar e-mails que parecem vir de colegas de trabalho, bancos ou outras institui\u00e7\u00f5es respeit\u00e1veis.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Portanto, antes de fornecer qualquer informa\u00e7\u00e3o ou completar uma transa\u00e7\u00e3o financeira \u00e9 importante checar a veracidade da mensagem. Em vez de responder o e-mail, contate diretamente o remetente pelo seu site ou telefone oficiais.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15ee9d6 elementor-widget elementor-widget-heading\" data-id=\"15ee9d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Erros de ortografia e gram\u00e1tica<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7148c63 elementor-widget elementor-widget-text-editor\" data-id=\"7148c63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Erros gramaticais ou ortogr\u00e1ficos s\u00e3o comuns em e-mails de phishing. Embora at\u00e9 empresas leg\u00edtimas possam cometer esses erros ocasionalmente, elas normalmente revisam suas comunica\u00e7\u00f5es para evit\u00e1-los. Portanto, se um e-mail cont\u00e9m muitos erros, isso pode ser um sinal de que n\u00e3o \u00e9 leg\u00edtimo.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c79c1b elementor-widget elementor-widget-heading\" data-id=\"6c79c1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Principais consequ\u00eancias de sofrer um ataque de phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-969b8b4 elementor-widget elementor-widget-text-editor\" data-id=\"969b8b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Os ataques de phishing podem gerar consequ\u00eancias graves, que v\u00e3o de perdas financeiras significativas at\u00e9 o roubo de identidade e o comprometimento de informa\u00e7\u00f5es sens\u00edveis.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Para as empresas, as implica\u00e7\u00f5es podem incluir danos \u00e0 reputa\u00e7\u00e3o, responsabilidades legais e at\u00e9 interrup\u00e7\u00f5es nas opera\u00e7\u00f5es. Abaixo est\u00e3o listadas algumas das principais consequ\u00eancias de sofrer um ataque de phishing:<\/span><\/p><p><b>Roubo de Identidade: <\/b><span style=\"font-weight: 400;\">Informa\u00e7\u00f5es pessoais, como n\u00fameros de CPF, endere\u00e7os e dados banc\u00e1rios, podem ser utilizadas pelos criminosos para realizar transa\u00e7\u00f5es fraudulentas em nome da v\u00edtima.<\/span><\/p><p><b>Perda Financeira: <\/b><span style=\"font-weight: 400;\">Uma das consequ\u00eancias mais diretas e imediatas. Os atacantes podem acessar contas banc\u00e1rias ou convencer as v\u00edtimas a realizarem transfer\u00eancias ou compras fraudulentas, causando preju\u00edzo significativo.<\/span><\/p><p><b>Comprometimento de credenciais:<\/b><span style=\"font-weight: 400;\"> Senhas e dados de login podem ser roubados, permitindo que os criminosos acessem sistemas, contas de e-mail e outros servi\u00e7os online, aumentando o risco de novas fraudes.<\/span><\/p><p><b>Danos \u00e0 Reputa\u00e7\u00e3o: <\/b><span style=\"font-weight: 400;\">Empresas que sofrem ataques de phishing podem ter a sua reputa\u00e7\u00e3o manchada, perdendo a confian\u00e7a de clientes e parceiros de neg\u00f3cios, o que pode impactar negativamente nas vendas e nas rela\u00e7\u00f5es comerciais.<\/span><\/p><p><b>Vazamento de dados confidenciais: <\/b><span style=\"font-weight: 400;\">Informa\u00e7\u00f5es sens\u00edveis de clientes e funcion\u00e1rios podem ser expostas, levando a quest\u00f5es legais e regulat\u00f3rias, al\u00e9m de danos \u00e0 imagem corporativa.<\/span><\/p><p><b>Instala\u00e7\u00e3o de malware:<\/b><span style=\"font-weight: 400;\"> Links e anexos maliciosos em e-mails de phishing podem instalar malware nos dispositivos das v\u00edtimas, possibilitando o roubo de dados e o controle remoto dos sistemas infectados.<\/span><\/p><p><b>Perda de produtividade: <\/b><span style=\"font-weight: 400;\">Empresas atacadas podem enfrentar interrup\u00e7\u00f5es nas suas opera\u00e7\u00f5es, j\u00e1 que os sistemas precisam ser analisados e reparados, resultando em perda de produtividade e aumento dos custos operacionais.<\/span><\/p><p><b>Ataques subsequentes: <\/b><span style=\"font-weight: 400;\">Informa\u00e7\u00f5es obtidas por meio de phishing podem ser usadas para planejar e executar ataques mais sofisticados, como spear phishing e ataques direcionados a sistemas corporativos espec\u00edficos.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b09875c elementor-widget elementor-widget-heading\" data-id=\"b09875c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Como se proteger de phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c5cbee elementor-widget elementor-widget-text-editor\" data-id=\"3c5cbee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Proteger-se contra phishing \u00e9 fundamental para qualquer pessoa. Para minimizar os riscos, a regra de ouro \u00e9 estar sempre atento aos sinais e ciente das t\u00e1ticas mais utilizadas pelos atacantes, como, por exemplo, URLs suspeitas e solicita\u00e7\u00f5es urgentes.<\/span><\/p><p><span style=\"font-weight: 400;\">J\u00e1 no caso de empresas, a prote\u00e7\u00e3o contra phishing requer uma abordagem multifacetada que combine tecnologia avan\u00e7ada e conscientiza\u00e7\u00e3o cont\u00ednua dos funcion\u00e1rios.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">As empresas devem implementar uma solu\u00e7\u00e3o de seguran\u00e7a de e-mail robusta e um programa abrangente de treinamento em ciberseguran\u00e7a para garantir que todos os n\u00edveis da organiza\u00e7\u00e3o estejam preparados para identificar e responder a tentativas de phishing.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60626f2 elementor-widget elementor-widget-heading\" data-id=\"60626f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Solu\u00e7\u00e3o antiphishing e antispam para seguran\u00e7a de e-mail<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1758f25 elementor-widget elementor-widget-text-editor\" data-id=\"1758f25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">A HSC oferece uma solu\u00e7\u00e3o de seguran\u00e7a de e-mail de ponta, que utiliza tecnologias avan\u00e7adas para detectar e bloquear e-mails maliciosos antes que eles cheguem aos funcion\u00e1rios. Os principais recursos incluem:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Intelig\u00eancia artificial:<\/b><span style=\"font-weight: 400;\"> Para identificar e bloquear amea\u00e7as em tempo real.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Sandboxing:<\/b><span style=\"font-weight: 400;\"> Para analisar anexos e links em um ambiente seguro.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Content Disarm &amp; Reconstruction (CDR):<\/b><span style=\"font-weight: 400;\"> Para remover conte\u00fado potencialmente malicioso dos arquivos.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Antispam, antiphishing e antimalware:<\/b><span style=\"font-weight: 400;\"> Para garantir que apenas e-mails seguros cheguem \u00e0 caixa de entrada.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Post-Delivery Protection<\/b><span style=\"font-weight: 400;\">: Para remover ou neutralizar e-mails maliciosos que j\u00e1 foram entregues para os destinat\u00e1rios.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Integra\u00e7\u00e3o com Microsoft 365 e Google Workspace<\/b><span style=\"font-weight: 400;\">: Para uma prote\u00e7\u00e3o eficiente nas principais plataformas de e-mail corporativo.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2127778 elementor-widget elementor-widget-text-editor\" data-id=\"2127778\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/hsclabs.com\/pt-br\/mailinspector\/\"><strong>Saiba mais sobre os recursos da solu\u00e7\u00e3o de seguran\u00e7a de e-mail da HSC.<\/strong><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e75a480 elementor-widget elementor-widget-heading\" data-id=\"e75a480\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Solu\u00e7\u00e3o de conscientiza\u00e7\u00e3o e treinamento em ciberseguran\u00e7a<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c2f054e elementor-widget elementor-widget-text-editor\" data-id=\"c2f054e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">A HSC tamb\u00e9m desenvolveu uma solu\u00e7\u00e3o abrangente de conscientiza\u00e7\u00e3o e treinamento em ciberseguran\u00e7a, que inclui:<\/span><\/p><ul><li aria-level=\"1\"><b>Treinamento cont\u00ednuo: <\/b><span style=\"font-weight: 400;\">Programas de treinamento regulares e atualizados para manter os funcion\u00e1rios informados sobre as \u00faltimas amea\u00e7as e tipos de fraudes.<\/span><\/li><li aria-level=\"1\"><b>Simula\u00e7\u00f5es de phishing: <\/b><span style=\"font-weight: 400;\">Testes peri\u00f3dicos que simulam ataques de phishing para avaliar o grau de maturidade da empresa em rela\u00e7\u00e3o \u00e0 ciberseguran\u00e7a.<\/span><\/li><li aria-level=\"1\"><b>Recursos educativos:<\/b><span style=\"font-weight: 400;\"> Materiais educativos como v\u00eddeos e infogr\u00e1ficos para refor\u00e7ar o conhecimento sobre ciberseguran\u00e7a.<\/span><\/li><\/ul><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Relat\u00f3rios e an\u00e1lises: <\/b><span style=\"font-weight: 400;\">Ferramentas de relat\u00f3rio que monitoram o progresso e a efic\u00e1cia do treinamento, ajudando a identificar tend\u00eancias e pontos fracos.<\/span><\/li><\/ul><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Quadrante MindAware:<\/b><span style=\"font-weight: 400;\"> Ferramenta que visualiza a conscientiza\u00e7\u00e3o da equipe, classificando os usu\u00e1rios com base nos seus conhecimentos e na sua evolu\u00e7\u00e3o.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Feedback autom\u00e1tico: <\/b><span style=\"font-weight: 400;\">Envio de dicas de seguran\u00e7a personalizadas, ajudando a equipe a compreender os seus pontos fortes e \u00e1reas de melhoria.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e0f25b elementor-widget elementor-widget-text-editor\" data-id=\"6e0f25b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/hsclabs.com\/pt-br\/mindaware\/\"><strong>Saiba mais sobre a solu\u00e7\u00e3o de conscientiza\u00e7\u00e3o e treinamento da HSC.<\/strong><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c27ecae elementor-widget elementor-widget-heading\" data-id=\"c27ecae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclus\u00e3o<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2fac6c elementor-widget elementor-widget-text-editor\" data-id=\"d2fac6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">A seguran\u00e7a contra phishing depende de uma abordagem integrada que combina tecnologia e educa\u00e7\u00e3o. Ao implementar as solu\u00e7\u00f5es certas e manter os seus funcion\u00e1rios informados, voc\u00ea cria uma cultura de seguran\u00e7a que protege a sua empresa de amea\u00e7as e garante a integridade dos seus dados.<\/span><\/p><p><span style=\"font-weight: 400;\">Se tiver d\u00favidas ou quiser se aprofundar nesse tema, <strong><a href=\"https:\/\/hsclabs.com\/pt-br\/contato\/\">entre em contato<\/a><\/strong> e fale diretamente com o time da HSC. Somos especialistas em seguran\u00e7a, intelig\u00eancia artificial, prote\u00e7\u00e3o de e-mail e conscientiza\u00e7\u00e3o em ciberseguran\u00e7a.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d387d54\" data-id=\"d387d54\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7fb8f92 elementor-widget elementor-widget-template\" data-id=\"7fb8f92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"11911\" class=\"elementor elementor-11911\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f0e534a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f0e534a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a9b195e\" data-id=\"a9b195e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-861ae4f elementor-invisible elementor-widget elementor-widget-image\" data-id=\"861ae4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomInRight&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/hsc-global-cyber-alliance-parceria\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/11\/selo-proud-partner-gca-black.png\" title=\"selo-proud-partner-gca-black\" alt=\"selo-proud-partner-gca-black\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5b4e6f2 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"5b4e6f2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;slideInRight&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-4fb5e7e\" data-id=\"4fb5e7e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0008fa9 elementor-widget elementor-widget-heading\" data-id=\"0008fa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Inscreva-se para receber not\u00edcias de cybersecurity<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d77ffec elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"d77ffec\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Form Newsletter\" aria-label=\"Form Newsletter\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"11911\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"d77ffec\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"HSC Cybersecurity\" \/>\n\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tNome\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-xs  elementor-field-textual\" placeholder=\"Nome\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-xs  elementor-field-textual\" placeholder=\"Email\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-select elementor-field-group elementor-column elementor-field-group-field_92fe65d elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_92fe65d\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCargo\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field elementor-select-wrapper remove-before \">\n\t\t\t<div class=\"select-caret-down-wrapper\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-caret-down\"><\/i>\t\t\t<\/div>\n\t\t\t<select name=\"form_fields[field_92fe65d]\" id=\"form-field-field_92fe65d\" class=\"elementor-field-textual elementor-size-xs\" required=\"required\">\n\t\t\t\t\t\t\t\t\t<option value=\"Especialista em Ciberseguran\u00e7a\">Especialista em Ciberseguran\u00e7a<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Analista de TI\">Analista de TI<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Gerente de TI\">Gerente de TI<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"CIO ou CISO\">CIO ou CISO<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"CTO\">CTO<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Desenvolvedor ou Arquiteto\">Desenvolvedor ou Arquiteto<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"CEO ou Diretor\">CEO ou Diretor<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Profissional de Compliance\">Profissional de Compliance<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Profissional Jur\u00eddico\">Profissional Jur\u00eddico<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Profissional de Vendas \">Profissional de Vendas <\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Profissional de Marketing\">Profissional de Marketing<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Profissional de RH\">Profissional de RH<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Outro\">Outro<\/option>\n\t\t\t\t\t\t\t<\/select>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_3197ff8 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_3197ff8\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCheck\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_3197ff8]\" id=\"form-field-field_3197ff8\" class=\"elementor-field elementor-size-xs  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-field_3197ff8\"><font size=\"1\"> Concordo com a <a href=\"https:\/\/hsclabs.com\/pt-br\/aviso-de-privacidade\/\">Pol\u00edtica de Privacidade<\/a> e dou o consentimento para o tratamento dos meus dados.<\/font><\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-xs elementor-animation-grow\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Enviar<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-410d8c8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"410d8c8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;],&quot;sticky_offset&quot;:75,&quot;sticky_effects_offset&quot;:50,&quot;_ha_eqh_enable&quot;:false,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-11f3a71\" data-id=\"11f3a71\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-01150fe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"01150fe\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-46c6b70\" data-id=\"46c6b70\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f2c93e3 elementor-widget elementor-widget-heading\" data-id=\"f2c93e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Bloqueie ataques que passam despercebidos por Microsoft e Google<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b35ca5 elementor-widget elementor-widget-image\" data-id=\"7b35ca5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/protecao-para-microsoft-365\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/11\/Microsoft-365-color.png\" title=\"Microsoft-365-color\" alt=\"Microsoft-365-color\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef354be elementor-widget elementor-widget-image\" data-id=\"ef354be\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/protecao-para-google-workspace\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/11\/Google-workspace-color.png\" title=\"Google-workspace-color\" alt=\"Google-workspace-color\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d553f0d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d553f0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-628b068\" data-id=\"628b068\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-188fcee elementor-widget elementor-widget-spacer\" data-id=\"188fcee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d96b708 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d96b708\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-391d788\" data-id=\"391d788\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c855e45 elementor-widget elementor-widget-heading\" data-id=\"c855e45\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Treine a sua equipe em ciberseguran\u00e7a<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ef48b8 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2ef48b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/hsclabs.com\/pt-br\/mindaware\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Comece Agora<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9cb104a elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"9cb104a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3fc1f31\" data-id=\"3fc1f31\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-de1d7cf elementor-widget elementor-widget-template\" data-id=\"de1d7cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"15281\" class=\"elementor elementor-15281\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-156eb46 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"156eb46\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2733c18\" data-id=\"2733c18\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-23b3d22 elementor-widget elementor-widget-heading\" data-id=\"23b3d22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Leia Mais Not\u00edcias<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2127564 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"2127564\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;em&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;em&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-11398 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/hsclabs.com\/pt-br\/malware-como-servico\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"157\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/malwarecomoservico-300x157.jpg\" class=\"attachment-medium size-medium wp-image-17140\" alt=\"\" srcset=\"https:\/\/hsclabs.com\/wp-content\/uploads\/malwarecomoservico-300x157.jpg 300w, https:\/\/hsclabs.com\/wp-content\/uploads\/malwarecomoservico-1024x535.jpg 1024w, https:\/\/hsclabs.com\/wp-content\/uploads\/malwarecomoservico-768x401.jpg 768w, https:\/\/hsclabs.com\/wp-content\/uploads\/malwarecomoservico.jpg 1200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<p class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/malware-como-servico\/\" >\n\t\t\t\tMalware como servi\u00e7o: o que \u00e9 e como funciona\t\t\t<\/a>\n\t\t<\/p>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/hsclabs.com\/pt-br\/malware-como-servico\/\" aria-label=\"Leia mais sobre Malware como servi\u00e7o: o que \u00e9 e como funciona\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-10968 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/hsclabs.com\/pt-br\/privacidade-de-dados\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"157\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/privacidadededados-300x157.jpg\" class=\"attachment-medium size-medium wp-image-17127\" alt=\"\" srcset=\"https:\/\/hsclabs.com\/wp-content\/uploads\/privacidadededados-300x157.jpg 300w, https:\/\/hsclabs.com\/wp-content\/uploads\/privacidadededados-1024x535.jpg 1024w, https:\/\/hsclabs.com\/wp-content\/uploads\/privacidadededados-768x401.jpg 768w, https:\/\/hsclabs.com\/wp-content\/uploads\/privacidadededados.jpg 1200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<p class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/privacidade-de-dados\/\" >\n\t\t\t\tPrivacidade de dados: como proteger informa\u00e7\u00f5es na pr\u00e1tica\t\t\t<\/a>\n\t\t<\/p>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/hsclabs.com\/pt-br\/privacidade-de-dados\/\" aria-label=\"Leia mais sobre Privacidade de dados: como proteger informa\u00e7\u00f5es na pr\u00e1tica\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-10066 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/hsclabs.com\/pt-br\/golpes-de-phishing\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"157\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/golpesdephishing-300x157.jpg\" class=\"attachment-medium size-medium wp-image-17120\" alt=\"\" srcset=\"https:\/\/hsclabs.com\/wp-content\/uploads\/golpesdephishing-300x157.jpg 300w, https:\/\/hsclabs.com\/wp-content\/uploads\/golpesdephishing-1024x535.jpg 1024w, https:\/\/hsclabs.com\/wp-content\/uploads\/golpesdephishing-768x401.jpg 768w, https:\/\/hsclabs.com\/wp-content\/uploads\/golpesdephishing.jpg 1200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<p class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/golpes-de-phishing\/\" >\n\t\t\t\tGolpes de phishing: o que s\u00e3o, como funcionam e como se proteger\t\t\t<\/a>\n\t\t<\/p>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/hsclabs.com\/pt-br\/golpes-de-phishing\/\" aria-label=\"Leia mais sobre Golpes de phishing: o que s\u00e3o, como funcionam e como se proteger\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>O que \u00e9 phishing? Phishing \u00e9 um golpe utilizado por cibercriminosos para enganar e persuadir pessoas, fazendo com que elas tomem uma a\u00e7\u00e3o e revelem<\/p>\n","protected":false},"author":4,"featured_media":16162,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-14945","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>O que \u00e9 phishing? - HSC Labs<\/title>\n<meta name=\"description\" content=\"Entenda o que \u00e9 phishing, como ele funciona e quais as consequ\u00eancias desse tipo de ataque cibern\u00e9tico. Veja tamb\u00e9m dicas de como se proteger.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"O que \u00e9 phishing? - HSC Labs\" \/>\n<meta property=\"og:description\" content=\"Entenda o que \u00e9 phishing, como ele funciona e quais as consequ\u00eancias desse tipo de ataque cibern\u00e9tico. Veja tamb\u00e9m dicas de como se proteger.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"HSC Labs\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-28T13:27:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-27T13:07:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/o-que-e-phishing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"HSC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"HSC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/o-que-e-phishing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/o-que-e-phishing\\\/\"},\"author\":{\"name\":\"HSC\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/aa3e38b2984d1b9331eb9cdcc5d11418\"},\"headline\":\"O que \u00e9 phishing?\",\"datePublished\":\"2024-06-28T13:27:22+00:00\",\"dateModified\":\"2025-05-27T13:07:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/o-que-e-phishing\\\/\"},\"wordCount\":2041,\"publisher\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/o-que-e-phishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/o-que-e-phishing.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/o-que-e-phishing\\\/\",\"url\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/o-que-e-phishing\\\/\",\"name\":\"O que \u00e9 phishing? - HSC Labs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/o-que-e-phishing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/o-que-e-phishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/o-que-e-phishing.jpg\",\"datePublished\":\"2024-06-28T13:27:22+00:00\",\"dateModified\":\"2025-05-27T13:07:31+00:00\",\"description\":\"Entenda o que \u00e9 phishing, como ele funciona e quais as consequ\u00eancias desse tipo de ataque cibern\u00e9tico. Veja tamb\u00e9m dicas de como se proteger.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/o-que-e-phishing\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/o-que-e-phishing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/o-que-e-phishing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/o-que-e-phishing.jpg\",\"contentUrl\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/o-que-e-phishing.jpg\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/o-que-e-phishing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"O que \u00e9 phishing?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/\",\"name\":\"HSC Cybersecurity\",\"description\":\"Full-scope cybersecurity solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#organization\",\"name\":\"HSC Cybersecurity\",\"url\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/cropped-Logo-HSC-01.png\",\"contentUrl\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/cropped-Logo-HSC-01.png\",\"width\":1496,\"height\":510,\"caption\":\"HSC Cybersecurity\"},\"image\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/high-security-center\\\/\",\"https:\\\/\\\/www.instagram.com\\\/hsclabs\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/aa3e38b2984d1b9331eb9cdcc5d11418\",\"name\":\"HSC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dfca8e3eab334d35b0474febe486aa4e9d11f4b455beb1d2ad54d111e5e9f74f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dfca8e3eab334d35b0474febe486aa4e9d11f4b455beb1d2ad54d111e5e9f74f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dfca8e3eab334d35b0474febe486aa4e9d11f4b455beb1d2ad54d111e5e9f74f?s=96&d=mm&r=g\",\"caption\":\"HSC\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"O que \u00e9 phishing? - HSC Labs","description":"Entenda o que \u00e9 phishing, como ele funciona e quais as consequ\u00eancias desse tipo de ataque cibern\u00e9tico. Veja tamb\u00e9m dicas de como se proteger.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/","og_locale":"pt_BR","og_type":"article","og_title":"O que \u00e9 phishing? - HSC Labs","og_description":"Entenda o que \u00e9 phishing, como ele funciona e quais as consequ\u00eancias desse tipo de ataque cibern\u00e9tico. Veja tamb\u00e9m dicas de como se proteger.","og_url":"https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/","og_site_name":"HSC Labs","article_published_time":"2024-06-28T13:27:22+00:00","article_modified_time":"2025-05-27T13:07:31+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/o-que-e-phishing.jpg","type":"image\/jpeg"}],"author":"HSC","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"HSC","Est. tempo de leitura":"9 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/#article","isPartOf":{"@id":"https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/"},"author":{"name":"HSC","@id":"https:\/\/hsclabs.com\/pt-br\/#\/schema\/person\/aa3e38b2984d1b9331eb9cdcc5d11418"},"headline":"O que \u00e9 phishing?","datePublished":"2024-06-28T13:27:22+00:00","dateModified":"2025-05-27T13:07:31+00:00","mainEntityOfPage":{"@id":"https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/"},"wordCount":2041,"publisher":{"@id":"https:\/\/hsclabs.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/o-que-e-phishing.jpg","articleSection":["Cybersecurity"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/","url":"https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/","name":"O que \u00e9 phishing? - HSC Labs","isPartOf":{"@id":"https:\/\/hsclabs.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/#primaryimage"},"image":{"@id":"https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/o-que-e-phishing.jpg","datePublished":"2024-06-28T13:27:22+00:00","dateModified":"2025-05-27T13:07:31+00:00","description":"Entenda o que \u00e9 phishing, como ele funciona e quais as consequ\u00eancias desse tipo de ataque cibern\u00e9tico. Veja tamb\u00e9m dicas de como se proteger.","breadcrumb":{"@id":"https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/#primaryimage","url":"https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/o-que-e-phishing.jpg","contentUrl":"https:\/\/hsclabs.com\/wp-content\/uploads\/2024\/06\/o-que-e-phishing.jpg","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/hsclabs.com\/pt-br\/o-que-e-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hsclabs.com\/pt-br\/"},{"@type":"ListItem","position":2,"name":"O que \u00e9 phishing?"}]},{"@type":"WebSite","@id":"https:\/\/hsclabs.com\/pt-br\/#website","url":"https:\/\/hsclabs.com\/pt-br\/","name":"HSC Cybersecurity","description":"Full-scope cybersecurity solutions","publisher":{"@id":"https:\/\/hsclabs.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hsclabs.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hsclabs.com\/pt-br\/#organization","name":"HSC Cybersecurity","url":"https:\/\/hsclabs.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hsclabs.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/07\/cropped-Logo-HSC-01.png","contentUrl":"https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/07\/cropped-Logo-HSC-01.png","width":1496,"height":510,"caption":"HSC Cybersecurity"},"image":{"@id":"https:\/\/hsclabs.com\/pt-br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/high-security-center\/","https:\/\/www.instagram.com\/hsclabs"]},{"@type":"Person","@id":"https:\/\/hsclabs.com\/pt-br\/#\/schema\/person\/aa3e38b2984d1b9331eb9cdcc5d11418","name":"HSC","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/dfca8e3eab334d35b0474febe486aa4e9d11f4b455beb1d2ad54d111e5e9f74f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/dfca8e3eab334d35b0474febe486aa4e9d11f4b455beb1d2ad54d111e5e9f74f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dfca8e3eab334d35b0474febe486aa4e9d11f4b455beb1d2ad54d111e5e9f74f?s=96&d=mm&r=g","caption":"HSC"}}]}},"_links":{"self":[{"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/posts\/14945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/comments?post=14945"}],"version-history":[{"count":26,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/posts\/14945\/revisions"}],"predecessor-version":[{"id":15345,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/posts\/14945\/revisions\/15345"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/media\/16162"}],"wp:attachment":[{"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/media?parent=14945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/categories?post=14945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/tags?post=14945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}