{"id":6366,"date":"2022-09-15T10:19:02","date_gmt":"2022-09-15T13:19:02","guid":{"rendered":"https:\/\/blog.n5now.com\/phishing-tus-datos-son-tuyos\/"},"modified":"2022-09-16T15:46:23","modified_gmt":"2022-09-16T18:46:23","slug":"phishing-tus-datos-son-tuyos","status":"publish","type":"post","link":"https:\/\/blog.n5now.com\/pt-br\/phishing-tus-datos-son-tuyos\/","title":{"rendered":"Phishing: Seus dados, s\u00e3o seus?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">O que \u00e9 Phishing?<\/h2>\n\n\n<p><!-- wp:par\u00e1grafo --><\/p>\n<p>Phishing \u00e9 uma forma de fraude na qual um invasor se faz passar por uma entidade ou pessoa confi\u00e1vel em um e-mail ou outros meios.<\/p>\n<p><!-- \/wp:par\u00e1grafo --><\/p>\n<p><!-- wp:par\u00e1grafo --><\/p>\n<p>Eles criam contas de e-mail e p\u00e1ginas da web que fingem ser oficiais para que o usu\u00e1rio insira seus dados (nome de usu\u00e1rio, senha, dados de conta banc\u00e1ria e cart\u00e3o de cr\u00e9dito etc.)<\/p>\n<p><!-- \/wp:par\u00e1grafo --><\/p>\n<p><!-- wp:par\u00e1grafo --><\/p>\n<p>Phishing \u00e9 uma forma popular de cibercrime devido \u00e0 sua efic\u00e1cia. Os cibercriminosos tiveram sucesso usando e-mail, texto ou mensagens diretas nas m\u00eddias sociais ou em videogames para fazer as pessoas responderem com suas informa\u00e7\u00f5es pessoais.<\/p>\n<p><!-- \/wp:par\u00e1grafo --><\/p>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"505\" src=\"https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c42c4b56-1024x505.png\" alt=\"\" class=\"wp-image-6380\" srcset=\"https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c42c4b56-1024x505.png 1024w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c42c4b56-300x148.png 300w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c42c4b56-768x379.png 768w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c42c4b56-150x74.png 150w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c42c4b56-696x343.png 696w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c42c4b56-1068x527.png 1068w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c42c4b56-852x420.png 852w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c42c4b56-324x160.png 324w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c42c4b56.png 1166w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Ataque de phishing<\/h2>\n\n\n<p><!-- wp:par\u00e1grafo --><\/p>\n<p>O cibercriminoso realiza o ataque por meio eletr\u00f4nico, e-mails, mensagens (SMS, Whatsapp, etc.) ou por telefone.<\/p>\n<p><!-- \/wp:par\u00e1grafo --><\/p>\n<p><!-- wp:par\u00e1grafo --><\/p>\n<p>Est\u00e1 se passando por um \u00f3rg\u00e3o ou pessoa p\u00fablica ou privada conhecida.<\/p>\n<p><!-- \/wp:par\u00e1grafo --><\/p>\n<p><!-- wp:par\u00e1grafo --><\/p>\n<p>O objetivo do cibercriminoso \u00e9 obter a maior quantidade de dados de sua v\u00edtima por meio desse ataque.<\/p>\n<p><!-- \/wp:par\u00e1grafo --><\/p>\n<p><!-- wp:par\u00e1grafo --><\/p>\n<p>95% das viola\u00e7\u00f5es de seguran\u00e7a cibern\u00e9tica s\u00e3o causadas por erro humano<\/p>\n<p><!-- \/wp:par\u00e1grafo --><\/p>\n<p><!-- wp:par\u00e1grafo --><\/p>\n<p>Um ataque cibern\u00e9tico pode n\u00e3o apenas causar uma perda econ\u00f4mica a uma empresa, mas tamb\u00e9m prejudicar muito sua reputa\u00e7\u00e3o.<\/p>\n<p><!-- \/wp:par\u00e1grafo --><\/p>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c5a2f97a-1024x512.png\" alt=\"\" class=\"wp-image-6383\" srcset=\"https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c5a2f97a-1024x512.png 1024w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c5a2f97a-300x150.png 300w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c5a2f97a-768x384.png 768w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c5a2f97a-150x75.png 150w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c5a2f97a-696x348.png 696w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c5a2f97a-1068x534.png 1068w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c5a2f97a-840x420.png 840w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c5a2f97a.png 1174w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Como detectar um Phishing?<\/h2>\n\n\n<p><!-- wp:par\u00e1grafo --><\/p>\n<p>&#8220;Dom\u00ednio do remetente&#8221; que n\u00e3o seja a organiza\u00e7\u00e3o \u00e0 qual afirma pertencer.<\/p>\n<p><!-- \/wp:par\u00e1grafo --><\/p>\n<p><!-- wp:par\u00e1grafo --><\/p>\n<p>\u201cRemetente desconhecido\u201d.<\/p>\n<p><!-- \/wp:par\u00e1grafo --><\/p>\n<p><!-- wp:par\u00e1grafo --><\/p>\n<p>Erros de <strong>\u201cortografia\u201d <\/strong>e <strong>erros \u201cgramaticais\u201d.<\/strong><\/p>\n<p><!-- \/wp:par\u00e1grafo --><\/p>\n<p><!-- wp:par\u00e1grafo --><\/p>\n<p>O <strong>&#8220;URL&#8221;, <\/strong>links<strong> <\/strong>que<strong> <\/strong>n\u00e3o corresponde \u00e0 empresa ou organiza\u00e7\u00e3o.<\/p>\n<p><!-- \/wp:par\u00e1grafo --><\/p>\n<p><!-- wp:par\u00e1grafo --><\/p>\n<p>Nenhuma entidade solicitar\u00e1 que os dados sejam inseridos por e-mail.<\/p>\n<p><!-- \/wp:par\u00e1grafo --><\/p>\n<p><!-- wp:par\u00e1grafo --><\/p>\n<p>Car\u00e1ter de \u201curg\u00eancia\u201d.<\/p>\n<p><!-- \/wp:par\u00e1grafo --><\/p>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"579\" src=\"https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c6ed41c8-1024x579.png\" alt=\"\" class=\"wp-image-6387\" srcset=\"https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c6ed41c8-1024x579.png 1024w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c6ed41c8-300x170.png 300w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c6ed41c8-768x434.png 768w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c6ed41c8-150x85.png 150w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c6ed41c8-696x393.png 696w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c6ed41c8-1068x604.png 1068w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c6ed41c8-743x420.png 743w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-63232c6ed41c8.png 1164w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Como me proteger de Phishing?<\/h2>\n\n\n\n<ul><li>Esteja &#8220;Ciente&#8221; que pode acontecer conosco.<\/li><li>N\u00e3o abra links e anexos.<\/li><li>Use o bom senso, n\u00e3o envie dados de contas corporativas, banc\u00e1rias ou de cart\u00e3o de cr\u00e9dito.<\/li><li>Mantenha o sistema atualizado.<\/li><li>URL\u201d, links que n\u00e3o correspondem \u00e0 empresa ou organiza\u00e7\u00e3o.<\/li><li>&#8220;MFA&#8221;, autentica\u00e7\u00e3o em duas etapas para alertar sobre acessos indevidos \u00e0s suas contas.<\/li><li>Se fomos v\u00edtimas e inserimos o taos em um site fraudulento, altere a senha imediatamente.<\/li><li>&#8220;Desconfian\u00e7a&#8221; n\u00e3o \u00e9 paran\u00f3ia<\/li><\/ul>\n\n\n\n<p>Gustavo Rold\u00e1n &#8211; SecOps<\/p>\n","protected":false},"excerpt":{"rendered":"<p>C\u00edber seguran\u00e7a. Neste artigo, voc\u00ea pode ver tudo o que precisa saber sobre phishing.<\/p>\n","protected":false},"author":2,"featured_media":6398,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[229,232],"tags":[],"_links":{"self":[{"href":"https:\/\/blog.n5now.com\/pt-br\/wp-json\/wp\/v2\/posts\/6366"}],"collection":[{"href":"https:\/\/blog.n5now.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.n5now.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.n5now.com\/pt-br\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.n5now.com\/pt-br\/wp-json\/wp\/v2\/comments?post=6366"}],"version-history":[{"count":3,"href":"https:\/\/blog.n5now.com\/pt-br\/wp-json\/wp\/v2\/posts\/6366\/revisions"}],"predecessor-version":[{"id":6401,"href":"https:\/\/blog.n5now.com\/pt-br\/wp-json\/wp\/v2\/posts\/6366\/revisions\/6401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.n5now.com\/pt-br\/wp-json\/wp\/v2\/media\/6398"}],"wp:attachment":[{"href":"https:\/\/blog.n5now.com\/pt-br\/wp-json\/wp\/v2\/media?parent=6366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.n5now.com\/pt-br\/wp-json\/wp\/v2\/categories?post=6366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.n5now.com\/pt-br\/wp-json\/wp\/v2\/tags?post=6366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}