{"id":35601,"date":"2022-08-04T05:00:00","date_gmt":"2022-08-04T11:00:00","guid":{"rendered":"https:\/\/memberpress.com\/?p=35601"},"modified":"2022-11-16T15:13:35","modified_gmt":"2022-11-16T22:13:35","slug":"what-are-cyber-threats-and-what-to-do-about-them","status":"publish","type":"post","link":"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/","title":{"rendered":"Como combater as amea\u00e7as cibern\u00e9ticas (10 maneiras)"},"content":{"rendered":"<p>Nosso mundo digital moderno est\u00e1 repleto de processos e fun\u00e7\u00f5es exclusivos que melhoram a qualidade de vida e de trabalho. Entretanto, essas tecnologias tamb\u00e9m apresentam alguns perigos, e nenhuma empresa ou organiza\u00e7\u00e3o de TI est\u00e1 a salvo dessas amea\u00e7as. <\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 ez-toc-wrap-center counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<label for=\"ez-toc-cssicon-toggle-item-69d0f9a28770d\" class=\"ez-toc-cssicon-toggle-label\"><p class=\"ez-toc-title\" style=\"cursor:inherit\">O QUE H\u00c1 DENTRO<\/p>\n<span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Alternar<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #000000;color:#000000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #000000;color:#000000\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69d0f9a28770d\"  \/><nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#What_are_Cyber_Threats\" >O que s\u00e3o amea\u00e7as cibern\u00e9ticas<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Why_Protect_Yourself_from_Cybersecurity_Threats\" >Por que se proteger das amea\u00e7as \u00e0 seguran\u00e7a cibern\u00e9tica?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Where_Do_Cyber_Threats_Come_From\" >De onde v\u00eam as amea\u00e7as cibern\u00e9ticas?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Types_of_Cyber_Threats\" >Tipos de amea\u00e7as cibern\u00e9ticas<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Malware\" >Malware<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#DDoS_Attacks\" >Ataques DDoS<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#_Phishing\" >\u00a0Phishing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Ransomware\" >Ransomware<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Zero-Day_Exploits\" >Explora\u00e7\u00f5es de dia zero<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Man-in-the-Middle_Attacks\" >Ataques Man-in-the-Middle<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Password_Attacks\" >Ataques de senha<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Data_Breaches\" >Viola\u00e7\u00f5es de dados<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#_IoT_Device_Threats\" >\u00a0Amea\u00e7as aos dispositivos IoT<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#10_Ways_to_Protect_Yourself_from_Cyber_Threats\" >10 maneiras de se proteger contra amea\u00e7as cibern\u00e9ticas<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Make_cybersecurity_a_top_priority\" >Fa\u00e7a da seguran\u00e7a cibern\u00e9tica uma prioridade m\u00e1xima<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Update_with_security_patches\" >Atualiza\u00e7\u00e3o com patches de seguran\u00e7a<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Train_your_team\" >Treine sua equipe<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Dont_click_links\" >N\u00e3o clique em links<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Check_out_your_sender\" >Verifique seu remetente<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Update_your_devices\" >Atualize seus dispositivos<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Get_serious_about_your_passwords\" >Leve suas senhas a s\u00e9rio<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Backup_your_data\" >Fa\u00e7a backup de seus dados<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Avoid_unsecured_networks\" >Evite redes n\u00e3o seguras<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Encrypt_your_data\" >Criptografe seus dados<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Conclusion\" >Conclus\u00e3o<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<p>Os criminosos cibern\u00e9ticos est\u00e3o usando t\u00e9cnicas cada vez mais sofisticadas para realizar campanhas prejudiciais. Como resultado, a maioria das organiza\u00e7\u00f5es se sente impotente para proteger seus dados e ativos essenciais contra ataques mal-intencionados.<\/p>\n\n\n\n<p>Nesta postagem, falaremos sobre o que \u00e9 uma amea\u00e7a cibern\u00e9tica. E daremos a voc\u00ea 10 maneiras simples de se proteger delas.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_are_Cyber_Threats\"><\/span><strong>O que s\u00e3o amea\u00e7as cibern\u00e9ticas<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>As amea\u00e7as cibern\u00e9ticas s\u00e3o ataques maliciosos criados para roubar dados, interromper opera\u00e7\u00f5es ou danificar ativos digitais. Os atacantes t\u00eam como alvo indiv\u00edduos e empresas com o objetivo de obter lucro. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg\"><img decoding=\"async\" width=\"746\" height=\"468\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg\" alt=\"palavra crime cibern\u00e9tico no teclado do computador\" class=\"wp-image-38275\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg 746w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094-300x188.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094-271x170.jpg 271w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094-700x439.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094-156x98.jpg 156w\" sizes=\"(max-width: 746px) 100vw, 746px\" \/><\/a><\/figure>\n\n\n\n<p>Essas amea\u00e7as se apresentam de v\u00e1rias formas, incluindo <strong>v\u00edrus, malware, viola\u00e7\u00f5es de dados, ataques de nega\u00e7\u00e3o de servi\u00e7o distribu\u00eddo (DDoS), phishing, ransomware, <\/strong>e <strong>Ataques Man-in-the-Middle (MitM)<\/strong>entre outros.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Why_Protect_Yourself_from_Cybersecurity_Threats\"><\/span><strong>Por que se proteger das amea\u00e7as \u00e0 seguran\u00e7a cibern\u00e9tica?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>As amea\u00e7as cibern\u00e9ticas s\u00e3o um neg\u00f3cio s\u00e9rio e podem ter efeitos de longo alcance que perturbam muitas \u00e1reas da vida moderna. Por exemplo, os recentes ataques de ransomware \u00e0s cadeias de suprimento de alimentos e combust\u00edveis causaram aumentos de pre\u00e7os e escassez. <\/p>\n\n\n\n<p>O potencial de danos significativos \u00e9 real quando os ataques s\u00e3o direcionados a redes, sistemas telef\u00f4nicos, servi\u00e7os de sa\u00fade, esta\u00e7\u00f5es de tratamento de \u00e1gua, redes el\u00e9tricas ou opera\u00e7\u00f5es governamentais. <\/p>\n\n\n\n<p>As amea\u00e7as cibern\u00e9ticas s\u00e3o at\u00e9 mesmo uma quest\u00e3o de <a href=\"https:\/\/www.cisa.gov\/cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">seguran\u00e7a nacional<\/a> e uma alta prioridade para nossa atual administra\u00e7\u00e3o.<\/p>\n\n\n\n<p>Em uma escala menor, a amea\u00e7a aos indiv\u00edduos tamb\u00e9m \u00e9 grave. Qualquer viola\u00e7\u00e3o de dados que vaze informa\u00e7\u00f5es pessoais pode levar rapidamente ao roubo de identidade, \u00e0 fraude e \u00e0 ru\u00edna financeira. Essas amea\u00e7as est\u00e3o aumentando em gravidade e em n\u00famero.<\/p>\n\n\n\n<p>As empresas precisam entender que isso n\u00e3o \"acontece apenas com outra pessoa\". As amea\u00e7as cibern\u00e9ticas representam um risco para todas as empresas, n\u00e3o importa o tamanho. \u00c9 hora de agir para <a href=\"https:\/\/memberpress.com\/pt\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">proteger sua empresa contra danos<\/a> \u00e9 agora.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Where_Do_Cyber_Threats_Come_From\"><\/span><strong>De onde v\u00eam as amea\u00e7as cibern\u00e9ticas<\/strong>?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Os atacantes n\u00e3o s\u00e3o apenas uma ra\u00e7a de animal com a qual precisamos nos preocupar. Infelizmente, essas amea\u00e7as v\u00eam de <strong>diferentes tipos de pessoas e grupos<\/strong> com agendas variadas.<\/p>\n\n\n\n<p>Infelizmente, muitos dos ataques mais prejudiciais s\u00e3o apoiados por <strong>pa\u00edses hostis<\/strong>. Embora n\u00e3o seja t\u00e3o comum, <strong>grupos terroristas<\/strong> tamb\u00e9m podem estar envolvidos em terrorismo cibern\u00e9tico.<\/p>\n\n\n\n<p><strong>Crime organizado<\/strong> frequentemente usa amea\u00e7as digitais para coletar informa\u00e7\u00f5es, manter empresas como ref\u00e9ns para resgate e roubar dados para roubo de identidade e fraude. A aplica\u00e7\u00e3o da lei vinculou muitos golpes de cart\u00e3o de cr\u00e9dito ao crime organizado.<\/p>\n\n\n\n<p><strong>Hackers<\/strong>, <strong>hacktivistas<\/strong>e <strong>insiders insatisfeitos<\/strong> tamb\u00e9m s\u00e3o respons\u00e1veis por v\u00e1rios ataques digitais. Por exemplo, \u00e0s vezes os hackers entram em contato com um funcion\u00e1rio da empresa e o contratam ou chantageiam para que se torne c\u00famplice.<\/p>\n\n\n\n<p>Tudo isso parece bastante sofisticado, mas qualquer pessoa, at\u00e9 mesmo pequenas empresas, pode ser v\u00edtima desses ataques.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Types_of_Cyber_Threats\"><\/span><strong>Tipos de amea\u00e7as cibern\u00e9ticas<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>H\u00e1 um grande n\u00famero de tipos de amea\u00e7as cibern\u00e9ticas. Mas, para muitos ataques, o conceito abrangente \u00e9 <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/social-engineering\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">engenharia social<\/a>. <\/p>\n\n\n\n<p>Engenharia social \u00e9 quando os hackers manipulam as pessoas para que ignorem os procedimentos de seguran\u00e7a padr\u00e3o e as pr\u00e1ticas recomendadas, de modo que os hackers possam obter acesso autorizado a sistemas e dados. <\/p>\n\n\n\n<p>Veja a seguir os principais tipos de amea\u00e7as, muitas das quais envolvem engenharia social.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg\"><img decoding=\"async\" width=\"720\" height=\"485\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg\" alt=\"Palavra de roubo de identidade no teclado do computador\" class=\"wp-image-38273\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg 720w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110-300x202.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110-252x170.jpg 252w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110-700x472.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110-156x105.jpg 156w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Malware\"><\/span>Malware<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>O malware \u00e9 <strong>software malicioso<\/strong> projetado para:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Espionar o usu\u00e1rio<\/li><li>Roubo de credenciais<\/li><li>Alterar, copiar e excluir arquivos<\/li><li>Alterar permiss\u00f5es<\/li><li>Interromper opera\u00e7\u00f5es de rede<\/li><li>Causar outros tipos de danos<\/li><\/ul>\n\n\n\n<p>H\u00e1 dezenas de <a href=\"https:\/\/www.idstrong.com\/sentinel\/what-is-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">tipos de malware<\/a> e variantes, muitos deles dispon\u00edveis na dark web para venda ou com\u00e9rcio.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"DDoS_Attacks\"><\/span><strong>Ataques DDoS<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg\"><img decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg\" alt=\"Ilustra\u00e7\u00e3o de ataques DDoS\" class=\"wp-image-38279\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg 1024w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-300x150.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-768x384.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-340x170.jpg 340w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-840x420.jpg 840w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-700x350.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-156x78.jpg 156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Ataques distribu\u00eddos de nega\u00e7\u00e3o de servi\u00e7o (DDoS) <strong>sobrecarregar uma rede ou sistema<\/strong>. Essa interrup\u00e7\u00e3o do fluxo de tr\u00e1fego cria uma janela de oportunidade em que os criminosos cibern\u00e9ticos podem obter acesso para roubar dados ou instalar software mal-intencionado.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u00a0<strong>Phishing<\/strong><\/h3>\n\n\n\n<p>Phishing \u00e9 quando agentes mal-intencionados usam <a href=\"https:\/\/memberpress.com\/pt\/blog\/how-to-prevent-your-marketing-emails-from-getting-stuck-in-spam\/\" target=\"_blank\" rel=\"noreferrer noopener\">e-mails com apar\u00eancia leg\u00edtima<\/a> para induzir os destinat\u00e1rios a clicar em um link ou visitar um site malicioso. <\/p>\n\n\n\n<p>Quando o usu\u00e1rio visita o site ou clica no link, o malware \u00e9 baixado automaticamente. \u00c0s vezes, as informa\u00e7\u00f5es privadas inseridas em formul\u00e1rios hackeados s\u00e3o coletadas e usadas.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ransomware\"><\/span><strong>Ransomware<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg\"><img decoding=\"async\" width=\"788\" height=\"443\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg\" alt=\"fundo abstrato com as palavras acesso negado\" class=\"wp-image-38278\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg 788w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883-300x169.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883-768x432.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883-302x170.jpg 302w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883-700x394.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883-156x88.jpg 156w\" sizes=\"(max-width: 788px) 100vw, 788px\" \/><\/a><\/figure>\n\n\n\n<p>Os ataques de ransomware envolvem o <strong>criptografia<\/strong> dos arquivos de uma empresa ou de um indiv\u00edduo. Em seguida, o hacker mant\u00e9m os dados bloqueados como ref\u00e9ns, exigindo o pagamento de um resgate. Muitas empresas optam por n\u00e3o pagar. <\/p>\n\n\n\n<p>Outros pagam, mas descobrem que a promessa de uma chave de descriptografia \u00e9 vazia, e a chave n\u00e3o funciona para restaurar os dados.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Zero-Day_Exploits\"><\/span><strong>Explora\u00e7\u00f5es de dia zero<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Novos softwares e dispositivos geralmente v\u00eam com falhas incorporadas. Com as explora\u00e7\u00f5es de dia zero, os criminosos cibern\u00e9ticos exploram essas falhas antes que as empresas tenham tempo de corrigir as vulnerabilidades.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg\"><img decoding=\"async\" width=\"724\" height=\"483\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg\" alt=\"ilustra\u00e7\u00e3o de explora\u00e7\u00f5es de dia zero\" class=\"wp-image-38281\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg 724w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346-300x200.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346-255x170.jpg 255w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346-700x467.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346-156x104.jpg 156w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346-600x400.jpg 600w\" sizes=\"(max-width: 724px) 100vw, 724px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Man-in-the-Middle_Attacks\"><\/span><strong>Ataques Man-in-the-Middle<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Os ataques man-in-the-middle geralmente afetam <strong>redes Wi-Fi n\u00e3o seguras em locais p\u00fablicos<\/strong> como cafeterias, aeroportos e hot\u00e9is. <\/p>\n\n\n\n<p>O hacker monitora a rede em busca de conex\u00f5es e, em seguida, usa um software especial para roubar pressionamentos de teclas, obter logins e assumir o controle total dos dispositivos dos usu\u00e1rios.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Password_Attacks\"><\/span><strong>Ataques de senha<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg\"><img decoding=\"async\" width=\"671\" height=\"520\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg\" alt=\"ilustra\u00e7\u00e3o de uma tela de computador com campo de senha\" class=\"wp-image-38282\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg 671w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880-300x232.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880-219x170.jpg 219w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880-668x518.jpg 668w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880-156x121.jpg 156w\" sizes=\"(max-width: 671px) 100vw, 671px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Recheio de credenciais<\/strong> \u00e9 quando os agentes de amea\u00e7as usam senhas roubadas de uma conta e tentam us\u00e1-las em outra conta. <\/p>\n\n\n\n<p>Esse \u00e9 um ataque comum porque muitas pessoas <strong>reutilizar o mesmo <a href=\"https:\/\/memberpress.com\/go\/lastpass\/\" title=\"Link de afiliado do Last Pass\" class=\"pretty-link-keyword\"rel=\"nofollow \" target=\"_blank\">senha<\/a><\/strong> em suas contas digitais. O preenchimento de credenciais \u00e9 um dos muitos tipos de ataques de senha que os criminosos usam para invadir as contas on-line dos usu\u00e1rios.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Data_Breaches\"><\/span><strong>Viola\u00e7\u00f5es de dados<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Dezenas de viola\u00e7\u00f5es de dados expuseram milh\u00f5es de <a href=\"https:\/\/www.usa.gov\/privacy\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Informa\u00e7\u00f5es pessoais dos americanos<\/a> na dark web. Essas viola\u00e7\u00f5es resultaram em fraudes e roubo de identidade pessoal.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u00a0<strong>Amea\u00e7as aos dispositivos IoT<\/strong><\/h3>\n\n\n\n<p>Como os dispositivos de IoT s\u00e3o tecnologias relativamente novas, muitos deles n\u00e3o foram protegidos adequadamente. Por esse motivo, os dispositivos de IoT oferecem um ponto de entrada para que os hackers obtenham acesso a uma rede dom\u00e9stica ou empresarial.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"10_Ways_to_Protect_Yourself_from_Cyber_Threats\"><\/span><strong>10 maneiras de se proteger contra amea\u00e7as cibern\u00e9ticas<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg\"><img decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg\" alt=\"ilustra\u00e7\u00e3o da tela do computador com caveira da morte\" class=\"wp-image-38284\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg 1024w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-300x225.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-768x576.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-227x170.jpg 227w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-819x614.jpg 819w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-912x684.jpg 912w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-691x518.jpg 691w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-156x117.jpg 156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Embora as amea\u00e7as sejam reais e iminentes, voc\u00ea pode tomar medidas para proteger a si mesmo e a sua empresa. Veja a seguir 10 das melhores coisas que voc\u00ea pode fazer para evitar ataques cibern\u00e9ticos.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Make_cybersecurity_a_top_priority\"><\/span>Fa\u00e7a da seguran\u00e7a cibern\u00e9tica uma prioridade m\u00e1xima<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Essa \u00e9 a coisa mais simples, por\u00e9m mais eficaz, que voc\u00ea pode fazer para <a href=\"https:\/\/memberpress.com\/pt\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">proteja voc\u00ea e sua empresa<\/a>. Esteja ciente dos ataques cibern\u00e9ticos aos quais voc\u00ea est\u00e1 mais vulner\u00e1vel e tome medidas espec\u00edficas para evit\u00e1-los. <\/p>\n\n\n\n<p>Se voc\u00ea tem um neg\u00f3cio on-line, sua melhor op\u00e7\u00e3o \u00e9 comprar um <a href=\"https:\/\/www.idstrong.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">servi\u00e7o de monitoramento de alta qualidade<\/a> que pode ficar de olho nas coisas e resolver quaisquer problemas que surjam antes que se tornem eventos catastr\u00f3ficos.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Update_with_security_patches\"><\/span>Atualiza\u00e7\u00e3o com patches de seguran\u00e7a<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg\"><img decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg\" alt=\"ilustra\u00e7\u00e3o de um homem bonito usando um laptop e sendo observado\" class=\"wp-image-38276\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg 1024w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-300x225.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-768x576.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-227x170.jpg 227w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-819x614.jpg 819w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-912x684.jpg 912w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-691x518.jpg 691w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-156x117.jpg 156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Certifique-se de manter todos os seus sistemas, hardware e software atualizados com os patches de seguran\u00e7a mais recentes. <\/p>\n\n\n\n<p>Esse \u00e9 um dos motivos mais importantes para <strong>renovar suas licen\u00e7as de software anualmente<\/strong>. Para a grande maioria dos plug-ins e softwares, a renova\u00e7\u00e3o da licen\u00e7a paga por coisas importantes, como o desenvolvimento e a implementa\u00e7\u00e3o de patches de seguran\u00e7a.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Train_your_team\"><\/span>Treine sua equipe<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Certifique-se de que sua equipe entenda como funcionam os ataques de phishing e a engenharia social. Em seguida, certifique-se de que eles saibam como reagir caso sua empresa seja atacada.<\/p>\n\n\n\n<p>Considere a possibilidade de realizar um workshop para toda a empresa ou adquirir um curso on-line para a sua equipe. Por exemplo, o Coursera oferece um excelente e acess\u00edvel <a href=\"https:\/\/www.coursera.org\/learn\/ibm-cyber-threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">curso de intelig\u00eancia sobre amea\u00e7as cibern\u00e9ticas<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Dont_click_links\"><\/span>N\u00e3o clique em links<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg\"><img decoding=\"async\" width=\"703\" height=\"497\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg\" alt=\"ilustra\u00e7\u00e3o de um hacker no escuro\" class=\"wp-image-38280\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg 703w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948-300x212.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948-240x170.jpg 240w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948-700x495.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948-156x110.jpg 156w\" sizes=\"(max-width: 703px) 100vw, 703px\" \/><\/a><\/figure>\n\n\n\n<p>Embora a maioria dos links de e-mail e SMS seja leg\u00edtima, \u00e9 <em>extremamente dif\u00edcil<\/em> para saber a diferen\u00e7a entre links reais e de phishing. <\/p>\n\n\n\n<p>Portanto, voc\u00ea deve criar o h\u00e1bito de <strong>nunca clique em um link ou fa\u00e7a download de um anexo em uma mensagem de e-mail ou SMS<\/strong>. Em vez disso, acesse o URL diretamente. Basta digitar o endere\u00e7o em seu navegador e voc\u00ea poder\u00e1 ver se o link \u00e9 honesto.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Check_out_your_sender\"><\/span>Verifique seu remetente<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Sempre verifique o remetente de seus e-mails antes de tomar qualquer medida. Voc\u00ea pode fazer isso:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Verifica\u00e7\u00e3o de erros ortogr\u00e1ficos no e-mail de origem<\/li><li>Verificar se o endere\u00e7o e o nome de exibi\u00e7\u00e3o s\u00e3o os mesmos (deveriam ser)<\/li><\/ol>\n\n\n\n<p>Voc\u00ea tamb\u00e9m pode verificar o registro DMARC do remetente. A Fraudmarc tem um <a href=\"https:\/\/fraudmarc.com\/dmarc-check\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Ferramenta de verifica\u00e7\u00e3o de registros DMARC<\/a> que \u00e9 de uso gratuito. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Update_your_devices\"><\/span>Atualize seus dispositivos<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Considere a possibilidade de instalar plug-ins, extens\u00f5es e aplicativos para manter seus dispositivos atualizados com o software antiv\u00edrus\/anti-malware mais recente.<\/p>\n\n\n\n<p>H\u00e1 v\u00e1rios tipos de ferramentas dispon\u00edveis, muitas das quais s\u00e3o gratuitas. D\u00ea uma olhada na PCmag de 2022 <a href=\"https:\/\/www.pcmag.com\/picks\/the-best-free-antivirus-protection\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">lista de softwares antiv\u00edrus gratuitos aqui<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Get_serious_about_your_passwords\"><\/span>Leve suas senhas a s\u00e9rio<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg\"><img decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg\" alt=\"tela de login de celular com gancho de peixe\" class=\"wp-image-38277\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg 1024w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-300x225.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-768x576.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-227x170.jpg 227w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-819x614.jpg 819w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-912x684.jpg 912w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-691x518.jpg 691w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-156x117.jpg 156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Implemente requisitos e procedimentos de senhas fortes, como <strong>autentica\u00e7\u00e3o de dois fatores<\/strong>. Se poss\u00edvel, v\u00e1 para <strong>biometria <\/strong>como logins por impress\u00e3o digital, e n\u00e3o mais por senhas. <\/p>\n\n\n\n<p><strong>E nunca, jamais, reutilize senhas.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Backup_your_data\"><\/span>Fa\u00e7a backup de seus dados<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>No caso de um ataque de ransomware, certifique-se de ter um backup s\u00f3lido de todos os seus dados. E <strong>armazenar seus backups fora do local<\/strong>. Veja a seguir v\u00e1rios plug-ins de backup do WordPress que recomendamos:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/memberpress.com\/go\/wptimecapsule\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">C\u00e1psula do tempo do WP<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/backupbuddy\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BackupBuddy<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/blogvault\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BlogVault<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/jetpack\/main\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"Jetpack\">Jetpack<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/wpstaging\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"Prepara\u00e7\u00e3o do WP\">Prepara\u00e7\u00e3o do WP<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/updraft\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">UpdraftPlus<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/stagecoach\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">WP Stagecoach<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/duplicator\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">Duplicador Pro<\/a> (por Snapcreek)<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Avoid_unsecured_networks\"><\/span>Evite redes n\u00e3o seguras<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>O ideal \u00e9 que voc\u00ea sempre <strong>usar uma rede privada virtual (VPN)<\/strong> ao se conectar com redes p\u00fablicas. Uma VPN configura uma conex\u00e3o criptografada e privada entre seu dispositivo e a rede p\u00fablica. <\/p>\n\n\n\n<p>\u00c9 uma boa pr\u00e1tica evitar redes p\u00fablicas n\u00e3o seguras em geral.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Encrypt_your_data\"><\/span>Criptografe seus dados<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg\"><img decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg\" alt=\"\" class=\"wp-image-38286\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg 1024w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-300x225.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-768x576.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-227x170.jpg 227w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-819x614.jpg 819w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-912x684.jpg 912w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-691x518.jpg 691w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-156x117.jpg 156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Voc\u00ea deve criptografar todos os dados em seus sistemas e em seus dispositivos. A criptografia de dados ajuda a proteger suas informa\u00e7\u00f5es privadas e confidenciais. Ela tamb\u00e9m torna a comunica\u00e7\u00e3o entre aplicativos clientes e servidores muito mais segura. <\/p>\n\n\n\n<p>Quando seus dados s\u00e3o criptografados, mesmo que pessoas ou entidades n\u00e3o autorizadas coloquem as m\u00e3os em seus dados, elas n\u00e3o conseguir\u00e3o l\u00ea-los.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclus\u00e3o<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Muitas de nossas informa\u00e7\u00f5es pessoais est\u00e3o prontamente dispon\u00edveis on-line, e sempre h\u00e1 riscos cibern\u00e9ticos com os quais nos preocupar. <\/p>\n\n\n\n<p>Fa\u00e7a da seguran\u00e7a cibern\u00e9tica uma de suas principais prioridades para proteger seus neg\u00f3cios on-line e todo o seu mundo digital.\u00a0<\/p>\n\n\n\n<p><strong>Se voc\u00ea gostou deste artigo, n\u00e3o deixe de <\/strong><a href=\"https:\/\/memberpress.com\/pt\/subscribe-to-the-memberpress-blog\/\"><strong>assine o blog do MemberPress<\/strong><\/a><strong>!<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Our modern digital world is full of unique processes and functions that improve the quality of life and work. However, these technologies also pose some dangers, and no business or IT organization is safe from these threats. Cybercriminals are using more and more sophisticated techniques to wage damaging campaigns. As a result, most organizations feel [\u2026]<\/p>\n","protected":false},"author":63703,"featured_media":38289,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_strive_editorial_status":"complete","_strive_copy_of":0,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_FSMCFIC_featured_image_caption":"","_FSMCFIC_featured_image_nocaption":"","_FSMCFIC_featured_image_hide":"","_strive_checklists":"\"\"","_strive_active_checklist":"62291e2bb2422","_strive_post_notes":"","footnotes":""},"categories":[69,258,134],"tags":[299],"class_list":{"0":"post-35601","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-advice","8":"category-fixes","9":"category-how-to-2","10":"tag-security","11":"entry"},"acf":{"plans":["scale"],"is_featured":false,"download_source":"none","mothership_slug":"","download_url":""},"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"In today&#039;s digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Levon Gasparian\"\/>\n\t<meta name=\"keywords\" content=\"cyber security for my site,what are cyber threats,cyber threat solutions,how to fight cyber threats,security\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"pt_BR\" \/>\n\t\t<meta property=\"og:site_name\" content=\"MemberPress\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"How to Fight Cyber Threats (10 Ways)\" \/>\n\t\t<meta property=\"og:description\" content=\"In today&#039;s digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1480\" \/>\n\t\t<meta property=\"og:image:height\" content=\"832\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2022-08-04T11:00:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-11-16T22:13:35+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/memberpress\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@memberpress\" \/>\n\t\t<meta name=\"twitter:title\" content=\"How to Fight Cyber Threats (10 Ways)\" \/>\n\t\t<meta name=\"twitter:description\" content=\"In today&#039;s digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#blogposting\",\"name\":\"How to Fight Cyber Threats (10 Ways)\",\"headline\":\"How to Fight Cyber Threats (10 Ways)\",\"author\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/author\\\/levongasparian1\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/memberpress.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Fight-Cyber-Threats.jpg\",\"width\":1480,\"height\":832,\"caption\":\"10 Ways to Fight Cyber Threats\"},\"datePublished\":\"2022-08-04T05:00:00-04:00\",\"dateModified\":\"2022-11-16T15:13:35-05:00\",\"inLanguage\":\"pt-BR\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#webpage\"},\"articleSection\":\"Advice, Fixes, How To, security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/memberpress.com\\\/pt\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/category\\\/advice\\\/#listItem\",\"name\":\"Advice\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/category\\\/advice\\\/#listItem\",\"position\":2,\"name\":\"Advice\",\"item\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/category\\\/advice\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#listItem\",\"name\":\"How to Fight Cyber Threats (10 Ways)\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#listItem\",\"position\":3,\"name\":\"How to Fight Cyber Threats (10 Ways)\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/category\\\/advice\\\/#listItem\",\"name\":\"Advice\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/#organization\",\"name\":\"MemberPress\",\"description\":\"The All-In-One WordPress Membership Plugin\",\"url\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/memberpress.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/mp-icon-RGB_Icon-01.jpg\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#organizationLogo\",\"width\":1650,\"height\":1275,\"caption\":\"memberpress logo icon\"},\"image\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.instagram.com\\\/memberpress\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/memberpressplugin\\\/\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/MemberPressPlugin\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/memberpress\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/author\\\/levongasparian1\\\/#author\",\"url\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/author\\\/levongasparian1\\\/\",\"name\":\"Levon Gasparian\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/memberpress.com\\\/wp-content\\\/litespeed\\\/avatar\\\/8021f617f664e4349f7e6de8a1e4918d.jpg?ver=1775238665\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#webpage\",\"url\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/\",\"name\":\"How to Fight Cyber Threats (10 Ways)\",\"description\":\"In today's digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.\",\"inLanguage\":\"pt-BR\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/author\\\/levongasparian1\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/author\\\/levongasparian1\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/memberpress.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Fight-Cyber-Threats.jpg\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#mainImage\",\"width\":1480,\"height\":832,\"caption\":\"10 Ways to Fight Cyber Threats\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#mainImage\"},\"datePublished\":\"2022-08-04T05:00:00-04:00\",\"dateModified\":\"2022-11-16T15:13:35-05:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/#website\",\"url\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/\",\"name\":\"MemberPress\",\"description\":\"The All-In-One WordPress Membership Plugin\",\"inLanguage\":\"pt-BR\",\"publisher\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/pt\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>How to Fight Cyber Threats (10 Ways)<\/title>\n\n","aioseo_head_json":{"title":"Como combater as amea\u00e7as cibern\u00e9ticas (10 maneiras)","description":"No mundo digital de hoje, a seguran\u00e7a cibern\u00e9tica \u00e9 essencial para as pequenas empresas on-line. Saiba como combater as amea\u00e7as cibern\u00e9ticas com estas 10 pr\u00e1ticas simples.","canonical_url":"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/","robots":"max-image-preview:large","keywords":"cyber security for my site,what are cyber threats,cyber threat solutions,how to fight cyber threats,security","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#blogposting","name":"How to Fight Cyber Threats (10 Ways)","headline":"How to Fight Cyber Threats (10 Ways)","author":{"@id":"https:\/\/memberpress.com\/pt\/blog\/author\/levongasparian1\/#author"},"publisher":{"@id":"https:\/\/memberpress.com\/pt\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg","width":1480,"height":832,"caption":"10 Ways to Fight Cyber Threats"},"datePublished":"2022-08-04T05:00:00-04:00","dateModified":"2022-11-16T15:13:35-05:00","inLanguage":"pt-BR","mainEntityOfPage":{"@id":"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#webpage"},"isPartOf":{"@id":"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#webpage"},"articleSection":"Advice, Fixes, How To, security"},{"@type":"BreadcrumbList","@id":"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/memberpress.com\/pt#listItem","position":1,"name":"Home","item":"https:\/\/memberpress.com\/pt","nextItem":{"@type":"ListItem","@id":"https:\/\/memberpress.com\/pt\/blog\/category\/advice\/#listItem","name":"Advice"}},{"@type":"ListItem","@id":"https:\/\/memberpress.com\/pt\/blog\/category\/advice\/#listItem","position":2,"name":"Advice","item":"https:\/\/memberpress.com\/pt\/blog\/category\/advice\/","nextItem":{"@type":"ListItem","@id":"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#listItem","name":"How to Fight Cyber Threats (10 Ways)"},"previousItem":{"@type":"ListItem","@id":"https:\/\/memberpress.com\/pt#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#listItem","position":3,"name":"How to Fight Cyber Threats (10 Ways)","previousItem":{"@type":"ListItem","@id":"https:\/\/memberpress.com\/pt\/blog\/category\/advice\/#listItem","name":"Advice"}}]},{"@type":"Organization","@id":"https:\/\/memberpress.com\/pt\/#organization","name":"MemberPress","description":"The All-In-One WordPress Membership Plugin","url":"https:\/\/memberpress.com\/pt\/","logo":{"@type":"ImageObject","url":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/10\/mp-icon-RGB_Icon-01.jpg","@id":"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#organizationLogo","width":1650,"height":1275,"caption":"memberpress logo icon"},"image":{"@id":"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#organizationLogo"},"sameAs":["https:\/\/www.instagram.com\/memberpress\/","https:\/\/www.pinterest.com\/memberpressplugin\/","https:\/\/www.youtube.com\/c\/MemberPressPlugin","https:\/\/www.linkedin.com\/company\/memberpress\/"]},{"@type":"Person","@id":"https:\/\/memberpress.com\/pt\/blog\/author\/levongasparian1\/#author","url":"https:\/\/memberpress.com\/pt\/blog\/author\/levongasparian1\/","name":"Levon Gasparian","image":{"@type":"ImageObject","url":"https:\/\/memberpress.com\/wp-content\/litespeed\/avatar\/8021f617f664e4349f7e6de8a1e4918d.jpg?ver=1775238665"}},{"@type":"WebPage","@id":"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#webpage","url":"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/","name":"How to Fight Cyber Threats (10 Ways)","description":"In today's digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.","inLanguage":"pt-BR","isPartOf":{"@id":"https:\/\/memberpress.com\/pt\/#website"},"breadcrumb":{"@id":"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#breadcrumblist"},"author":{"@id":"https:\/\/memberpress.com\/pt\/blog\/author\/levongasparian1\/#author"},"creator":{"@id":"https:\/\/memberpress.com\/pt\/blog\/author\/levongasparian1\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg","@id":"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#mainImage","width":1480,"height":832,"caption":"10 Ways to Fight Cyber Threats"},"primaryImageOfPage":{"@id":"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#mainImage"},"datePublished":"2022-08-04T05:00:00-04:00","dateModified":"2022-11-16T15:13:35-05:00"},{"@type":"WebSite","@id":"https:\/\/memberpress.com\/pt\/#website","url":"https:\/\/memberpress.com\/pt\/","name":"MemberPress","description":"The All-In-One WordPress Membership Plugin","inLanguage":"pt-BR","publisher":{"@id":"https:\/\/memberpress.com\/pt\/#organization"}}]},"og:locale":"pt_BR","og:site_name":"MemberPress","og:type":"article","og:title":"How to Fight Cyber Threats (10 Ways)","og:description":"In today's digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.","og:url":"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/","og:image":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg","og:image:secure_url":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg","og:image:width":1480,"og:image:height":832,"article:published_time":"2022-08-04T11:00:00+00:00","article:modified_time":"2022-11-16T22:13:35+00:00","article:publisher":"https:\/\/www.facebook.com\/memberpress\/","twitter:card":"summary_large_image","twitter:site":"@memberpress","twitter:title":"How to Fight Cyber Threats (10 Ways)","twitter:description":"In today's digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.","twitter:image":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg"},"aioseo_meta_data":{"post_id":"35601","title":null,"description":"No mundo digital de hoje, a seguran\u00e7a cibern\u00e9tica \u00e9 essencial para as pequenas empresas on-line. Saiba como combater as amea\u00e7as cibern\u00e9ticas com estas 10 pr\u00e1ticas simples.","keywords":[{"label":"cyber security for my site","value":"cyber security for my site"},{"label":"what are cyber threats","value":"what are cyber threats"},{"label":"cyber threat solutions","value":"cyber threat solutions"},{"label":"how to fight cyber threats","value":"how to fight cyber threats"}],"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":[],"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"Article","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"},\"blockGraphs\":[]}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-10-09 19:19:34","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2022-04-01 17:04:01","updated":"2026-03-03 15:02:11"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/memberpress.com\/pt\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/memberpress.com\/pt\/blog\/category\/advice\/\" title=\"Advice\">Advice<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tHow to Fight Cyber Threats (10 Ways)\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/memberpress.com\/pt"},{"label":"Advice","link":"https:\/\/memberpress.com\/pt\/blog\/category\/advice\/"},{"label":"How to Fight Cyber Threats (10 Ways)","link":"https:\/\/memberpress.com\/pt\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/"}],"app_bookmark":{"bookmark_id":0,"is_bookmarked":false,"bookmark_date":0},"comments_count":"0","content_native":[{"type":"core\/paragraph","render":"<p>Our modern digital world is full of unique processes and functions that improve the quality of life and work. However, these technologies also pose some dangers, and no business or IT organization is safe from these threats. <\/p>","content":[{"type":"text","data":"Our modern digital world is full of unique processes and functions that improve the quality of life and work. However, these technologies also pose some dangers, and no business or IT organization is safe from these threats. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Cybercriminals are using more and more sophisticated techniques to wage damaging campaigns. As a result, most organizations feel helpless in protecting their data and critical assets from malicious attacks.<\/p>","content":[{"type":"text","data":"Cybercriminals are using more and more sophisticated techniques to wage damaging campaigns. As a result, most organizations feel helpless in protecting their data and critical assets from malicious attacks."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>In this post, we'll talk about what a cyber threat looks like. And we'll give you 10 simple ways you can protect yourself from them.<\/p>","content":[{"type":"text","data":"In this post, we'll talk about what a cyber threat looks like. And we'll give you 10 simple ways you can protect yourself from them."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h2 class=\"wp-block-heading\"><strong>What are Cyber Threats<\/strong><\/h2>","content":"O que s\u00e3o amea\u00e7as cibern\u00e9ticas","data":[],"style":{"align":"left","parent_style":{},"header":"h2","fontSize":"27px"}},{"type":"core\/paragraph","render":"<p>Cyber threats are malicious attacks designed to steal data, disrupt operations, or damage digital assets. Attackers target individuals and companies with the goal of making a profit. <\/p>","content":[{"type":"text","data":"Cyber threats are malicious attacks designed to steal data, disrupt operations, or damage digital assets. Attackers target individuals and companies with the goal of making a profit. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg\" alt=\"cyber crime word on computer keyboard\" class=\"wp-image-38275\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg","alt":"cyber crime word on computer keyboard","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg","linkDestination":"media"},"style":{"width":746,"height":468,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>These threats come in many forms, including <strong>viruses, malware, data breaches, Distributed Denial of Service (DDoS) attacks, phishing, ransomware, <\/strong>and <strong>Man-in-the-Middle (MitM) attacks<\/strong>, among others.<\/p>","content":[{"type":"text","data":"These threats come in many forms, including <strong>viruses, malware, data breaches, Distributed Denial of Service (DDoS) attacks, phishing, ransomware, <\/strong>and <strong>Man-in-the-Middle (MitM) attacks<\/strong>, among others."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Why Protect Yourself from Cybersecurity Threats?<\/strong><\/h3>","content":"Por que se proteger das amea\u00e7as \u00e0 seguran\u00e7a cibern\u00e9tica?","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Cyber threats are serious business and can have far-reaching effects that disrupt many areas of modern life. For example, the recent ransomware attacks on the food and fuel supply chains caused price increases and shortages. <\/p>","content":[{"type":"text","data":"Cyber threats are serious business and can have far-reaching effects that disrupt many areas of modern life. For example, the recent ransomware attacks on the food and fuel supply chains caused price increases and shortages. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>The potential for significant damage is real when the attacks are aimed at networks, phone systems, healthcare, water treatment plants, electrical grids, or government operations. <\/p>","content":[{"type":"text","data":"The potential for significant damage is real when the attacks are aimed at networks, phone systems, healthcare, water treatment plants, electrical grids, or government operations. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Cyber threats are even a matter of <a href=\"https:\/\/www.cisa.gov\/cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">national security<\/a> and a high priority for our current administration.<\/p>","content":[{"type":"text","data":"Cyber threats are even a matter of <a href=\"https:\/\/www.cisa.gov\/cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">national security<\/a> and a high priority for our current administration."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>On a smaller scale, the threat to individuals is also severe. Any data breach leaking personal information can quickly lead to identity theft, fraud, and financial ruin. These threats are growing in severity and increasing in numbers.<\/p>","content":[{"type":"text","data":"On a smaller scale, the threat to individuals is also severe. Any data breach leaking personal information can quickly lead to identity theft, fraud, and financial ruin. These threats are growing in severity and increasing in numbers."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Businesses need to understand that it doesn\u2019t just \u201chappen to someone else\u201d. Cyber threats pose a risk to every business, no matter how small. The time to act to <a href=\"https:\/\/memberpress.com\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">protect your business from harm<\/a> is now.<\/p>","content":[{"type":"text","data":"Businesses need to understand that it doesn\u2019t just \u201chappen to someone else\u201d. Cyber threats pose a risk to every business, no matter how small. The time to act to <a href=\"https:\/\/memberpress.com\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">protect your business from harm<\/a> is now."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Where Do Cyber Threats Come From<\/strong>?<\/h3>","content":"De onde v\u00eam as amea\u00e7as cibern\u00e9ticas?","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Attackers are not just one breed of animal we need to worry about. Unfortunately, these threats come from <strong>different types of people and groups<\/strong> with varying agendas.<\/p>","content":[{"type":"text","data":"Attackers are not just one breed of animal we need to worry about. Unfortunately, these threats come from <strong>different types of people and groups<\/strong> with varying agendas."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Unfortunately, many of the most damaging attacks are backed by <strong>hostile countries<\/strong>. Although not as common, <strong>terrorist groups<\/strong> may also be involved in cyberterrorism.<\/p>","content":[{"type":"text","data":"Unfortunately, many of the most damaging attacks are backed by <strong>hostile countries<\/strong>. Although not as common, <strong>terrorist groups<\/strong> may also be involved in cyberterrorism."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p><strong>Organized crime<\/strong> frequently uses digital threats to gather information, hold companies hostage for ransom, and steal data for identity theft and fraud. Law enforcement has linked many credit card scams to organized crime.<\/p>","content":[{"type":"text","data":"<strong>Organized crime<\/strong> frequently uses digital threats to gather information, hold companies hostage for ransom, and steal data for identity theft and fraud. Law enforcement has linked many credit card scams to organized crime."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p><strong>Hackers<\/strong>, <strong>hacktivists<\/strong>, and <strong>disgruntled insiders<\/strong> are also responsible for various digital attacks. For example, sometimes hackers will contact a company employee and hire or blackmail them into becoming accomplices.<\/p>","content":[{"type":"text","data":"<strong>Hackers<\/strong>, <strong>hacktivists<\/strong>, and <strong>disgruntled insiders<\/strong> are also responsible for various digital attacks. For example, sometimes hackers will contact a company employee and hire or blackmail them into becoming accomplices."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>This all sounds pretty sophisticated, but anyone \u2013 even small businesses \u2013 can fall prey to these attacks.<\/p>","content":[{"type":"text","data":"This all sounds pretty sophisticated, but anyone \u2013 even small businesses \u2013 can fall prey to these attacks."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h2 class=\"wp-block-heading\"><strong>Types of Cyber Threats<\/strong><\/h2>","content":"Tipos de amea\u00e7as cibern\u00e9ticas","data":[],"style":{"align":"left","parent_style":{},"header":"h2","fontSize":"27px"}},{"type":"core\/paragraph","render":"<p>There is a huge number of cyber threat types. But for many attacks, the overarching concept is <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/social-engineering\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">social engineering<\/a>. <\/p>","content":[{"type":"text","data":"There is a huge number of cyber threat types. But for many attacks, the overarching concept is <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/social-engineering\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">social engineering<\/a>. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Social engineering is when hackers manipulate people into ignoring standard security procedures and best practices so the hackers can gain authorized access to systems and data. <\/p>","content":[{"type":"text","data":"Social engineering is when hackers manipulate people into ignoring standard security procedures and best practices so the hackers can gain authorized access to systems and data. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Following are the main types of threats, many of which involve social engineering.<\/p>","content":[{"type":"text","data":"Following are the main types of threats, many of which involve social engineering."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg\" alt=\"Identity theft word on computer keyboard\" class=\"wp-image-38273\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg","alt":"Identity theft word on computer keyboard","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg","linkDestination":"media"},"style":{"width":720,"height":485,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Malware<\/h3>","content":"Malware","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Malware is <strong>malicious software<\/strong> designed to:<\/p>","content":[{"type":"text","data":"Malware is <strong>malicious software<\/strong> designed to:"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/list","render":"<ul class=\"wp-block-list\"><li>Spy on the user<\/li><li>Steal credentials<\/li><li>Alter, copy, and delete files<\/li><li>Change permissions<\/li><li>Interrupt network operations<\/li><li>Cause other kinds of damage<\/li><\/ul>","content":"<ul class=\"wp-block-list\"><li>Espionar o usu\u00e1rio<\/li><li>Roubo de credenciais<\/li><li>Alterar, copiar e excluir arquivos<\/li><li>Alterar permiss\u00f5es<\/li><li>Interromper opera\u00e7\u00f5es de rede<\/li><li>Causar outros tipos de danos<\/li><\/ul>","data":{"listType":"unordered"},"style":{"parent_style":{}}},{"type":"core\/paragraph","render":"<p>There are dozens of <a href=\"https:\/\/www.idstrong.com\/sentinel\/what-is-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware types<\/a> and variants, many of them available on the dark web for sale or trade.<\/p>","content":[{"type":"text","data":"There are dozens of <a href=\"https:\/\/www.idstrong.com\/sentinel\/what-is-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware types<\/a> and variants, many of them available on the dark web for sale or trade."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>DDoS Attacks<\/strong><\/h3>","content":"Ataques DDoS","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg\" alt=\"DDoS attacks illustration\" class=\"wp-image-38279\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg","alt":"DDoS attacks illustration","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg","linkDestination":"media"},"style":{"width":1024,"height":512,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>Distributed denial of service (DDoS) attacks <strong>overload a network or system<\/strong>. This disruption of the flow of traffic creates a window of opportunity where the cybercriminals can gain access to steal data or install malicious software.<\/p>","content":[{"type":"text","data":"Distributed denial of service (DDoS) attacks <strong>overload a network or system<\/strong>. This disruption of the flow of traffic creates a window of opportunity where the cybercriminals can gain access to steal data or install malicious software."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">&nbsp;<strong>Phishing<\/strong><\/h3>","content":"&nbsp;Phishing","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Phishing is when bad actors use <a href=\"https:\/\/memberpress.com\/blog\/how-to-prevent-your-marketing-emails-from-getting-stuck-in-spam\/\" target=\"_blank\" rel=\"noreferrer noopener\">legitimate-looking emails<\/a> to trick recipients into clicking a link or visiting a malicious website. <\/p>","content":[{"type":"text","data":"Phishing is when bad actors use <a href=\"https:\/\/memberpress.com\/blog\/how-to-prevent-your-marketing-emails-from-getting-stuck-in-spam\/\" target=\"_blank\" rel=\"noreferrer noopener\">legitimate-looking emails<\/a> to trick recipients into clicking a link or visiting a malicious website. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>When the user visits the site or clicks the link, malware is automatically downloaded. Sometimes private information entered into hacked forms is collected and used.<\/p>","content":[{"type":"text","data":"When the user visits the site or clicks the link, malware is automatically downloaded. Sometimes private information entered into hacked forms is collected and used."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Ransomware<\/strong><\/h3>","content":"Ransomware","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg\" alt=\"abstract background with the words access denied\" class=\"wp-image-38278\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg","alt":"abstract background with the words access denied","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg","linkDestination":"media"},"style":{"width":788,"height":443,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>Ransomware attacks involve the <strong>encryption<\/strong> of a company's or individual's files. The hacker then holds the locked data hostage in demand for a ransom payment. Many companies choose not to pay. <\/p>","content":[{"type":"text","data":"Ransomware attacks involve the <strong>encryption<\/strong> of a company's or individual's files. The hacker then holds the locked data hostage in demand for a ransom payment. Many companies choose not to pay. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Others do pay, but they find that the promise of a decrypter key is empty, and the key doesn't work to restore the data.<\/p>","content":[{"type":"text","data":"Others do pay, but they find that the promise of a decrypter key is empty, and the key doesn't work to restore the data."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Zero-Day Exploits<\/strong><\/h3>","content":"Explora\u00e7\u00f5es de dia zero","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>New software and devices often come with built-in flaws. With zero-day exploits, cybercriminals exploit these flaws before companies have the time to patch the vulnerabilities.<\/p>","content":[{"type":"text","data":"New software and devices often come with built-in flaws. With zero-day exploits, cybercriminals exploit these flaws before companies have the time to patch the vulnerabilities."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg\" alt=\"zero-day exploits illustration\" class=\"wp-image-38281\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg","alt":"zero-day exploits illustration","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg","linkDestination":"media"},"style":{"width":724,"height":483,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Man-in-the-Middle Attacks<\/strong><\/h3>","content":"Ataques Man-in-the-Middle","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Man-in-the-middle attacks usually affect <strong>unsecured Wi-Fi networks at public places<\/strong> like coffee shops, airports, and hotels. <\/p>","content":[{"type":"text","data":"Man-in-the-middle attacks usually affect <strong>unsecured Wi-Fi networks at public places<\/strong> like coffee shops, airports, and hotels. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>The hacker monitors the network for connections, then uses special software to steal keystrokes, obtain logins, and take complete control of users\u2019 devices.<\/p>","content":[{"type":"text","data":"The hacker monitors the network for connections, then uses special software to steal keystrokes, obtain logins, and take complete control of users\u2019 devices."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Password Attacks<\/strong><\/h3>","content":"Ataques de senha","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg\" alt=\"illustration of a computer screen with password field\" class=\"wp-image-38282\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg","alt":"illustration of a computer screen with password field","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg","linkDestination":"media"},"style":{"width":671,"height":520,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p><strong>Credential stuffing<\/strong> is when threat actors use stolen passwords from one account and try to use them on another account. <\/p>","content":[{"type":"text","data":"<strong>Credential stuffing<\/strong> is when threat actors use stolen passwords from one account and try to use them on another account. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>This is a common attack because many people <strong>reuse the same password<\/strong> on their digital accounts. Credential stuffing is one of many types of password attacks criminals use to break into users\u2019 online accounts.<\/p>","content":[{"type":"text","data":"This is a common attack because many people <strong>reuse the same password<\/strong> on their digital accounts. Credential stuffing is one of many types of password attacks criminals use to break into users\u2019 online accounts."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Data Breaches<\/strong><\/h3>","content":"Viola\u00e7\u00f5es de dados","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Dozens of data breaches have exposed millions of <a href=\"https:\/\/www.usa.gov\/privacy\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Americans\u2019 personal information<\/a> on the dark web. These breaches have led to fraud and personal identity theft.<\/p>","content":[{"type":"text","data":"Dozens of data breaches have exposed millions of <a href=\"https:\/\/www.usa.gov\/privacy\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Americans\u2019 personal information<\/a> on the dark web. These breaches have led to fraud and personal identity theft."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">&nbsp;<strong>IoT Device Threats<\/strong><\/h3>","content":"&nbsp;Amea\u00e7as aos dispositivos IoT","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Because IoT devices are relatively new technologies, many of them have not been appropriately secured. Because of this, IoT devices provide an entry point for hackers to gain access to a home or company network.<\/p>","content":[{"type":"text","data":"Because IoT devices are relatively new technologies, many of them have not been appropriately secured. Because of this, IoT devices provide an entry point for hackers to gain access to a home or company network."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h2 class=\"wp-block-heading\"><strong>10 Ways to Protect Yourself from Cyber Threats<\/strong><\/h2>","content":"10 maneiras de se proteger contra amea\u00e7as cibern\u00e9ticas","data":[],"style":{"align":"left","parent_style":{},"header":"h2","fontSize":"27px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg\" alt=\"illustration of computer screen with death skull\" class=\"wp-image-38284\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg","alt":"illustration of computer screen with death skull","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg","linkDestination":"media"},"style":{"width":1024,"height":768,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>Although the threats are real and imminent, you can take steps to protect yourself and your business. Following are 10 of the best things you can do to ward off cyberattacks.<\/p>","content":[{"type":"text","data":"Although the threats are real and imminent, you can take steps to protect yourself and your business. Following are 10 of the best things you can do to ward off cyberattacks."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Make cybersecurity a top priority<\/h3>","content":"Fa\u00e7a da seguran\u00e7a cibern\u00e9tica uma prioridade m\u00e1xima","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>This is the simplest yet most effective thing you can do to <a href=\"https:\/\/memberpress.com\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">protect yourself and your business<\/a>. Be aware of the cyberattacks you're most vulnerable to, and take specific steps to avoid them. <\/p>","content":[{"type":"text","data":"This is the simplest yet most effective thing you can do to <a href=\"https:\/\/memberpress.com\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">protect yourself and your business<\/a>. Be aware of the cyberattacks you're most vulnerable to, and take specific steps to avoid them. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>If you run an online business, your best bet is to purchase a <a href=\"https:\/\/www.idstrong.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">high quality monitoring service<\/a> that can keep a close eye on things and resolve any issues that arise before they become catastrophic events.<\/p>","content":[{"type":"text","data":"If you run an online business, your best bet is to purchase a <a href=\"https:\/\/www.idstrong.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">high quality monitoring service<\/a> that can keep a close eye on things and resolve any issues that arise before they become catastrophic events."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Update with security patches<\/h3>","content":"Atualiza\u00e7\u00e3o com patches de seguran\u00e7a","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg\" alt=\"illustration of a handsome man using laptop and being watched\" class=\"wp-image-38276\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg","alt":"illustration of a handsome man using laptop and being watched","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg","linkDestination":"media"},"style":{"width":1024,"height":768,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>Make sure you keep all your systems, hardware, and software updated with the latest security patches. <\/p>","content":[{"type":"text","data":"Make sure you keep all your systems, hardware, and software updated with the latest security patches. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>This is one of the most important reasons to <strong>renew your software licenses annually<\/strong>. For the vast majority of plugins and software, license renewal pays for important things like security patch development and implementation.<\/p>","content":[{"type":"text","data":"This is one of the most important reasons to <strong>renew your software licenses annually<\/strong>. For the vast majority of plugins and software, license renewal pays for important things like security patch development and implementation."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Train your team<\/h3>","content":"Treine sua equipe","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Make sure your staff understands the way phishing attacks and social engineering work. Then make sure they know how to respond in the event your business is attacked.<\/p>","content":[{"type":"text","data":"Make sure your staff understands the way phishing attacks and social engineering work. Then make sure they know how to respond in the event your business is attacked."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Consider holding a company-wide workshop or purchasing an online course for your team. For example, Coursera offers an excellent and affordable <a href=\"https:\/\/www.coursera.org\/learn\/ibm-cyber-threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">cyber threat intelligence course<\/a>.<\/p>","content":[{"type":"text","data":"Consider holding a company-wide workshop or purchasing an online course for your team. For example, Coursera offers an excellent and affordable <a href=\"https:\/\/www.coursera.org\/learn\/ibm-cyber-threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">cyber threat intelligence course<\/a>."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Don't click links<\/h3>","content":"N\u00e3o clique em links","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg\" alt=\"illustration of hacker in the dark\" class=\"wp-image-38280\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg","alt":"illustration of hacker in the dark","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg","linkDestination":"media"},"style":{"width":703,"height":497,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>While the majority of email and SMS links are legitimate, it's <em>extremely difficult<\/em> to tell the difference between real and phishing links. <\/p>","content":[{"type":"text","data":"While the majority of email and SMS links are legitimate, it's <em>extremely difficult<\/em> to tell the difference between real and phishing links. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Therefore, you should make it a habit to <strong>never click a link or download an attachment in an email or SMS message<\/strong>. Instead, visit the URL directly. Just type the address into your browser, and you should be able to see whether the link is honest.<\/p>","content":[{"type":"text","data":"Therefore, you should make it a habit to <strong>never click a link or download an attachment in an email or SMS message<\/strong>. Instead, visit the URL directly. Just type the address into your browser, and you should be able to see whether the link is honest."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Check out your sender<\/h3>","content":"Verifique seu remetente","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Always verify the sender of your emails before taking any action. You can do this by:<\/p>","content":[{"type":"text","data":"Always verify the sender of your emails before taking any action. You can do this by:"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/list","render":"<ol class=\"wp-block-list\"><li>Checking the from email for misspellings<\/li><li>Verifying whether the address and display name are they same (they should be)<\/li><\/ol>","content":"<ol class=\"wp-block-list\"><li>Verifica\u00e7\u00e3o de erros ortogr\u00e1ficos no e-mail de origem<\/li><li>Verificar se o endere\u00e7o e o nome de exibi\u00e7\u00e3o s\u00e3o os mesmos (deveriam ser)<\/li><\/ol>","data":{"listType":"ordered"},"style":{"parent_style":{}}},{"type":"core\/paragraph","render":"<p>You can also check out the sender's DMARC record. Fraudmarc has a <a href=\"https:\/\/fraudmarc.com\/dmarc-check\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DMARC Record Check tool<\/a> that's free to use. <\/p>","content":[{"type":"text","data":"You can also check out the sender's DMARC record. Fraudmarc has a <a href=\"https:\/\/fraudmarc.com\/dmarc-check\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DMARC Record Check tool<\/a> that's free to use. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Update your devices<\/h3>","content":"Atualize seus dispositivos","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Consider installing plugins, extensions, and apps to keep your devices updated with the latest antivirus\/anti-malware software.<\/p>","content":[{"type":"text","data":"Consider installing plugins, extensions, and apps to keep your devices updated with the latest antivirus\/anti-malware software."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>There are all kinds of tools out there, many of which are free to use. Check out PCmag's 2022 <a href=\"https:\/\/www.pcmag.com\/picks\/the-best-free-antivirus-protection\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">list of free antivirus software here<\/a>.<\/p>","content":[{"type":"text","data":"There are all kinds of tools out there, many of which are free to use. Check out PCmag's 2022 <a href=\"https:\/\/www.pcmag.com\/picks\/the-best-free-antivirus-protection\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">list of free antivirus software here<\/a>."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Get serious about your passwords<\/h3>","content":"Leve suas senhas a s\u00e9rio","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg\" alt=\"cell phone sign in screen with fish hook\" class=\"wp-image-38277\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg","alt":"cell phone sign in screen with fish hook","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg","linkDestination":"media"},"style":{"width":1024,"height":768,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>Implement strong password requirements and procedures like <strong>two-factor authentication<\/strong>. If possible, move to <strong>biometrics <\/strong>like fingerprint logins, and away from passwords altogether. <\/p>","content":[{"type":"text","data":"Implement strong password requirements and procedures like <strong>two-factor authentication<\/strong>. If possible, move to <strong>biometrics <\/strong>like fingerprint logins, and away from passwords altogether. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p><strong>And never, ever reuse passwords.<\/strong><\/p>","content":[{"type":"text","data":"<strong>And never, ever reuse passwords.<\/strong>"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Backup your data<\/h3>","content":"Fa\u00e7a backup de seus dados","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>In case of a ransomware attack, make sure you have a solid backup of all your data. And <strong>store your backups offsite<\/strong>. Following are several WordPress backup plugins we recommend:<\/p>","content":[{"type":"text","data":"In case of a ransomware attack, make sure you have a solid backup of all your data. And <strong>store your backups offsite<\/strong>. Following are several WordPress backup plugins we recommend:"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/list","render":"<ul class=\"wp-block-list\"><li><a href=\"https:\/\/memberpress.com\/go\/wptimecapsule\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">WP Time Capsule<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/backupbuddy\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BackupBuddy<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/blogvault\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BlogVault<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/jetpack\/main\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"Jetpack\">Jetpack<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/wpstaging\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"WP Staging\">WP Staging<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/updraft\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">UpdraftPlus<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/stagecoach\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">WP Stagecoach<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/duplicator\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">Duplicator Pro<\/a> (by Snapcreek)<\/li><\/ul>","content":"<ul class=\"wp-block-list\"><li><a href=\"https:\/\/memberpress.com\/go\/wptimecapsule\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">C\u00e1psula do tempo do WP<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/backupbuddy\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BackupBuddy<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/blogvault\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BlogVault<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/jetpack\/main\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"Jetpack\">Jetpack<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/wpstaging\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"Prepara\u00e7\u00e3o do WP\">Prepara\u00e7\u00e3o do WP<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/updraft\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">UpdraftPlus<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/stagecoach\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">WP Stagecoach<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/duplicator\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">Duplicador Pro<\/a> (por Snapcreek)<\/li><\/ul>","data":{"listType":"unordered"},"style":{"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Avoid unsecured networks<\/h3>","content":"Evite redes n\u00e3o seguras","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Ideally, you should always <strong>use a virtual private network (VPN)<\/strong> when connecting with public networks. A VPN sets up an encrypted, private connection between your device and the public network. <\/p>","content":[{"type":"text","data":"Ideally, you should always <strong>use a virtual private network (VPN)<\/strong> when connecting with public networks. A VPN sets up an encrypted, private connection between your device and the public network. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>It's a good practice to avoid unsecured public networks in general.<\/p>","content":[{"type":"text","data":"It's a good practice to avoid unsecured public networks in general."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Encrypt your data<\/h3>","content":"Criptografe seus dados","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg\" alt=\"\" class=\"wp-image-38286\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg","linkDestination":"media"},"style":{"width":1024,"height":768,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>You should encrypt all the data in your systems and on your devices. Data encryption helps protect your private and sensitive information. It also makes the communication between client apps and servers much more secure. <\/p>","content":[{"type":"text","data":"You should encrypt all the data in your systems and on your devices. Data encryption helps protect your private and sensitive information. It also makes the communication between client apps and servers much more secure. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>When your data is encrypted, even if unauthorized people or entities get their hands on your data, they'll be unable to read it.<\/p>","content":[{"type":"text","data":"When your data is encrypted, even if unauthorized people or entities get their hands on your data, they'll be unable to read it."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h2 class=\"wp-block-heading\">Conclusion<\/h2>","content":"Conclus\u00e3o","data":[],"style":{"align":"left","parent_style":{},"header":"h2","fontSize":"27px"}},{"type":"core\/paragraph","render":"<p>So much of our personal information is readily available online, and there are always cyber risks to worry about. <\/p>","content":[{"type":"text","data":"So much of our personal information is readily available online, and there are always cyber risks to worry about. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Make cybersecurity one of your main priorities to protect your online business and your entire digital world.&nbsp;<\/p>","content":[{"type":"text","data":"Make cybersecurity one of your main priorities to protect your online business and your entire digital world.&nbsp;"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p><strong>If you liked this article, be sure to <\/strong><a href=\"https:\/\/memberpress.com\/subscribe-to-the-memberpress-blog\/\"><strong>subscribe to the MemberPress blog<\/strong><\/a><strong>!<\/strong><\/p>","content":[{"type":"text","data":"<strong>If you liked this article, be sure to <\/strong><a href=\"https:\/\/memberpress.com\/subscribe-to-the-memberpress-blog\/\"><strong>subscribe to the MemberPress blog<\/strong><\/a><strong>!<\/strong>"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}}],"app_access":{"can_access":true,"restrict_message":null},"_links":{"self":[{"href":"https:\/\/memberpress.com\/pt\/wp-json\/wp\/v2\/posts\/35601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/memberpress.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/memberpress.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/memberpress.com\/pt\/wp-json\/wp\/v2\/users\/63703"}],"replies":[{"embeddable":true,"href":"https:\/\/memberpress.com\/pt\/wp-json\/wp\/v2\/comments?post=35601"}],"version-history":[{"count":0,"href":"https:\/\/memberpress.com\/pt\/wp-json\/wp\/v2\/posts\/35601\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/memberpress.com\/pt\/wp-json\/wp\/v2\/media\/38289"}],"wp:attachment":[{"href":"https:\/\/memberpress.com\/pt\/wp-json\/wp\/v2\/media?parent=35601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/memberpress.com\/pt\/wp-json\/wp\/v2\/categories?post=35601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/memberpress.com\/pt\/wp-json\/wp\/v2\/tags?post=35601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}