Downloadable Materials - ISH Tecnologia

knowledge

Downloadable Materials

ISH

main cyber vulnerabilities exploited in 2023

We point out the main vulnerabilities exploited and the number of ransomware attacks in 2023.

ISH

connected children and ai: protecting the next generation

We have prepared material with valuable tips on how to guide the new generations to live with artificial intelligence.

ISH

The end of passwords: Towards a passwordless future

We've prepared material with important insights into biometric authentication and other alternatives to keep you safe.

ISH

BIANNUAL VULNERABILITY REPORT

We point out critical vulnerabilities and the most dangerous ransomware groups of 2023.

ISH

How to establish sound security policies and practices

We list 10 steps to establish sound cybersecurity policies and practices in your company.

ISH

CYBERSECURITY GUIDE FOR YOUR CHILDREN

We have prepared a cybersecurity guide that will help you learn ways to make your digital experience safer.

ISH

Ransomware: What to do during an attack?

We list 10 practical lessons on how to act to minimize the damage of an attack on your company.

ISH

Ransomware: What to do before an attack?

We list 7 practical lessons on how to prepare within your organization for a possible attack.

ISH

CHECK OUT THE TOP 15 VULNERABILITIES OF 2022

We list the top vulnerabilities exploited in cyber attacks in 2022.

ISH

ATTACKS ON THE
SUPPLY CHAIN

Understand why supply chains are currently the fastest growing attack surface in enterprises.

ISH

BIANNUAL VULNERABILITY REPORT

We point out the five most dangerous Ransomware groups in the first half of 2022.

ISH

PROTECTING DIGITAL INFORMATION

We have prepared a checklist for evaluating strategies and implementing efficient data protection in the company.

ISH

CYBERSECURITY MANUAL
ON A DAILY BASIS

Understand cyber scams and know what steps to take for an efficient security posture.

ISH

CYBERSECURITY HANDBOOK FOR EXECUTIVES

Executives are more likely to suffer cyber attacks. Understand in detail how to protect sensitive information.

ISH

ISH Alert -
Passwordstealer

Ongoing campaign of massive credential theft via spear phishing. Learn how to mitigate these threats.

ISH

ISH Alert -
Microsoft Exchange

Active exploitation of vulnerabilities in products. Microsoft Exchange Server. Understand the updates in this material.

ISH

The evolution of security
in the SOC

Understand the important role of the SOC (Security Operations Center) in the growth of companies.

ISH

Am I being
attacked?

Understand where to start the analysis in the company and what detection strategies to adopt.

ISH

Understanding
the enemy

A quick guide to ransomware, the hijacking of data, and why businesses are at risk.

ISH

ISH Alert -
Trickbot

Ongoing phishing campaign using Trickbot, a sophisticated trojan. Find out more details in the material.

Downloadable Materials