Latest news

Shadow IT risks and prevention
Cybersecurity

Shadow IT: risks and prevention

Have you ever heard of the term “shadow IT” or “invisible IT”? It refers to the indiscriminate use of devices, applications, and platforms that have not been authorized to be used for professional purposes by the IT department. This is an old problem, but one that is becoming increasingly common and difficult to contain – […]

Read article
blockchain scams and frauds
Cybersecurity

Safe? Maybe not so much! Learn about blockchain scams and frauds

As the pillar that supports everything from the classic Bitcoin to all the latest crypto economy “inventions” (common tokens, non-fungible tokens, and even other cryptocurrencies), blockchain technology has always been seen as a true web revolution. It works like a ledger, facilitating the immutable registration of transactions and asset control in a given business network, […]

Read article
metaverse
Cybersecurity

Metaverse: Experts’ concerns over privacy threats

There’s no denying that the metaverse is one of the most promising technological trends of recent years. Although the concept seems quite complex, the idea of literally being inserted into a fully virtual environment to consume content, collaborate and interact with other people is finally shifting closer toward reality. However, it’s not all roses, and […]

Read article
man in the middle attack
Cybersecurity

Understanding the classic and dangerous man-in-the-middle attack

It’s no news that cybercriminals invent new tricks and tactics daily to attain their sinister objectives: to harm unprotected Internet users by stealing personal data, sensitive documents, and often even money. But this doesn’t mean that old scams no longer work. Certain techniques have existed for over a decade and are still highly efficient and […]

Read article
security settings for social networks
Awareness

5 security settings for social networks

Have you stopped to think about how many social networks you’re on? It’s probably more than three, even if you’re not active on all of them. They’re really useful in connecting you to people and content you like. However, we simply cannot feign ignorance of the risks involved in careless network use when it comes […]

Read article
HR cybersecurity
Awareness

Why does cybersecurity need to be a priority for HR?

Do you, as a human resources manager, need to care about your company’s cybersecurity? The answer is yes! And there are plenty of reasons for it.  In a scenario where digital threats are constantly evolving, a cybersecurity awareness program is essential to protect the company’s assets and make sure business is not interrupted. HR’s role […]

Read article
HR cybersecurity awareness programs
Awareness

The role of HR in cybersecurity awareness programs

At many organizations, implementing a cybersecurity awareness program comes from the information technology (IT) department or the team responsible for corporate security. But teaching best security practices and keeping employees informed about threats is ultimately a human issue – and that means Human Resources has a lot to contribute. Research suggests that more than 90% […]

Read article
CFO cybersecurity awareness program
Awareness

Why should a CFO support a cybersecurity awareness program?

A cybersecurity awareness program is designed to broaden employees’ views on the risks involving information and communication technology (ICT) assets. Although the main supporters of this type of program are usually information security professionals, the truth is that almost all departments can benefit from this awareness. In the case of Chief Financial Officers (CFOs), the […]

Read article
password managers
Cybersecurity

Password managers and why we should use them

We access our e-mail, social networks, and banking applications as a routine part of daily life. But, do you know what all these services have in common? They’re protected by passwords that we need to choose and keep.  But remembering all the sequences of characters we use is no easy task. To simplify things, some […]

Read article
newsletter

Receba as
novidades em
seu email

    Mission accomplished!

    You'll receive new cybersecurity updates in your inbox weekly.

    Follow us on our social media:

    Instagram: @hackerrangers2
    LinkedIn: linkedin.com/company/hacker-rangers22