{"id":2452,"date":"2026-01-29T10:11:54","date_gmt":"2026-01-29T13:11:54","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2452"},"modified":"2026-01-29T10:11:54","modified_gmt":"2026-01-29T13:11:54","slug":"responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/","title":{"rendered":"Responsabilidades do CISO e Import\u00e2ncia da Conscientiza\u00e7\u00e3o para Combater Engenharia Social e Ataques de Phishing"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">No atual cen\u00e1rio de ciberseguran\u00e7a, as empresas enfrentam uma amea\u00e7a crescente de ataques cibern\u00e9ticos, especialmente por meio de engenharia social e phishing. Segundo o relat\u00f3rio da ESET, que abrange o primeiro semestre de 2022, 44% das empresas j\u00e1 sofreram ataques de phishing, com um aumento de 226% em compara\u00e7\u00e3o com o \u00faltimo semestre de 2021.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Identificar, avaliar e mitigar riscos de seguran\u00e7a s\u00e3o tarefas cruciais do CISO (Chief Information Security Officer), um executivo de alto n\u00edvel respons\u00e1vel por estabelecer e manter a estrat\u00e9gia de seguran\u00e7a da informa\u00e7\u00e3o de uma organiza\u00e7\u00e3o. Isso envolve analisar vulnerabilidades e amea\u00e7as, fornecer treinamento adequado aos funcion\u00e1rios para fortalecer a resili\u00eancia contra esses ataques e implementar medidas de prote\u00e7\u00e3o adequadas, como firewalls, antiv\u00edrus e detec\u00e7\u00e3o de intrus\u00f5es.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Qualquer colaborador de qualquer empresa pode ser v\u00edtima de um ataque cibern\u00e9tico. Um relat\u00f3rio chamado \"State of the CISO\", conduzido a pedido da Salt pela Global Surveyz, revelou que 89% dos CISOS entrevistados consideram que o r\u00e1pido crescimento da economia digital introduziu riscos de seguran\u00e7a imprevistos em suas organiza\u00e7\u00f5es. A transforma\u00e7\u00e3o digital trouxe consigo novas amea\u00e7as e preocupa\u00e7\u00f5es que as empresas devem levar em considera\u00e7\u00e3o para manter a seguran\u00e7a de seus neg\u00f3cios.\u00a0<\/span><\/p>\n<h2><b>Combatendo engenharia social e phishing com conscientiza\u00e7\u00e3o<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\u00c9 importante contar com excelentes solu\u00e7\u00f5es de seguran\u00e7a, mas tamb\u00e9m cuidar da capacidade dos colaboradores de evitar ataques bem-sucedidos. O CISO desempenha um papel fundamental na conscientiza\u00e7\u00e3o e treinamento dos funcion\u00e1rios em rela\u00e7\u00e3o \u00e0 engenharia social e aos ataques de phishing. Esses tipos de ataques exploram a natureza humana, enganando os usu\u00e1rios para obter acesso n\u00e3o autorizado a sistemas e informa\u00e7\u00f5es confidenciais.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Considere o seguinte exemplo: o atacante seleciona um alvo, que pode ser uma pessoa espec\u00edfica ou uma organiza\u00e7\u00e3o. Em seguida, coleta informa\u00e7\u00f5es sobre o\nalvo, como endere\u00e7os de e-mail e nomes de funcion\u00e1rios, para tornar o ataque mais convincente. O atacante cria um e-mail que se parece com uma comunica\u00e7\u00e3o leg\u00edtima de uma fonte confi\u00e1vel. Por exemplo, ele se passar pelo l\u00edder da \u00e1rea financeira da empresa, enviando aos colaboradores um pedido de um relat\u00f3rio que deve ser entregue com urg\u00eancia e com um modelo anexado. O e-mail, em vez de ser enviado por \"maria.sillas@...\", \u00e9 enviado por \"maria.slllas@...\". Esse exemplo simples, baseado em senso de urg\u00eancia e hierarquia, pode enganar um colaborador prestativo que n\u00e3o percebe a troca de letras. As consequ\u00eancias de um ataque de phishing bem-sucedido podem incluir perdas financeiras, comprometimento de informa\u00e7\u00f5es pessoais ou danos \u00e0 reputa\u00e7\u00e3o. Al\u00e9m disso, as informa\u00e7\u00f5es coletadas podem ser vendidas na dark web ou usadas para outros ataques.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A melhor maneira de se proteger contra esses ataques \u00e9 estar atento a sinais de alerta, como erros de ortografia ou gram\u00e1tica no e-mail, URLs suspeitos, solicita\u00e7\u00f5es urgentes ou informa\u00e7\u00f5es pessoais solicitadas de forma inadequada.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Frente a esse cen\u00e1rio, uma estrat\u00e9gia de prote\u00e7\u00e3o adequada requer um treinamento cont\u00ednuo dos colaboradores em seguran\u00e7a cibern\ufeff\u00e9tica, de modo a criar uma consci\u00eancia coletiva de prote\u00e7\u00e3o de dados para mitigar os riscos.<\/span><\/p>\n<h2><b>Apenas treinar n\u00e3o \u00e9 suficiente. \u00c9 necess\u00e1rio promover a reten\u00e7\u00e3o da informa\u00e7\u00e3o.\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A conscientiza\u00e7\u00e3o e a educa\u00e7\u00e3o s\u00e3o essenciais para criar uma cultura de seguran\u00e7a. Nesse sentido, um programa de treinamento gamificado e cont\u00ednuo mostra-se altamente eficaz em compara\u00e7\u00e3o com um programa de treinamento padr\u00e3o e intermitente. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">\"<em>Ao adotar abordagens l\u00fadicas e envolventes, o treinamento gamificado captura a aten\u00e7\u00e3o dos participantes de forma mais eficaz, estimulando o interesse e a participa\u00e7\u00e3o ativa. Com elementos de jogos, como competi\u00e7\u00e3o, desafios e recompensas, o programa gamificado motiva os funcion\u00e1rios a se envolverem e a aprofundarem seus conhecimentos sobre engenharia social, ataques de phishing, boas pr\u00e1ticas da LGPD, entre outros temas. Isso resulta em uma melhor reten\u00e7\u00e3o de informa\u00e7\u00f5es e fortalece as habilidades pr\u00e1ticas dos participantes<\/em>\" explica Vinicius Perallis, fundador do Hacker Rangers Security Awareness, <\/span><span style=\"font-weight: 400;\">uma plataforma que promove a <a href=\"https:\/\/hackerrangers.siteup.dev\/pt\/gamification\/gamificacao-para-um-negocio-seguro\/\">cultura de ciberseguran\u00e7a corporativa por meio da gamifica\u00e7\u00e3o<\/a>.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Em um mundo cada vez mais conectado, com ataques cada vez mais sofisticados, investir em treinamento e conscientiza\u00e7\u00e3o \u00e9 uma estrat\u00e9gia crucial para proteger ativos e informa\u00e7\u00f5es confidenciais das empresas. Um programa de treinamento gamificado e cont\u00ednuo oferece uma educa\u00e7\u00e3o mais eficaz e sustent\u00e1vel, contribuindo para uma cultura de seguran\u00e7a mais forte e resiliente dentro da organiza\u00e7\u00e3o.\u00a0<\/span><\/p>\n<h2><b>Benef\u00edcios do Treinamento Hacker Rangers para Empresas:\u00a0<\/b><\/h2>\n<p><b>Conscientiza\u00e7\u00e3o dos Funcion\u00e1rios: <\/b><span style=\"font-weight: 400;\">A engenharia social e os ataques de phishing frequentemente se baseiam na manipula\u00e7\u00e3o psicol\u00f3gica dos funcion\u00e1rios. O treinamento ajuda a aumentar a conscientiza\u00e7\u00e3o sobre as t\u00e1ticas utilizadas pelos invasores, capacitando os funcion\u00e1rios a identificar e relatar poss\u00edveis amea\u00e7as.\u00a0<\/span><\/p>\n<p><b>Indicadores de Ataques: <\/b><span style=\"font-weight: 400;\">O treinamento abrange informa\u00e7\u00f5es sobre os sinais de alerta associados \u00e0 engenharia social e aos ataques de phishing. Isso permite que os funcion\u00e1rios identifiquem mensagens suspeitas, links maliciosos, solicita\u00e7\u00f5es de informa\u00e7\u00f5es confidenciais e outras tentativas de manipula\u00e7\u00e3o.<\/span><\/p>\n<p><b>Melhoria da Higiene Digital: <\/b><span style=\"font-weight: 400;\">Al\u00e9m de identificar amea\u00e7as, o treinamento aborda boas pr\u00e1ticas de seguran\u00e7a cibern\u00e9tica, como o uso de senhas fortes, autentica\u00e7\u00e3o multifator, atualiza\u00e7\u00e3o de software e navega\u00e7\u00e3o segura na web. Essas medidas ajudam a reduzir o risco de sucesso dos ataques.\u00a0<\/span><\/p>\n<p><b>Simula\u00e7\u00f5es de Phishing:<\/b><span style=\"font-weight: 400;\"> Uma abordagem eficaz envolve simula\u00e7\u00f5es de phishing, enviando e-mails falsos para os funcion\u00e1rios e monitorando suas respostas. Isso permite identificar \u00e1reas vulner\u00e1veis e fornecer treinamento adicional aos indiv\u00edduos mais suscet\u00edveis.\u00a0<\/span><\/p>\n<p><strong data-start=\"129\" data-end=\"170\">Adequa\u00e7\u00e3o \u00e0 LGPD: <\/strong>A LGPD (Lei Geral de Prote\u00e7\u00e3o de Dados) exige que as empresas protejam as informa\u00e7\u00f5es pessoais dos indiv\u00edduos. Com o Hacker Rangers, sua organiza\u00e7\u00e3o atende aos requisitos da LGPD, demonstrando a\u00e7\u00f5es para educar os funcion\u00e1rios sobre a import\u00e2ncia da prote\u00e7\u00e3o de dados e as melhores pr\u00e1ticas para evitar viola\u00e7\u00f5es de seguran\u00e7a. Esteja em conformidade e combata o crime cibern\u00e9tico com seu ativo mais valioso: seus colaboradores.<\/p>\n<p><a href=\"https:\/\/hackerrangers.siteup.dev\/pt\/\">Agende uma demo e saiba mais sobre a Hacker Rangers<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s cybersecurity landscape, companies face a growing threat from cyberattacks, especially through social engineering and phishing. According to an ESET report, covering the first half of 2022, 44% of companies have already suffered phishing attacks, an increase of 226% compared to the last half of 2021.\u00a0 Identifying, assessing and mitigating security risks are crucial [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2453,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[46],"tags":[66,64,146,92,121],"class_list":["post-2452","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-awareness","tag-awareness","tag-cybersecurity","tag-hacker-rangers","tag-phishing","tag-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Responsibilities of a CISO and the importance of Raising Awareness to Tackle Social Engineering and Phishing Attacks | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Learn how CISOs can reduce phishing and social engineering risks through continuous, gamified security awareness training for employees.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Responsibilities of a CISO and the importance of Raising Awareness to Tackle Social Engineering and Phishing Attacks | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Learn how CISOs can reduce phishing and social engineering risks through continuous, gamified security awareness training for employees.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-29T13:11:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/01\/social-engineering-and-phishing.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Responsibilities of a CISO and the importance of Raising Awareness to Tackle Social Engineering and Phishing Attacks\",\"datePublished\":\"2026-01-29T13:11:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/\"},\"wordCount\":851,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/01\/social-engineering-and-phishing.png\",\"keywords\":[\"awareness\",\"cybersecurity\",\"Hacker Rangers\",\"phishing\",\"social engineering\"],\"articleSection\":[\"Awareness\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/\",\"name\":\"Responsibilities of a CISO and the importance of Raising Awareness to Tackle Social Engineering and Phishing Attacks | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/01\/social-engineering-and-phishing.png\",\"datePublished\":\"2026-01-29T13:11:54+00:00\",\"description\":\"Learn how CISOs can reduce phishing and social engineering risks through continuous, gamified security awareness training for employees.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/01\/social-engineering-and-phishing.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/01\/social-engineering-and-phishing.png\",\"width\":1500,\"height\":1000,\"caption\":\"social engineering and phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Responsibilities of a CISO and the importance of Raising Awareness to Tackle Social Engineering and Phishing Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Responsibilities of a CISO and the importance of Raising Awareness to Tackle Social Engineering and Phishing Attacks | Hacker Rangers","description":"Learn how CISOs can reduce phishing and social engineering risks through continuous, gamified security awareness training for employees.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Responsibilities of a CISO and the importance of Raising Awareness to Tackle Social Engineering and Phishing Attacks | Hacker Rangers","og_description":"Learn how CISOs can reduce phishing and social engineering risks through continuous, gamified security awareness training for employees.","og_url":"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/","og_site_name":"Hacker Rangers","article_published_time":"2026-01-29T13:11:54+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/01\/social-engineering-and-phishing.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Responsibilities of a CISO and the importance of Raising Awareness to Tackle Social Engineering and Phishing Attacks","datePublished":"2026-01-29T13:11:54+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/"},"wordCount":851,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/01\/social-engineering-and-phishing.png","keywords":["awareness","cybersecurity","Hacker Rangers","phishing","social engineering"],"articleSection":["Awareness"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/","url":"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/","name":"Responsibilities of a CISO and the importance of Raising Awareness to Tackle Social Engineering and Phishing Attacks | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/01\/social-engineering-and-phishing.png","datePublished":"2026-01-29T13:11:54+00:00","description":"Learn how CISOs can reduce phishing and social engineering risks through continuous, gamified security awareness training for employees.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/01\/social-engineering-and-phishing.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/01\/social-engineering-and-phishing.png","width":1500,"height":1000,"caption":"social engineering and phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/responsibilities-of-a-ciso-and-the-importance-of-raising-awareness-to-tackle-social-engineering-and-phishing-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Responsibilities of a CISO and the importance of Raising Awareness to Tackle Social Engineering and Phishing Attacks"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/comments?post=2452"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2452\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media\/2453"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media?parent=2452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/categories?post=2452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/tags?post=2452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}