{"id":14148,"date":"2020-09-21T08:59:25","date_gmt":"2020-09-21T11:59:25","guid":{"rendered":"https:\/\/ostec.blog\/?p=14148"},"modified":"2020-10-02T11:25:38","modified_gmt":"2020-10-02T14:25:38","slug":"what-to-learn-from-digital-security-breaches","status":"publish","type":"post","link":"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/","title":{"rendered":"What to learn from other companies\u2019 major catastrophes of digital security breaches"},"content":{"rendered":"<p>There are always those who read about security breaches and cyber attacks and mistakenly perceive this as something far from their reality. The opinion seems to change only after being impacted in some way, through the need to take reactive attitudes to solve the problem. In these circumstances, possibly, the company has already had compromised deliveries, financial impact and even greater damage associated with its brand and reputation. After all, who would like to do business with a \u201cpassive\u201d company when it comes to digital security?<\/p>\n<p>Some studies show that 56% of companies look for security solutions only after they have suffered some type of data breach or compromise. In general, they were victims of unavailability of services, unauthorized transactions or workstations attacked by ransomware \u2013 which is the hijacking of files, whose access is released again only after payment of ransom. It happened in late October with the City Hall of Barrinha, in the interior of S\u00e3o Paulo. City administration computers were blocked, and criminals called for ransom in bitcoins. They even sent an email directing payment with this cryptocurrency. As a result, the payment of 1,000 city hall workers was made late \u2013 and manually. Invoice issues, permits and certificates were also paralyzed for a few days, forcing mayor Maria Em\u00edlia Marcari to declare an emergency situation.<\/p>\n<p>A Brazilian company called Companhia Docas do Estado do Cear\u00e1 (CDC) experienced a similar problem. The institution was the target of a cracker attack in which the data on the servers were encrypted, becoming inaccessible to employees. CDC is a state-owned company that manages the Passenger Maritime Terminal (TMP) of the Port of Fortaleza. According to investigations, the attack had evidence that leads to believe that it was carried out by specialized crackers, far from any amateurism, since the encryption system used is one of the most advanced on the planet, used in several US government agencies. The Federal Police instructed that CDC employees should not contact criminals \u2013 let alone try to negotiate.<\/p>\n<p>Even companies that experience the world of security can be attacked. This is the case of Prosegur, which was invaded by Ryuk ramsonware in late November. With 170,000 employees located in several countries, it is one of the largest suppliers of security cars around the globe. To avoid further damage, it was necessary to shut down the IT department and dismiss the employees. According to the company, this drastic decision was a way out to prevent the virus from spreading to other internal and external systems.<\/p>\n<p>Nonprofit institutions are also at the mercy of attackers. The online encyclopedia Wikipedia was the victim of a distributed denial of service (DDoS) attack that brought down its website in Europe and the Middle East. DDoS is an overhead intentionally caused on a server or computer so that your system\u2019s resources are unavailable to its users. Germany, France and Italy, for example, were some of those affected by the attack \u2013 but at different times. Although Wikipedia guarantees that it constantly strengthens its defenses to prevent such actions, the problem happened and there is no information on the culprits or whether the attack has spread to other regions.<\/p>\n<p>If the situation is worrying abroad, in Brazil the numbers are also alarming. Several independent surveys point to the country as a favorite target, recording millions of attacks a year. News that Brazilian politicians \u2013 such as the Minister of Justice, S\u00e9rgio Moro, and ministers of the Supreme Federal Court (STF) \u2013 had their data invaded were common this year, which turns on the red light on the issue of digital security for everyone living in the country. The solution? Understand that the protection of confidential data must be a daily practice, treated in a professional and preventive manner. How? With the help of companies that are a reference in the industry, with OSTEC, with products and services specialized in digital security to ensure total protection for your results.Visit our website and discover our solutions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are always those who read about security breaches and cyber attacks and mistakenly perceive this as something far from their reality. The opinion seems to change only after being impacted in some way, through the need to take reactive attitudes to solve the problem. In these circumstances, possibly, the company has already had compromised [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":14151,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[984,406],"tags":[1641,1667],"class_list":["post-14148","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-problem-recognition","tag-ransomware-en","tag-sequestro-dados-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What to learn from other companies\u2019 major catastrophes of digital security breaches - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"description\" content=\"There are always those who read about security breaches and cyber attacks and mistakenly perceive this as something far from their reality.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to learn from other companies\u2019 major catastrophes of digital security breaches - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"There are always those who read about security breaches and cyber attacks and mistakenly perceive this as something far from their reality.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-21T11:59:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-02T14:25:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/11\/homem-mascarado.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thais Souza\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/\"},\"author\":{\"name\":\"Thais Souza\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33\"},\"headline\":\"What to learn from other companies\u2019 major catastrophes of digital security breaches\",\"datePublished\":\"2020-09-21T11:59:25+00:00\",\"dateModified\":\"2020-10-02T14:25:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/\"},\"wordCount\":670,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/11\/homem-mascarado.jpg\",\"keywords\":[\"Ransomware\",\"sequestro dados\"],\"articleSection\":[\"General\",\"Problem recognition\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/\",\"url\":\"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/\",\"name\":\"What to learn from other companies\u2019 major catastrophes of digital security breaches - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/11\/homem-mascarado.jpg\",\"datePublished\":\"2020-09-21T11:59:25+00:00\",\"dateModified\":\"2020-10-02T14:25:38+00:00\",\"description\":\"There are always those who read about security breaches and cyber attacks and mistakenly perceive this as something far from their reality.\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/11\/homem-mascarado.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/11\/homem-mascarado.jpg\",\"width\":928,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What to learn from other companies\u2019 major catastrophes of digital security breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33\",\"name\":\"Thais Souza\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g\",\"caption\":\"Thais Souza\"},\"url\":\"https:\/\/ostec.blog\/en\/author\/thais-souza\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What to learn from other companies\u2019 major catastrophes of digital security breaches - OSTEC | Seguran\u00e7a digital de resultados","description":"There are always those who read about security breaches and cyber attacks and mistakenly perceive this as something far from their reality.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/","og_locale":"en_US","og_type":"article","og_title":"What to learn from other companies\u2019 major catastrophes of digital security breaches - OSTEC | Seguran\u00e7a digital de resultados","og_description":"There are always those who read about security breaches and cyber attacks and mistakenly perceive this as something far from their reality.","og_url":"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2020-09-21T11:59:25+00:00","article_modified_time":"2020-10-02T14:25:38+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/11\/homem-mascarado.jpg","type":"image\/jpeg"}],"author":"Thais Souza","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/"},"author":{"name":"Thais Souza","@id":"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33"},"headline":"What to learn from other companies\u2019 major catastrophes of digital security breaches","datePublished":"2020-09-21T11:59:25+00:00","dateModified":"2020-10-02T14:25:38+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/"},"wordCount":670,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/11\/homem-mascarado.jpg","keywords":["Ransomware","sequestro dados"],"articleSection":["General","Problem recognition"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/","url":"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/","name":"What to learn from other companies\u2019 major catastrophes of digital security breaches - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/11\/homem-mascarado.jpg","datePublished":"2020-09-21T11:59:25+00:00","dateModified":"2020-10-02T14:25:38+00:00","description":"There are always those who read about security breaches and cyber attacks and mistakenly perceive this as something far from their reality.","breadcrumb":{"@id":"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/11\/homem-mascarado.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/11\/homem-mascarado.jpg","width":928,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/en\/problem-recognition\/what-to-learn-from-digital-security-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/en\/"},{"@type":"ListItem","position":2,"name":"What to learn from other companies\u2019 major catastrophes of digital security breaches"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33","name":"Thais Souza","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g","caption":"Thais Souza"},"url":"https:\/\/ostec.blog\/en\/author\/thais-souza\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/14148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/comments?post=14148"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/14148\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media\/14151"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media?parent=14148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/categories?post=14148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/tags?post=14148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}