{"id":32582,"date":"2025-05-21T04:57:54","date_gmt":"2025-05-21T08:57:54","guid":{"rendered":"https:\/\/www.suprabt.com\/?p=32582"},"modified":"2026-04-18T11:30:55","modified_gmt":"2026-04-18T15:30:55","slug":"phishing-o-que-e-e-como-proteger-sua-empresa","status":"publish","type":"post","link":"https:\/\/www.suprabt.com\/pt-br\/blog\/phishing-o-que-e-e-como-proteger-sua-empresa\/","title":{"rendered":"Phishing: o que \u00e9 e como proteger sua empresa?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_enable_image=&#8221;off&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_fullwidth_slider _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_enable_image=&#8221;off&#8221; height=&#8221;500px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_slide _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.suprabt.com\/wp-content\/uploads\/2025\/05\/phishing-como-protegerse.jpg&#8221; background_enable_image=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; sticky_transition=&#8221;on&#8221;][\/et_pb_slide][\/et_pb_fullwidth_slider][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.4&#8243; background_image=&#8221;https:\/\/www.suprabt.com\/wp-content\/uploads\/2023\/10\/Fondo16-1.png&#8221; background_position=&#8221;top_center&#8221; background_vertical_offset=&#8221;22%&#8221; max_width=&#8221;100%&#8221; max_width_tablet=&#8221;100%&#8221; max_width_phone=&#8221;100%&#8221; max_width_last_edited=&#8221;on|desktop&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;0px|40px||40px|false|true&#8221; custom_padding_tablet=&#8221;|0px||0px|false|true&#8221; custom_padding_phone=&#8221;|0px||0px|false|true&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; transform_translate=&#8221;0px|-60px&#8221; transform_translate_linked=&#8221;off&#8221; custom_css_main_element=&#8221;max-width: 60% !important;&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;max-width: 100% !important;&#8221; custom_css_main_element_phone=&#8221;max-width: 100% !important;&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|800|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;40px&#8221; header_text_color_tablet=&#8221;&#8221; header_text_color_phone=&#8221;&#8221; header_text_color_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><span lang=\"ES-AR\" style=\"font-family: 'Arial',sans-serif;\">Phishing: o que \u00e9 e como proteger sua empresa?<o:p><\/o:p><\/span><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; module_alignment=&#8221;center&#8221; custom_css_main_element=&#8221;max-width: 60% !important;&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|tablet&#8221; custom_css_main_element_tablet=&#8221;max-width: 100% !important;&#8221; custom_css_main_element_phone=&#8221;max-width: 100% !important;&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; text_font=&#8221;Montserrat||||||||&#8221; header_font=&#8221;Montserrat|800|||||||&#8221; header_2_font=&#8221;|800|||||||&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; header_text_color_tablet=&#8221;&#8221; header_text_color_phone=&#8221;&#8221; header_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;&#8221; header_2_text_color_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><strong>O phishing afeta tanto os indiv\u00edduos quanto as organiza\u00e7\u00f5es, causando riscos significativos \u00e0 seguran\u00e7a<\/strong>. Entender como o phishing funciona \u00e9 essencial para proteger nossos dados pessoais e relacionados ao trabalho. <\/p>\n<p>A sofistica\u00e7\u00e3o desses ataques aumentou com o tempo, tornando mais necess\u00e1rio do que nunca estar alerta e ciente das diferentes estrat\u00e9gias que os fraudadores usam para cometer seus crimes.<\/p>\n<p>De acordo com um estudo realizado pela <span><a href=\"https:\/\/www.cyberark.com\/resources\/ebooks\/cyberark-2023-identity-security-threat-landscape-report\" target=\"_blank\" rel=\"noopener\">CyberArk<\/a><\/span> <strong>entre mais de 1.300 profissionais de TI, 56% das empresas identificaram o phishing como o maior risco para sua seguran\u00e7a cibern\u00e9tica<\/strong>. Portanto, estar ciente das recomenda\u00e7\u00f5es para evitar o phishing \u00e9 essencial na era digital de hoje. <\/p>\n<p>Neste artigo, vamos dizer <strong>o que \u00e9 phishing, quais s\u00e3o os tipos existentes, como evit\u00e1-lo e o que fazer se o senhor tiver sido v\u00edtima de um ataque. <\/strong>Tamb\u00e9m fornecemos <strong>um guia gratuito para download <\/strong>que explica cada uma das etapas que o senhor precisa seguir para garantir que sua organiza\u00e7\u00e3o tenha implementado o DMARC corretamente.<\/p>\n<h2>O que \u00e9 phishing?<\/h2>\n<p>Phishing <strong>\u00e9 um m\u00e9todo de ataque a computadores que visa obter informa\u00e7\u00f5es confidenciais, inclusive senhas e dados financeiros.<\/strong><\/p>\n<p>Os ataques <strong>podem assumir v\u00e1rias formas<\/strong>, desde e-mails at\u00e9 mensagens de texto.<\/p>\n<p>Os invasores enviam e-mails fingindo ser de entidades leg\u00edtimas, como institui\u00e7\u00f5es banc\u00e1rias ou plataformas digitais, para enganar as pessoas e obter seus dados pessoais.<\/p>\n<p><strong>Esse tipo de ataque \u00e9 baseado em engenharia social, uma estrat\u00e9gia que explora a confian\u00e7a e o interesse natural das pessoas.<\/strong><\/p>\n<p>Um exemplo comum \u00e9 um e-mail que inclui um link que parece ser genu\u00edno, mas que, na verdade, leva a uma p\u00e1gina fraudulenta criada para coletar informa\u00e7\u00f5es da v\u00edtima.<\/p>\n<p>Um aspecto alarmante \u00e9 que <span><a href=\"https:\/\/keepnetlabs.com\/blog\/top-phishing-statistics-and-trends-you-must-know\" target=\"_blank\" rel=\"noopener\">80% dos incidentes de seguran\u00e7a relatados s\u00e3o causados por phishing, o que ressalta a import\u00e2ncia de estar atento a esse risco. <\/a><\/span>Isso ressalta a import\u00e2ncia de estarmos atentos a esse risco.<\/p>\n<h2>Phishing e o mundo dos neg\u00f3cios<\/h2>\n<p>A amea\u00e7a do phishing assumiu um car\u00e1ter alarmante no ambiente de neg\u00f3cios, afetando tanto as pequenas quanto as grandes organiza\u00e7\u00f5es. Detectar e evitar esses ataques \u00e9 fundamental para proteger a seguran\u00e7a e a integridade dos dados corporativos. <\/p>\n<p>Os avan\u00e7os na tecnologia levaram a um aumento no n\u00famero e na complexidade dos ataques de phishing. De acordo com o <span><a href=\"https:\/\/slashnext.com\/press-release\/slashnext-mid-year-state-of-phishing-report-shows-341-increase-in-bec-and-advanced-phishing-attacks\/\" target=\"_blank\" rel=\"noopener\">SlashNext<\/a><\/span> <strong>o volume total de ataques de phishing disparou 4.151% desde o advento do ChatGPT em 2022<\/strong>. <\/p>\n<h3>Impacto do phishing nas organiza\u00e7\u00f5es<\/h3>\n<p>As consequ\u00eancias do phishing s\u00e3o profundas e podem gerar uma s\u00e9rie de danos graves \u00e0s empresas.<\/p>\n<p><strong>O roubo de informa\u00e7\u00f5es confidenciais pode comprometer a seguran\u00e7a financeira de uma organiza\u00e7\u00e3o<\/strong> <strong>e afetar a confian\u00e7a do cliente.<\/strong> <\/p>\n<p>Al\u00e9m disso, <strong>um ataque bem-sucedido pode levar \u00e0 interrup\u00e7\u00e3o das opera\u00e7\u00f5es<\/strong>, prejudicando a produtividade da empresa.<\/p>\n<p>Nesse sentido, ter ferramentas tecnol\u00f3gicas como o <span><a href=\"https:\/\/www.suprabt.com\/pt-br\/protecao-cibernetica\/\">Cyber Protect<\/a><\/span> pode ajudar consideravelmente a reduzir os riscos aos quais uma organiza\u00e7\u00e3o pode estar exposta e a mitigar os poss\u00edveis efeitos indesejados de um ataque.<\/p>\n<h3>Programas e workshops de treinamento em seguran\u00e7a cibern\u00e9tica<\/h3>\n<p>Cientes dos riscos, <strong>muitas empresas est\u00e3o adotando uma abordagem proativa para combater o phishing por meio de programas de treinamento e conscientiza\u00e7\u00e3o<\/strong>.<\/p>\n<p>Educar os funcion\u00e1rios sobre as estrat\u00e9gias empregadas pelos criminosos cibern\u00e9ticos \u00e9 essencial para evitar ataques bem-sucedidos.<\/p>\n<p>Isso \u00e9 particularmente relevante, pois, de acordo com o Verizon 2024 <span><a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener\">Relat\u00f3rio de risco de seguran\u00e7a cibern\u00e9tica da Verizon 2024 <\/a><\/span><strong>o fator humano est\u00e1 presente em 68% das viola\u00e7\u00f5es de seguran\u00e7a.<\/strong><\/p>\n<p>Como resultado, a implementa\u00e7\u00e3o de workshops sobre seguran\u00e7a cibern\u00e9tica tornou-se uma pr\u00e1tica comum.  <strong>Esses treinamentos permitem que os funcion\u00e1rios reconhe\u00e7am as v\u00e1rias estrat\u00e9gias empregadas pelos criminosos cibern\u00e9ticos.<\/strong><\/p>\n<p>Por meio de ataques simulados de phishing, o objetivo \u00e9 melhorar a capacidade de resposta dos funcion\u00e1rios e sua habilidade de identificar e-mails ou comunica\u00e7\u00f5es suspeitas.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_fullwidth_slider _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_slide _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.suprabt.com\/wp-content\/uploads\/2025\/05\/phishing.jpg&#8221; background_enable_image=&#8221;on&#8221; parallax=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; sticky_transition=&#8221;on&#8221;][\/et_pb_slide][\/et_pb_fullwidth_slider][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.4&#8243; background_image=&#8221;https:\/\/www.suprabt.com\/wp-content\/uploads\/2023\/08\/Fondo14-4.png&#8221; background_position=&#8221;bottom_center&#8221; background_vertical_offset=&#8221;70%&#8221; max_width=&#8221;100%&#8221; max_width_tablet=&#8221;100%&#8221; max_width_phone=&#8221;100%&#8221; max_width_last_edited=&#8221;on|desktop&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;|40px||40px|false|true&#8221; custom_padding_tablet=&#8221;|0px||0px|false|true&#8221; custom_padding_phone=&#8221;|0px||0px|false|true&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; module_alignment=&#8221;center&#8221; custom_css_main_element=&#8221;max-width: 60% !important;&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|tablet&#8221; custom_css_main_element_tablet=&#8221;max-width: 100% !important;&#8221; custom_css_main_element_phone=&#8221;max-width: 100% !important;&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; text_font=&#8221;Montserrat||||||||&#8221; header_font=&#8221;Montserrat|800|||||||&#8221; header_2_font=&#8221;|800|||||||&#8221; header_3_font=&#8221;|700|||||||&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Pol\u00edticas de seguran\u00e7a dos funcion\u00e1rios<\/h3>\n<p>O estabelecimento de pol\u00edticas de seguran\u00e7a eficazes \u00e9 essencial para reduzir o risco de ataques de phishing.<\/p>\n<p>Essas pol\u00edticas <strong>devem incluir diretrizes claras sobre como os funcion\u00e1rios devem lidar com informa\u00e7\u00f5es confidenciais e como reagir a e-mails ou liga\u00e7\u00f5es solicitando dados confidenciais.<\/strong><\/p>\n<p>Eles tamb\u00e9m devem abordar a import\u00e2ncia do uso de senhas fortes e a ado\u00e7\u00e3o da autentica\u00e7\u00e3o multifatorial.<\/p>\n<h2>Como funciona o phishing?<\/h2>\n<p><strong>O mecanismo de phishing \u00e9 simples em sua execu\u00e7\u00e3o, mas altamente eficaz<\/strong>. Os atacantes parecem ser de empresas respeit\u00e1veis ou confi\u00e1veis. <\/p>\n<p>Suas mensagens geralmente incluem elementos como:<\/p>\n<ul>\n<li><strong>Urg\u00eancia:<\/strong> mensagens que induzem a v\u00edtima a tomar decis\u00f5es precipitadas.<\/li>\n<li><strong>Pr\u00eamios e incentivos enganosos:<\/strong> ofertas de pr\u00eamios que s\u00e3o atraentes demais para serem reais.<\/li>\n<li><strong>Links enganosos:<\/strong> links que levam a p\u00e1ginas falsas projetadas para se parecerem com p\u00e1ginas leg\u00edtimas.<\/li>\n<\/ul>\n<p>Quando as v\u00edtimas acessam esses links, elas s\u00e3o redirecionadas para sites que parecem ser leg\u00edtimos, onde s\u00e3o solicitadas a fornecer informa\u00e7\u00f5es confidenciais. Depois de inserir seus dados, os invasores os coletam e os utilizam para seus pr\u00f3prios fins. <\/p>\n<p>Al\u00e9m disso, <strong>o uso de malware \u00e9 comum em muitos ataques de phishing<\/strong>, em que os criminosos cibern\u00e9ticos podem instalar software mal-intencionado no dispositivo da v\u00edtima sem que ela perceba.<\/p>\n<h2>Quais s\u00e3o os tipos de phishing?<\/h2>\n<p>Existem <strong>v\u00e1rias formas de phishing<\/strong>, cada uma com caracter\u00edsticas e t\u00e9cnicas espec\u00edficas. Entre as mais comuns est\u00e3o: <\/p>\n<ul>\n<li><strong>Vishing:<\/strong> ataques que usam chamadas telef\u00f4nicas para obter informa\u00e7\u00f5es.<\/li>\n<li><strong>Smishing:<\/strong> mensagens de texto criadas para enganar as v\u00edtimas e faz\u00ea-las acessar seus dados pessoais.<\/li>\n<li><strong>QRishing:<\/strong> uso de c\u00f3digos QR falsos que, quando escaneados, levam a sites fraudulentos.<\/li>\n<li><strong>Spear phishing:<\/strong> ataques direcionados a indiv\u00edduos ou empresas espec\u00edficas, geralmente adaptados para maximizar seu impacto.<\/li>\n<\/ul>\n<p>Cada forma de phishing emprega t\u00e9cnicas espec\u00edficas, mas todas t\u00eam o mesmo objetivo: induzir <strong>a v\u00edtima a fornecer dados confidenciais<\/strong>.<\/p>\n<h2>Como evitar o phishing?<\/h2>\n<p><strong>Evitar o phishing<\/strong> <strong>requer conhecimento e ferramentas tecnol\u00f3gicas<\/strong>. Veja a seguir algumas recomenda\u00e7\u00f5es para se defender contra esse tipo de amea\u00e7a: <\/p>\n<ul>\n<li><strong>Sempre verifique os remetentes:<\/strong> n\u00e3o confie cegamente em e-mails, mesmo que eles pare\u00e7am vir de fontes conhecidas.<\/li>\n<li><strong>Evite clicar em links duvidosos: <\/strong>se um link parecer suspeito, \u00e9 melhor n\u00e3o acess\u00e1-lo.<\/li>\n<li><strong>Use software de seguran\u00e7a:<\/strong> instale e mantenha atualizados aplicativos de seguran\u00e7a capazes de identificar e bloquear ataques de phishing.<\/li>\n<li><strong>Treine os funcion\u00e1rios:<\/strong> \u00e9 fundamental que o treinamento sobre como identificar tentativas de phishing seja realizado no ambiente de trabalho.<\/li>\n<li><strong>Desconfie de mensagens que solicitem informa\u00e7\u00f5es confidenciais<\/strong>: nenhuma empresa leg\u00edtima solicitar\u00e1 dados confidenciais por correio ou mensagem de texto.<\/li>\n<\/ul>\n<p>A ado\u00e7\u00e3o dessas medidas ajuda a proteger indiv\u00edduos e organiza\u00e7\u00f5es contra tentativas de phishing.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_fullwidth_slider use_bg_overlay=&#8221;off&#8221; use_text_overlay=&#8221;off&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_slide _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.suprabt.com\/wp-content\/uploads\/2025\/05\/como-evitar-el-phishing.jpg&#8221; background_enable_image=&#8221;on&#8221; parallax=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; sticky_transition=&#8221;on&#8221;][\/et_pb_slide][\/et_pb_fullwidth_slider][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.4&#8243; max_width=&#8221;100%&#8221; max_width_tablet=&#8221;100%&#8221; max_width_phone=&#8221;100%&#8221; max_width_last_edited=&#8221;on|desktop&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;|40px||40px|false|true&#8221; custom_padding_tablet=&#8221;|0px||0px|false|true&#8221; custom_padding_phone=&#8221;|0px||0px|false|true&#8221; da_disable_devices=&#8221;off|off|off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; module_alignment=&#8221;center&#8221; custom_css_main_element=&#8221;max-width: 60% !important;&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;max-width: 100% !important;&#8221; custom_css_main_element_phone=&#8221;max-width: 100% !important;&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; text_font=&#8221;Montserrat||||||||&#8221; header_font=&#8221;Montserrat|800|||||||&#8221; header_2_font=&#8221;|800|||||||&#8221; header_3_font=&#8221;|700|||||||&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Autentica\u00e7\u00e3o multifator e DMARC<\/h2>\n<p>A implementa\u00e7\u00e3o de medidas de seguran\u00e7a adicionais \u00e9 fundamental para fortalecer a prote\u00e7\u00e3o contra ataques de phishing.<\/p>\n<p>T\u00e9cnicas como a autentica\u00e7\u00e3o multifator e o protocolo DMARC s\u00e3o exemplos eficazes.<\/p>\n<h3>Benef\u00edcios da autentica\u00e7\u00e3o multifatorial<\/h3>\n<p>A autentica\u00e7\u00e3o multifatorial <strong>acrescenta um n\u00edvel extra de seguran\u00e7a ao exigir mais do que apenas uma senha para acessar as contas<\/strong>. Esse m\u00e9todo geralmente inclui: <\/p>\n<ul>\n<li>Algo que o senhor sabe, como uma senha.<\/li>\n<li>Algo que o senhor possui, como um telefone celular que recebe um c\u00f3digo de verifica\u00e7\u00e3o.<\/li>\n<li>Algo que \u00e9 uma caracter\u00edstica inerente ao senhor, como a identifica\u00e7\u00e3o por meio de reconhecimento facial.<\/li>\n<\/ul>\n<p><strong>Essa abordagem reduz significativamente a probabilidade de acesso n\u00e3o autorizado<\/strong>, pois o invasor precisaria de v\u00e1rios elementos para comprometer uma conta.<\/p>\n<h3>Implementa\u00e7\u00e3o do protocolo DMARC<\/h3>\n<p><strong>O DMARC<\/strong> (Domain-based Message Authentication, Reporting &amp; Conformance) <strong>\u00e9 uma solu\u00e7\u00e3o tecnol\u00f3gica projetada para combater o phishing, ajudando as organiza\u00e7\u00f5es a estabelecer pol\u00edticas de autentica\u00e7\u00e3o de mensagens.<\/strong><\/p>\n<p>Seus benef\u00edcios incluem:<\/p>\n<ul>\n<li>Melhorar a prote\u00e7\u00e3o de dom\u00ednios de e-mail contra spoofing.<\/li>\n<li>Permitir que as organiza\u00e7\u00f5es recebam relat\u00f3rios de tentativas de phishing direcionadas a seus dom\u00ednios.<\/li>\n<li>Refor\u00e7ar a seguran\u00e7a e a credibilidade das mensagens eletr\u00f4nicas enviadas pela empresa.<\/li>\n<\/ul>\n<p>A implementa\u00e7\u00e3o do DMARC representa uma etapa importante para a cria\u00e7\u00e3o de um ambiente digital mais protegido, beneficiando tanto as pessoas quanto as empresas.<\/p>\n<h2>Autentica\u00e7\u00e3o de e-mail<\/h2>\n<p>A autentica\u00e7\u00e3o de e-mail <strong>usa m\u00e9todos como SPF e DKIM para garantir que as mensagens sejam provenientes de remetentes aut\u00eanticos <\/strong>e n\u00e3o tenham sido adulteradas no processo de envio.<\/p>\n<ul>\n<li><strong>O SPF (Sender Policy Framework) <\/strong>permite que os propriet\u00e1rios de dom\u00ednios definam e especifiquem quais servidores est\u00e3o autorizados a enviar e-mails em seu nome, ajudando a evitar falsifica\u00e7\u00f5es.<\/li>\n<li><strong>O DKIM (DomainKeys Identified Mail)<\/strong> adiciona uma assinatura digital ao e-mail para garantir que a mensagem n\u00e3o foi modificada e que vem de um remetente leg\u00edtimo.<\/li>\n<\/ul>\n<p>Esses m\u00e9todos tornam mais dif\u00edcil para os invasores enviarem e-mails falsos, reduzindo o risco de phishing e fraude comercial.<\/p>\n<h2>Reputa\u00e7\u00e3o do dom\u00ednio<\/h2>\n<p>Garantir a seguran\u00e7a e a confiabilidade de um dom\u00ednio \u00e9 essencial para que os e-mails cheguem \u00e0 caixa de entrada e evitem ser classificados como spam.<\/p>\n<p><strong>Uma boa reputa\u00e7\u00e3o de dom\u00ednio gera confian\u00e7a nos servidores de e-mail e nos usu\u00e1rios<\/strong>, melhorando as taxas de entrega e a percep\u00e7\u00e3o da marca.<\/p>\n<p>Se o dom\u00ednio for considerado n\u00e3o confi\u00e1vel ou estiver na lista negra, as mensagens ser\u00e3o bloqueadas ou enviadas automaticamente para a pasta de spam.<\/p>\n<p>Portanto, <strong>cuidar da reputa\u00e7\u00e3o do dom\u00ednio \u00e9 fundamental para evitar fraudes e garantir uma comunica\u00e7\u00e3o comercial bem-sucedida.<\/strong><\/p>\n<h2>Solu\u00e7\u00f5es de seguran\u00e7a cibern\u00e9tica empresarial<\/h2>\n<p>Para as organiza\u00e7\u00f5es, <strong>a aloca\u00e7\u00e3o de recursos para ferramentas de seguran\u00e7a de TI \u00e9 indispens\u00e1vel<\/strong>. A prote\u00e7\u00e3o de dados confidenciais e da infraestrutura tecnol\u00f3gica exige o uso de sistemas robustos para detectar e atenuar ataques de phishing. <\/p>\n<p>As empresas podem optar por tecnologias que incluem monitoramento de rede, auditorias de seguran\u00e7a e treinamento cont\u00ednuo para a equipe, promovendo um ambiente mais seguro para suas atividades digitais.<\/p>\n<p>Ter o apoio de um dos principais <span><a href=\"https:\/\/www.suprabt.com\/pt-br\/seguranca-cibernetica\/\">fornecedor l\u00edder de servi\u00e7os de seguran\u00e7a cibern\u00e9tica, como a SupraBT<\/a><\/span> como a SupraBT, \u00e9 essencial para garantir a prote\u00e7\u00e3o efetiva de uma empresa.<\/p>\n<h2>Conclus\u00e3o: phishing, um s\u00e9rio problema de seguran\u00e7a para empresas e PMEs<\/h2>\n<p>O phishing <strong>\u00e9 um problema s\u00e9rio do qual todas as empresas e PMEs devem estar cientes<\/strong>, pois pode causar muitos danos.<\/p>\n<p><strong>Saber o que \u00e9 phishing, como ele funciona e quais medidas o senhor pode tomar para se proteger reduz consideravelmente o risco de se tornar uma v\u00edtima.<\/strong><\/p>\n<p>Contar com os servi\u00e7os de uma empresa especializada em seguran\u00e7a cibern\u00e9tica pode oferecer prote\u00e7\u00e3o adicional contra essas amea\u00e7as.<\/p>\n<p>A SupraBT \u00e9 uma <span><a href=\"https:\/\/www.suprabt.com\/pt-br\/\">empresa de servi\u00e7os e solu\u00e7\u00f5es tecnol\u00f3gicas na Am\u00e9rica Latina e nos Estados Unidos.<\/a><\/span> A SupraBT est\u00e1 pronta para ajudar o senhor a alcan\u00e7ar o sucesso, cuidando da seguran\u00e7a do seu projeto.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#da6923&#8243; da_disable_devices=&#8221;off|off|off&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_fullwidth_slider use_bg_overlay=&#8221;off&#8221; use_text_overlay=&#8221;off&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Montserrat||||||||&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;50px||50px||true|false&#8221; custom_padding_tablet=&#8221;50px||50px||true|false&#8221; custom_padding_phone=&#8221;50px||50px||true|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_slide heading=&#8221;O senhor deseja proteger sua empresa contra poss\u00edveis vulnerabilidades de seguran\u00e7a cibern\u00e9tica?&#8221; button_text=&#8221;Entre em contato conosco pelo&#8221; button_link=&#8221;https:\/\/www.suprabt.com\/pt-br\/contate-nos\/&#8221; url_new_window=&#8221;on&#8221; use_bg_overlay=&#8221;off&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;gcid-6bf6df40-4cc1-4b18-87f4-ef442a075ad6&#8243; background_enable_color=&#8221;on&#8221; background_enable_image=&#8221;off&#8221; background_position=&#8221;center_right&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{%22gcid-6bf6df40-4cc1-4b18-87f4-ef442a075ad6%22:%91%22background_color%22%93}&#8221; sticky_transition=&#8221;on&#8221;][\/et_pb_slide][\/et_pb_fullwidth_slider][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.27.4&#8243; background_color=&#8221;gcid-27b42f4e-8815-402d-9de4-4f06578f892c&#8221; max_width=&#8221;100%&#8221; max_width_tablet=&#8221;100%&#8221; max_width_phone=&#8221;100%&#8221; max_width_last_edited=&#8221;on|desktop&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;|40px||40px|false|true&#8221; custom_padding_tablet=&#8221;|0px||0px|false|true&#8221; custom_padding_phone=&#8221;|0px||0px|false|true&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{%22gcid-27b42f4e-8815-402d-9de4-4f06578f892c%22:%91%22background_color%22%93}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; module_alignment=&#8221;center&#8221; custom_css_main_element=&#8221;max-width: 60% !important;&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|tablet&#8221; custom_css_main_element_tablet=&#8221;max-width: 100% !important;&#8221; custom_css_main_element_phone=&#8221;max-width: 100% !important;&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; text_font=&#8221;Montserrat||||||||&#8221; header_font=&#8221;Montserrat||||||||&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><em>Fontes consultadas:<\/em><\/h3>\n<p>CyberArk (2023). <em>Relat\u00f3rio CyberArk 2023 Identity Security Threat Landscape Report<\/em>. Recuperado de: <a href=\"https:\/\/www.cyberark.com\/resources\/ebooks\/cyberark-2023-identity-security-threat-landscape-report\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cyberark.com\/resources\/ebooks\/cyberark-2023-identity-security-threat-landscape-report<\/a>  <\/p>\n<p>Keepnet Labs (14 de outubro de 2024). <em>As 40 principais estat\u00edsticas e tend\u00eancias de phishing que o senhor deve conhecer em 2025<\/em>. Recuperado de: <a href=\"https:\/\/keepnetlabs.com\/blog\/top-phishing-statistics-and-trends-you-must-know\" target=\"_blank\" rel=\"noopener\">https:\/\/keepnetlabs.com\/blog\/top-phishing-statistics-and-trends-you-must-know<\/a>  <\/p>\n<p>Prey (29 de novembro de 2021). <em>What is Phishing and How to Prevent It (O que \u00e9 phishing e como evit\u00e1-lo<\/em>). Recuperado de: <a href=\"https:\/\/preyproject.com\/blog\/what-is-phishing-and-spear-phishing\" target=\"_blank\" rel=\"noopener\">https:\/\/preyproject.com\/blog\/what-is-phishing-and-spear-phishing<\/a>  <\/p>\n<p>SlashNext (22 de maio de 2024). <em>SlashNext Mid-Year State of Phishing Report mostra um aumento de 341% em ataques de BEC e phishing avan\u00e7ado<\/em>. Recuperado de: <a href=\"https:\/\/slashnext.com\/press-release\/slashnext-mid-year-state-of-phishing-report-shows-341-increase-in-bec-and-advanced-phishing-attacks\/\" target=\"_blank\" rel=\"noopener\">https:\/\/slashnext.com\/press-release\/slashnext-mid-year-state-of-phishing-report-shows-341-increase-in-bec-and-advanced-phishing-attacks\/<\/a>  <\/p>\n<p>Verizon (s.d.). <em>2025 Data Breach Investigations Report (Relat\u00f3rio de Investiga\u00e7\u00f5es de Viola\u00e7\u00e3o de Dados 2025<\/em>). Recuperado de: <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/<\/a>  <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Popup &#8211; #Descargar&#8221; module_id=&#8221;Baixar&#8221; module_class=&#8221;popup on-exit&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.suprabt.com\/wp-content\/uploads\/2025\/08\/phishing.dmarc-03-01.png&#8221; da_is_popup=&#8221;on&#8221; da_popup_slug=&#8221;Descargar&#8221; da_exit_intent=&#8221;on&#8221; da_disable_devices=&#8221;off|off|off&#8221; border_radii=&#8221;on|22px|22px|22px|22px&#8221; locked=&#8221;off&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;gcid-27b42f4e-8815-402d-9de4-4f06578f892c&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_type=&#8221;circular&#8221; background_color_gradient_direction_radial=&#8221;bottom&#8221; background_color_gradient_stops=&#8221;gcid-19358e46-be59-48f8-897d-357071a08a8b 0%|#0b6ec4 100%&#8221; width=&#8221;70%&#8221; border_radii=&#8221;on|15px|15px|15px|15px&#8221; border_color_all=&#8221;gcid-27b42f4e-8815-402d-9de4-4f06578f892c&#8221; global_colors_info=&#8221;{%22gcid-27b42f4e-8815-402d-9de4-4f06578f892c%22:%91%22background_color%22,%22border_color_all%22%93,%22gcid-heading-color%22:%91%22background_color_gradient_stops%22%93,%22gcid-secondary-color%22:%91%22background_color_gradient_stops%22%93,%22gcid-857b0164-f8f9-4919-b5c9-3c416d12eca7%22:%91%22background_color_gradient_stops%22%93,%22gcid-19358e46-be59-48f8-897d-357071a08a8b%22:%91%22background_color_gradient_stops%22%93}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_contact_form title=&#8221;Orienta\u00e7\u00e3o para melhorar a seguran\u00e7a de e-mail em sua organiza\u00e7\u00e3o com DMARC&#8221; use_redirect=&#8221;on&#8221; redirect_url=&#8221;https:\/\/www.suprabt.com\/wp-content\/uploads\/2025\/08\/vmc-dmarc-guide-white-label.pdf&#8221; success_message=&#8221;Obrigado pelo seu interesse no guia DMARC!&#8221; submit_button_text=&#8221;Download gratuito&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; _unique_id=&#8221;96ee8fed-d63b-471b-9d9f-01b2bd0fc2d2&#8243; form_field_background_color=&#8221;#FFFFFF&#8221; form_field_text_color=&#8221;gcid-body-color&#8221; title_font=&#8221;&#8211;et_global_body_font||||||||&#8221; title_text_align=&#8221;center&#8221; title_text_color=&#8221;#FFFFFF&#8221; captcha_font=&#8221;&#8211;et_global_body_font||||||||&#8221; captcha_text_color=&#8221;#FFFFFF&#8221; form_field_font=&#8221;&#8211;et_global_body_font||||||||&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_border_color=&#8221;#FFFFFF&#8221; button_border_radius=&#8221;15px&#8221; button_font=&#8221;&#8211;et_global_body_font||||||||&#8221; button_icon=&#8221;&#x45;||divi||400&#8243; text_orientation=&#8221;left&#8221; width=&#8221;75%&#8221; module_alignment=&#8221;center&#8221; border_radii=&#8221;on|15px|15px|15px|15px&#8221; global_colors_info=&#8221;{%22gcid-body-color%22:%91%22form_field_text_color%22%93}&#8221;][et_pb_contact_field field_id=&#8221;Nombre_y_Apellido&#8221; field_title=&#8221;Nome e sobrenome&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Correo_electr\u00f3nico&#8221; field_title=&#8221;Endere\u00e7o eletr\u00f4nico&#8221; field_type=&#8221;email&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;N\u00famero_de_tel\u00e9fono&#8221; field_title=&#8221;N\u00famero de telefone&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; custom_padding=&#8221;||0px|||&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; admin_label=&#8221;Rodap\u00e9 PT 2024&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;81%&#8221; custom_padding=&#8221;||0px|||&#8221; global_module=&#8221;4439&#8243; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][dsm_icon_list _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Montserrat||||||||&#8221; custom_margin=&#8221;50px||||false|false&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][dsm_icon_list_child text=&#8221;Blog&#8221; use_icon=&#8221;off&#8221; url=&#8221;https:\/\/www.suprabt.com\/pt-br\/blog\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Montserrat||||||||&#8221; text_text_color=&#8221;gcid-0ce24988-dd73-40d8-a453-5849719920e7&#8243; text_font_size=&#8221;12px&#8221; global_colors_info=&#8221;{%22gcid-0ce24988-dd73-40d8-a453-5849719920e7%22:%91%22text_text_color%22%93}&#8221;][\/dsm_icon_list_child][dsm_icon_list_child text=&#8221;Imprensa&#8221; use_icon=&#8221;off&#8221; url=&#8221;https:\/\/www.suprabt.com\/pt-br\/impresa\/&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Montserrat||||||||&#8221; text_text_color=&#8221;gcid-0ce24988-dd73-40d8-a453-5849719920e7&#8243; text_font_size=&#8221;12px&#8221; global_colors_info=&#8221;{%22gcid-0ce24988-dd73-40d8-a453-5849719920e7%22:%91%22text_text_color%22%93}&#8221;][\/dsm_icon_list_child][dsm_icon_list_child text=&#8221;Vagas&#8221; use_icon=&#8221;off&#8221; url=&#8221;https:\/\/www.linkedin.com\/company\/suprabt&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Montserrat||||||||&#8221; text_text_color=&#8221;gcid-0ce24988-dd73-40d8-a453-5849719920e7&#8243; text_font_size=&#8221;12px&#8221; global_colors_info=&#8221;{%22gcid-0ce24988-dd73-40d8-a453-5849719920e7%22:%91%22text_text_color%22%93}&#8221;][\/dsm_icon_list_child][dsm_icon_list_child text=&#8221; Responsabilidade Social Corporativa&#8221; use_icon=&#8221;off&#8221; url=&#8221;https:\/\/www.suprabt.com\/pt-br\/responsabilidade-social-corporativa\/&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Montserrat||||||||&#8221; text_text_color=&#8221;gcid-0ce24988-dd73-40d8-a453-5849719920e7&#8243; text_font_size=&#8221;12px&#8221; global_colors_info=&#8221;{%22gcid-0ce24988-dd73-40d8-a453-5849719920e7%22:%91%22text_text_color%22%93}&#8221;][\/dsm_icon_list_child][dsm_icon_list_child text=&#8221;Termos de uso &#8221; use_icon=&#8221;off&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Montserrat||||||||&#8221; text_text_color=&#8221;gcid-0ce24988-dd73-40d8-a453-5849719920e7&#8243; text_font_size=&#8221;12px&#8221; global_colors_info=&#8221;{%22gcid-0ce24988-dd73-40d8-a453-5849719920e7%22:%91%22text_text_color%22%93}&#8221;][\/dsm_icon_list_child][dsm_icon_list_child text=&#8221;Pol\u00edtica de privacidade&#8221; use_icon=&#8221;off&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Montserrat||||||||&#8221; text_text_color=&#8221;gcid-0ce24988-dd73-40d8-a453-5849719920e7&#8243; text_font_size=&#8221;12px&#8221; global_colors_info=&#8221;{%22gcid-0ce24988-dd73-40d8-a453-5849719920e7%22:%91%22text_text_color%22%93}&#8221;][\/dsm_icon_list_child][\/dsm_icon_list][et_pb_social_media_follow _builder_version=&#8221;4.16.1&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|1067px|1067px|1067px|1067px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_social_media_follow_network social_network=&#8221;facebook&#8221; url=&#8221;https:\/\/www.facebook.com\/SupraBT\/?locale=es_LA&#8221; icon_color=&#8221;#FFFFFF&#8221; _builder_version=&#8221;4.16.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#ff903d&#8221; background_enable_color=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]facebook[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8221;twitter&#8221; url=&#8221;https:\/\/twitter.com\/SupraBT&#8221; icon_color=&#8221;#FFFFFF&#8221; _builder_version=&#8221;4.16.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#ff903d&#8221; background_enable_color=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]twitter[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8221;linkedin&#8221; url=&#8221;https:\/\/ve.linkedin.com\/company\/suprabt&#8221; icon_color=&#8221;#FFFFFF&#8221; _builder_version=&#8221;4.16.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#ff903d&#8221; background_enable_color=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]linkedin[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8221;instagram&#8221; url=&#8221;https:\/\/www.instagram.com\/suprabtlatam\/?hl=es&#8221; icon_color=&#8221;#FFFFFF&#8221; _builder_version=&#8221;4.16.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#ff903d&#8221; background_enable_color=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]instagram[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Montserrat|300|||||||&#8221; text_font_size=&#8221;14px&#8221; width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.suprabt.com\/wp-content\/uploads\/2023\/06\/Logo-SupraBT-e1696803666841-300x60.png\" width=\"165\" height=\"33\" alt=\"\" class=\"wp-image-3296 alignnone size-medium\"><\/p>\n<p style=\"text-align: justify\"><span style=\"font-weight: 400\">A SupraBT \u00e9 uma empresa que fornece produtos e servi\u00e7os tecnol\u00f3gicos de vanguarda, comprometida com os objetivos de seus clientes, projetando solu\u00e7\u00f5es que atendam \u00e0s suas necessidades, seguindo metodologias certificadas, contando com a tecnologia mais avan\u00e7ada de seus parceiros e alcan\u00e7ando processos de neg\u00f3cios otimizados para atingir as expectativas desejadas.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>O phishing afeta tanto os indiv\u00edduos quanto as organiza\u00e7\u00f5es, causando riscos significativos \u00e0 seguran\u00e7a. \u00c9 essencial entender como o phishing funciona. <\/p>\n","protected":false},"author":9,"featured_media":32518,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[26],"tags":[],"class_list":["post-32582","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nao-categorizado"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing: o que \u00e9 e como proteger sua empresa? | SupraBT<\/title>\n<meta name=\"description\" content=\"Saiba o que \u00e9 PHISHING e como PROTEGER sua empresa desse perigoso ataque cibern\u00e9tico \u2714\ufe0f Aprenda as melhores dicas para evit\u00e1-lo!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.suprabt.com\/pt-br\/blog\/phishing-o-que-e-e-como-proteger-sua-empresa\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing: o que \u00e9 e como proteger sua empresa? | SupraBT\" \/>\n<meta property=\"og:description\" content=\"Saiba o que \u00e9 PHISHING e como PROTEGER sua empresa desse perigoso ataque cibern\u00e9tico \u2714\ufe0f Aprenda as melhores dicas para evit\u00e1-lo!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.suprabt.com\/pt-br\/blog\/phishing-o-que-e-e-como-proteger-sua-empresa\/\" \/>\n<meta property=\"og:site_name\" content=\"SupraBT\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-21T08:57:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-18T15:30:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.suprabt.com\/wp-content\/uploads\/2025\/05\/phishing-como-protegerse.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gabriela Mata\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gabriela Mata\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/blog\\\/phishing-o-que-e-e-como-proteger-sua-empresa\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/blog\\\/phishing-o-que-e-e-como-proteger-sua-empresa\\\/\"},\"author\":{\"name\":\"Gabriela Mata\",\"@id\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/5e0cfd66bc35c73ea79d0ebb30cf2b2c\"},\"headline\":\"Phishing: o que \u00e9 e como proteger sua empresa?\",\"datePublished\":\"2025-05-21T08:57:54+00:00\",\"dateModified\":\"2026-04-18T15:30:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/blog\\\/phishing-o-que-e-e-como-proteger-sua-empresa\\\/\"},\"wordCount\":5158,\"image\":{\"@id\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/blog\\\/phishing-o-que-e-e-como-proteger-sua-empresa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.suprabt.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/phishing-como-protegerse.jpg\",\"articleSection\":[\"N\u00e3o categorizado\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/blog\\\/phishing-o-que-e-e-como-proteger-sua-empresa\\\/\",\"url\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/blog\\\/phishing-o-que-e-e-como-proteger-sua-empresa\\\/\",\"name\":\"Phishing: o que \u00e9 e como proteger sua empresa? | SupraBT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/blog\\\/phishing-o-que-e-e-como-proteger-sua-empresa\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/blog\\\/phishing-o-que-e-e-como-proteger-sua-empresa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.suprabt.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/phishing-como-protegerse.jpg\",\"datePublished\":\"2025-05-21T08:57:54+00:00\",\"dateModified\":\"2026-04-18T15:30:55+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/5e0cfd66bc35c73ea79d0ebb30cf2b2c\"},\"description\":\"Saiba o que \u00e9 PHISHING e como PROTEGER sua empresa desse perigoso ataque cibern\u00e9tico \u2714\ufe0f Aprenda as melhores dicas para evit\u00e1-lo!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/blog\\\/phishing-o-que-e-e-como-proteger-sua-empresa\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/blog\\\/phishing-o-que-e-e-como-proteger-sua-empresa\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/blog\\\/phishing-o-que-e-e-como-proteger-sua-empresa\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.suprabt.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/phishing-como-protegerse.jpg\",\"contentUrl\":\"https:\\\/\\\/www.suprabt.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/phishing-como-protegerse.jpg\",\"width\":2000,\"height\":1333,\"caption\":\"Phishing y c\u00f3mo protegerse. Photo by John Schnobrich on Unsplash\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/blog\\\/phishing-o-que-e-e-como-proteger-sua-empresa\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.suprabt.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing: o que \u00e9 e como proteger sua empresa?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/\",\"name\":\"SupraBT\",\"description\":\"Information Technology and Business Services for Latin America\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/5e0cfd66bc35c73ea79d0ebb30cf2b2c\",\"name\":\"Gabriela Mata\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8eb042a51e3c6080e2ea577ad2ace457dd5c4b4e1432574590db4af8b1148519?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8eb042a51e3c6080e2ea577ad2ace457dd5c4b4e1432574590db4af8b1148519?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8eb042a51e3c6080e2ea577ad2ace457dd5c4b4e1432574590db4af8b1148519?s=96&d=mm&r=g\",\"caption\":\"Gabriela Mata\"},\"url\":\"https:\\\/\\\/www.suprabt.com\\\/pt-br\\\/author\\\/gm_diconsul\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing: o que \u00e9 e como proteger sua empresa? | SupraBT","description":"Saiba o que \u00e9 PHISHING e como PROTEGER sua empresa desse perigoso ataque cibern\u00e9tico \u2714\ufe0f Aprenda as melhores dicas para evit\u00e1-lo!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.suprabt.com\/pt-br\/blog\/phishing-o-que-e-e-como-proteger-sua-empresa\/","og_locale":"pt_BR","og_type":"article","og_title":"Phishing: o que \u00e9 e como proteger sua empresa? | SupraBT","og_description":"Saiba o que \u00e9 PHISHING e como PROTEGER sua empresa desse perigoso ataque cibern\u00e9tico \u2714\ufe0f Aprenda as melhores dicas para evit\u00e1-lo!","og_url":"https:\/\/www.suprabt.com\/pt-br\/blog\/phishing-o-que-e-e-como-proteger-sua-empresa\/","og_site_name":"SupraBT","article_published_time":"2025-05-21T08:57:54+00:00","article_modified_time":"2026-04-18T15:30:55+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/www.suprabt.com\/wp-content\/uploads\/2025\/05\/phishing-como-protegerse.jpg","type":"image\/jpeg"}],"author":"Gabriela Mata","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Gabriela Mata","Est. tempo de leitura":"10 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.suprabt.com\/pt-br\/blog\/phishing-o-que-e-e-como-proteger-sua-empresa\/#article","isPartOf":{"@id":"https:\/\/www.suprabt.com\/pt-br\/blog\/phishing-o-que-e-e-como-proteger-sua-empresa\/"},"author":{"name":"Gabriela Mata","@id":"https:\/\/www.suprabt.com\/pt-br\/#\/schema\/person\/5e0cfd66bc35c73ea79d0ebb30cf2b2c"},"headline":"Phishing: o que \u00e9 e como proteger sua empresa?","datePublished":"2025-05-21T08:57:54+00:00","dateModified":"2026-04-18T15:30:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.suprabt.com\/pt-br\/blog\/phishing-o-que-e-e-como-proteger-sua-empresa\/"},"wordCount":5158,"image":{"@id":"https:\/\/www.suprabt.com\/pt-br\/blog\/phishing-o-que-e-e-como-proteger-sua-empresa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.suprabt.com\/wp-content\/uploads\/2025\/05\/phishing-como-protegerse.jpg","articleSection":["N\u00e3o categorizado"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.suprabt.com\/pt-br\/blog\/phishing-o-que-e-e-como-proteger-sua-empresa\/","url":"https:\/\/www.suprabt.com\/pt-br\/blog\/phishing-o-que-e-e-como-proteger-sua-empresa\/","name":"Phishing: o que \u00e9 e como proteger sua empresa? | SupraBT","isPartOf":{"@id":"https:\/\/www.suprabt.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.suprabt.com\/pt-br\/blog\/phishing-o-que-e-e-como-proteger-sua-empresa\/#primaryimage"},"image":{"@id":"https:\/\/www.suprabt.com\/pt-br\/blog\/phishing-o-que-e-e-como-proteger-sua-empresa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.suprabt.com\/wp-content\/uploads\/2025\/05\/phishing-como-protegerse.jpg","datePublished":"2025-05-21T08:57:54+00:00","dateModified":"2026-04-18T15:30:55+00:00","author":{"@id":"https:\/\/www.suprabt.com\/pt-br\/#\/schema\/person\/5e0cfd66bc35c73ea79d0ebb30cf2b2c"},"description":"Saiba o que \u00e9 PHISHING e como PROTEGER sua empresa desse perigoso ataque cibern\u00e9tico \u2714\ufe0f Aprenda as melhores dicas para evit\u00e1-lo!","breadcrumb":{"@id":"https:\/\/www.suprabt.com\/pt-br\/blog\/phishing-o-que-e-e-como-proteger-sua-empresa\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.suprabt.com\/pt-br\/blog\/phishing-o-que-e-e-como-proteger-sua-empresa\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.suprabt.com\/pt-br\/blog\/phishing-o-que-e-e-como-proteger-sua-empresa\/#primaryimage","url":"https:\/\/www.suprabt.com\/wp-content\/uploads\/2025\/05\/phishing-como-protegerse.jpg","contentUrl":"https:\/\/www.suprabt.com\/wp-content\/uploads\/2025\/05\/phishing-como-protegerse.jpg","width":2000,"height":1333,"caption":"Phishing y c\u00f3mo protegerse. Photo by John Schnobrich on Unsplash"},{"@type":"BreadcrumbList","@id":"https:\/\/www.suprabt.com\/pt-br\/blog\/phishing-o-que-e-e-como-proteger-sua-empresa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.suprabt.com\/"},{"@type":"ListItem","position":2,"name":"Phishing: o que \u00e9 e como proteger sua empresa?"}]},{"@type":"WebSite","@id":"https:\/\/www.suprabt.com\/pt-br\/#website","url":"https:\/\/www.suprabt.com\/pt-br\/","name":"SupraBT","description":"Information Technology and Business Services for Latin America","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.suprabt.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Person","@id":"https:\/\/www.suprabt.com\/pt-br\/#\/schema\/person\/5e0cfd66bc35c73ea79d0ebb30cf2b2c","name":"Gabriela Mata","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/8eb042a51e3c6080e2ea577ad2ace457dd5c4b4e1432574590db4af8b1148519?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8eb042a51e3c6080e2ea577ad2ace457dd5c4b4e1432574590db4af8b1148519?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8eb042a51e3c6080e2ea577ad2ace457dd5c4b4e1432574590db4af8b1148519?s=96&d=mm&r=g","caption":"Gabriela Mata"},"url":"https:\/\/www.suprabt.com\/pt-br\/author\/gm_diconsul\/"}]}},"_links":{"self":[{"href":"https:\/\/www.suprabt.com\/pt-br\/wp-json\/wp\/v2\/posts\/32582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.suprabt.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.suprabt.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.suprabt.com\/pt-br\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.suprabt.com\/pt-br\/wp-json\/wp\/v2\/comments?post=32582"}],"version-history":[{"count":33,"href":"https:\/\/www.suprabt.com\/pt-br\/wp-json\/wp\/v2\/posts\/32582\/revisions"}],"predecessor-version":[{"id":34611,"href":"https:\/\/www.suprabt.com\/pt-br\/wp-json\/wp\/v2\/posts\/32582\/revisions\/34611"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.suprabt.com\/pt-br\/wp-json\/wp\/v2\/media\/32518"}],"wp:attachment":[{"href":"https:\/\/www.suprabt.com\/pt-br\/wp-json\/wp\/v2\/media?parent=32582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.suprabt.com\/pt-br\/wp-json\/wp\/v2\/categories?post=32582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.suprabt.com\/pt-br\/wp-json\/wp\/v2\/tags?post=32582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}