{"id":2010,"date":"2020-08-25T10:16:50","date_gmt":"2020-08-25T13:16:50","guid":{"rendered":"https:\/\/ravel.com.br\/blog\/?p=2010"},"modified":"2021-06-06T10:47:56","modified_gmt":"2021-06-06T13:47:56","slug":"ataques-ciberneticos-em-alta-em-2020","status":"publish","type":"post","link":"https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/","title":{"rendered":"Ataques cibern\u00e9ticos em alta em 2020"},"content":{"rendered":"\n<p>Segundo informa\u00e7\u00f5es do relat\u00f3rio divulgado pela <a href=\"https:\/\/www.fortinet.com\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Fortinet <\/a>(empresa global focada em solu\u00e7\u00f5es de seguran\u00e7a) somente o Brasil sofreu cerca de 2,6 bilh\u00f5es de tentativas de ataques cibern\u00e9ticos no primeiro semestre deste ano.<\/p>\n\n\n\n<p>O aumento do trabalho remoto, aumentou o apetite dos cyber criminosos em buscar brechas de seguran\u00e7a e conseguir ter acesso aos dados das empresas. As tentativas v\u00e3o desde tentativas de burlar os usu\u00e1rios com envios de links maliciosos, at\u00e9 t\u00e9cnicas mais sofisticadas de buscar \u201cportas abertas\u201d na rede e o uso de \u201cfor\u00e7a bruta\u201d para tentar quebrar senhas fracas.<\/p>\n\n\n\n<p>Uma das formas que vem se destacando na tentativa de ter \u00eaxito nos ataques cibern\u00e9ticos \u00e9 a utiliza\u00e7\u00e3o de arquivos infectados do Office (.DOCX e .XLSX) e PDFs. Os arquivos vem infectados e buscam criptografar os dados do equipamento, para posteriormente pedir um resgate para a libera\u00e7\u00e3o dos mesmos.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Como se prevenir de ataques cibern\u00e9ticos<\/h3>\n\n\n\n<p>As empresas precisam ficar atentas e trabalharem em todas as pontas. Desde treinamentos aos usu\u00e1rios sobre melhores pr\u00e1ticas, passando por pol\u00edticas de senhas e acessos, at\u00e9 solu\u00e7\u00f5es de monitoramento e preven\u00e7\u00e3o de ataques. Al\u00e9m de ter planos de conting\u00eancia para eventuais transtornos, pois nunca \u00e9 poss\u00edvel afirmar que estaremos 100% seguros.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"213\" src=\"https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2020\/08\/ataques-ciberneticos-banner-1024x213.jpg\" alt=\"Ataques cibern\u00e9ticos\" class=\"wp-image-2012\" srcset=\"https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2020\/08\/ataques-ciberneticos-banner-1024x213.jpg 1024w, https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2020\/08\/ataques-ciberneticos-banner-300x63.jpg 300w, https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2020\/08\/ataques-ciberneticos-banner-768x160.jpg 768w, https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2020\/08\/ataques-ciberneticos-banner-1536x320.jpg 1536w, https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2020\/08\/ataques-ciberneticos-banner-610x127.jpg 610w, https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2020\/08\/ataques-ciberneticos-banner-1080x225.jpg 1080w, https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2020\/08\/ataques-ciberneticos-banner.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Exploramos bastante este tema sobre formas de sequestro de dados e como se prevenir de ataques cibern\u00e9ticos no artigo: <a href=\"https:\/\/ravel.com.br\/blog\/ja-pensou-como-o-sequestro-de-dados-pode-prejudicar-o-seu-negocio\/\">https:\/\/ravel.com.br\/blog\/ja-pensou-como-o-sequestro-de-dados-pode-prejudicar-o-seu-negocio\/<\/a><\/p>\n\n\n\n<p>E tamb\u00e9m aprofundamos os benef\u00edcios de um Plano de Continuidade de Neg\u00f3cios neste artigo: <a href=\"https:\/\/ravel.com.br\/blog\/plano-de-continuidade-de-negocios\/\">https:\/\/ravel.com.br\/blog\/plano-de-continuidade-de-negocios\/<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/ravel.com.br\/contato\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"133\" src=\"https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2019\/11\/CTA1-1024x133.png\" alt=\"\" class=\"wp-image-806\" srcset=\"https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2019\/11\/CTA1-1024x133.png 1024w, https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2019\/11\/CTA1-300x39.png 300w, https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2019\/11\/CTA1-768x100.png 768w, https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2019\/11\/CTA1-610x79.png 610w, https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2019\/11\/CTA1-1080x140.png 1080w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Proteja-se! E precisando de um apoio t\u00e9cnico especializado para verificar seu ambiente de tecnologia x seguran\u00e7a, consulte nosso servi\u00e7o de <a href=\"https:\/\/ravel.com.br\/gestao-de-ti\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Gest\u00e3o de TI<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Somente o Brasil sofreu cerca de 2,6 bilh\u00f5es de tentativas de ataques cibern\u00e9ticos no primeiro semestre deste ano. Veja as principais amea\u00e7as.<\/p>\n","protected":false},"author":7,"featured_media":2011,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[101,6],"tags":[],"class_list":["post-2010","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-tecnologia","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ataques cibern\u00e9ticos em alta em 2020 - Blog Tecnologia<\/title>\n<meta name=\"description\" content=\"Somente o Brasil sofreu cerca de 2,6 bilh\u00f5es de tentativas de ataques cibern\u00e9ticos no primeiro semestre deste ano. Veja as principais amea\u00e7as.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ataques cibern\u00e9ticos em alta em 2020\" \/>\n<meta property=\"og:description\" content=\"Somente o Brasil sofreu cerca de 2,6 bilh\u00f5es de tentativas de ataques cibern\u00e9ticos no primeiro semestre deste ano. Veja as principais amea\u00e7as.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog Tecnologia\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/raveltecnologia\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-25T13:16:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-06T13:47:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2020\/08\/Ravel-Cadeado.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"470\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nelson Corr\u00eaa Leite J\u00fanior\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Ataques cibern\u00e9ticos em alta em 2020\" \/>\n<meta name=\"twitter:description\" content=\"Somente o Brasil sofreu cerca de 2,6 bilh\u00f5es de tentativas de ataques cibern\u00e9ticos no primeiro semestre deste ano. Veja as principais amea\u00e7as.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2020\/08\/Ravel-Cadeado.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nelson Corr\u00eaa Leite J\u00fanior\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/ataques-ciberneticos-em-alta-em-2020\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/ataques-ciberneticos-em-alta-em-2020\\\/\"},\"author\":{\"name\":\"Nelson Corr\u00eaa Leite J\u00fanior\",\"@id\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/#\\\/schema\\\/person\\\/5809fbed911cb14566b16220749d3dcc\"},\"headline\":\"Ataques cibern\u00e9ticos em alta em 2020\",\"datePublished\":\"2020-08-25T13:16:50+00:00\",\"dateModified\":\"2021-06-06T13:47:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/ataques-ciberneticos-em-alta-em-2020\\\/\"},\"wordCount\":298,\"commentCount\":1,\"image\":{\"@id\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/ataques-ciberneticos-em-alta-em-2020\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/ataques-ciberneticos.jpg\",\"articleSection\":[\"Security\",\"Tecnologia\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ravel.com.br\\\/blog\\\/ataques-ciberneticos-em-alta-em-2020\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/ataques-ciberneticos-em-alta-em-2020\\\/\",\"url\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/ataques-ciberneticos-em-alta-em-2020\\\/\",\"name\":\"Ataques cibern\u00e9ticos em alta em 2020 - Blog Tecnologia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/ataques-ciberneticos-em-alta-em-2020\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/ataques-ciberneticos-em-alta-em-2020\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/ataques-ciberneticos.jpg\",\"datePublished\":\"2020-08-25T13:16:50+00:00\",\"dateModified\":\"2021-06-06T13:47:56+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/#\\\/schema\\\/person\\\/5809fbed911cb14566b16220749d3dcc\"},\"description\":\"Somente o Brasil sofreu cerca de 2,6 bilh\u00f5es de tentativas de ataques cibern\u00e9ticos no primeiro semestre deste ano. Veja as principais amea\u00e7as.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/ataques-ciberneticos-em-alta-em-2020\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ravel.com.br\\\/blog\\\/ataques-ciberneticos-em-alta-em-2020\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/ataques-ciberneticos-em-alta-em-2020\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/ataques-ciberneticos.jpg\",\"contentUrl\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/ataques-ciberneticos.jpg\",\"width\":1254,\"height\":837,\"caption\":\"Anonymous hacker programmer uses a laptop to hack the system in the dark. Creation and infection of malicious virus. The concept of cybercrime and hacking database\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/ataques-ciberneticos-em-alta-em-2020\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ataques cibern\u00e9ticos em alta em 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/\",\"name\":\"Blog Tecnologia\",\"description\":\"Dicas e Artigos sobre Tecnologia\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/#\\\/schema\\\/person\\\/5809fbed911cb14566b16220749d3dcc\",\"name\":\"Nelson Corr\u00eaa Leite J\u00fanior\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b6ea36c15e9a834a3b2efef89b4eb19ae3a5c5c787c99d99ac72b11a5e076587?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b6ea36c15e9a834a3b2efef89b4eb19ae3a5c5c787c99d99ac72b11a5e076587?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b6ea36c15e9a834a3b2efef89b4eb19ae3a5c5c787c99d99ac72b11a5e076587?s=96&d=mm&r=g\",\"caption\":\"Nelson Corr\u00eaa Leite J\u00fanior\"},\"description\":\"Empres\u00e1rio desde 1997, onde \u00e9 Co-founder da Ravel Tecnologia, atuando como CEO na coordena\u00e7\u00e3o, gest\u00e3o da lideran\u00e7a e desenvolvimento estrat\u00e9gico. Especializado em Seguran\u00e7a da Informa\u00e7\u00e3o e solu\u00e7\u00f5es em nuvem. S\u00f3cio da ag\u00eancia de Marketing Digital Incandescente, com atua\u00e7\u00e3o na gest\u00e3o administrativa, financeira e estrat\u00e9gica. Busca por evoluir o uso da tecnologia aplicada aos neg\u00f3cios e as pessoas, buscando uma vis\u00e3o sist\u00eamica para fomentar e potencializar a inova\u00e7\u00e3o e crescimento. Pai de 2 lindos filhos e apreciador de uma boa cerveja.\",\"sameAs\":[\"http:\\\/\\\/ravel.com.br\",\"https:\\\/\\\/www.facebook.com\\\/raveltecnologia\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/nelson-corr\u00eaa-leite-j\u00fanior-337631160\\\/\"],\"url\":\"https:\\\/\\\/ravel.com.br\\\/blog\\\/author\\\/nelson\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ataques cibern\u00e9ticos em alta em 2020 - Blog Tecnologia","description":"Somente o Brasil sofreu cerca de 2,6 bilh\u00f5es de tentativas de ataques cibern\u00e9ticos no primeiro semestre deste ano. Veja as principais amea\u00e7as.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/","og_locale":"pt_BR","og_type":"article","og_title":"Ataques cibern\u00e9ticos em alta em 2020","og_description":"Somente o Brasil sofreu cerca de 2,6 bilh\u00f5es de tentativas de ataques cibern\u00e9ticos no primeiro semestre deste ano. Veja as principais amea\u00e7as.","og_url":"https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/","og_site_name":"Blog Tecnologia","article_author":"https:\/\/www.facebook.com\/raveltecnologia\/","article_published_time":"2020-08-25T13:16:50+00:00","article_modified_time":"2021-06-06T13:47:56+00:00","og_image":[{"width":470,"height":506,"url":"https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2020\/08\/Ravel-Cadeado.jpg","type":"image\/jpeg"}],"author":"Nelson Corr\u00eaa Leite J\u00fanior","twitter_card":"summary_large_image","twitter_title":"Ataques cibern\u00e9ticos em alta em 2020","twitter_description":"Somente o Brasil sofreu cerca de 2,6 bilh\u00f5es de tentativas de ataques cibern\u00e9ticos no primeiro semestre deste ano. Veja as principais amea\u00e7as.","twitter_image":"https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2020\/08\/Ravel-Cadeado.jpg","twitter_misc":{"Escrito por":"Nelson Corr\u00eaa Leite J\u00fanior","Est. tempo de leitura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/#article","isPartOf":{"@id":"https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/"},"author":{"name":"Nelson Corr\u00eaa Leite J\u00fanior","@id":"https:\/\/ravel.com.br\/blog\/#\/schema\/person\/5809fbed911cb14566b16220749d3dcc"},"headline":"Ataques cibern\u00e9ticos em alta em 2020","datePublished":"2020-08-25T13:16:50+00:00","dateModified":"2021-06-06T13:47:56+00:00","mainEntityOfPage":{"@id":"https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/"},"wordCount":298,"commentCount":1,"image":{"@id":"https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2020\/08\/ataques-ciberneticos.jpg","articleSection":["Security","Tecnologia"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/","url":"https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/","name":"Ataques cibern\u00e9ticos em alta em 2020 - Blog Tecnologia","isPartOf":{"@id":"https:\/\/ravel.com.br\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/#primaryimage"},"image":{"@id":"https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2020\/08\/ataques-ciberneticos.jpg","datePublished":"2020-08-25T13:16:50+00:00","dateModified":"2021-06-06T13:47:56+00:00","author":{"@id":"https:\/\/ravel.com.br\/blog\/#\/schema\/person\/5809fbed911cb14566b16220749d3dcc"},"description":"Somente o Brasil sofreu cerca de 2,6 bilh\u00f5es de tentativas de ataques cibern\u00e9ticos no primeiro semestre deste ano. Veja as principais amea\u00e7as.","breadcrumb":{"@id":"https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/#primaryimage","url":"https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2020\/08\/ataques-ciberneticos.jpg","contentUrl":"https:\/\/ravel.com.br\/blog\/wp-content\/uploads\/2020\/08\/ataques-ciberneticos.jpg","width":1254,"height":837,"caption":"Anonymous hacker programmer uses a laptop to hack the system in the dark. Creation and infection of malicious virus. The concept of cybercrime and hacking database"},{"@type":"BreadcrumbList","@id":"https:\/\/ravel.com.br\/blog\/ataques-ciberneticos-em-alta-em-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ravel.com.br\/blog\/"},{"@type":"ListItem","position":2,"name":"Ataques cibern\u00e9ticos em alta em 2020"}]},{"@type":"WebSite","@id":"https:\/\/ravel.com.br\/blog\/#website","url":"https:\/\/ravel.com.br\/blog\/","name":"Blog Tecnologia","description":"Dicas e Artigos sobre Tecnologia","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ravel.com.br\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Person","@id":"https:\/\/ravel.com.br\/blog\/#\/schema\/person\/5809fbed911cb14566b16220749d3dcc","name":"Nelson Corr\u00eaa Leite J\u00fanior","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/b6ea36c15e9a834a3b2efef89b4eb19ae3a5c5c787c99d99ac72b11a5e076587?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b6ea36c15e9a834a3b2efef89b4eb19ae3a5c5c787c99d99ac72b11a5e076587?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b6ea36c15e9a834a3b2efef89b4eb19ae3a5c5c787c99d99ac72b11a5e076587?s=96&d=mm&r=g","caption":"Nelson Corr\u00eaa Leite J\u00fanior"},"description":"Empres\u00e1rio desde 1997, onde \u00e9 Co-founder da Ravel Tecnologia, atuando como CEO na coordena\u00e7\u00e3o, gest\u00e3o da lideran\u00e7a e desenvolvimento estrat\u00e9gico. Especializado em Seguran\u00e7a da Informa\u00e7\u00e3o e solu\u00e7\u00f5es em nuvem. S\u00f3cio da ag\u00eancia de Marketing Digital Incandescente, com atua\u00e7\u00e3o na gest\u00e3o administrativa, financeira e estrat\u00e9gica. Busca por evoluir o uso da tecnologia aplicada aos neg\u00f3cios e as pessoas, buscando uma vis\u00e3o sist\u00eamica para fomentar e potencializar a inova\u00e7\u00e3o e crescimento. Pai de 2 lindos filhos e apreciador de uma boa cerveja.","sameAs":["http:\/\/ravel.com.br","https:\/\/www.facebook.com\/raveltecnologia\/","https:\/\/www.linkedin.com\/in\/nelson-corr\u00eaa-leite-j\u00fanior-337631160\/"],"url":"https:\/\/ravel.com.br\/blog\/author\/nelson\/"}]}},"_links":{"self":[{"href":"https:\/\/ravel.com.br\/blog\/wp-json\/wp\/v2\/posts\/2010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ravel.com.br\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ravel.com.br\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ravel.com.br\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/ravel.com.br\/blog\/wp-json\/wp\/v2\/comments?post=2010"}],"version-history":[{"count":0,"href":"https:\/\/ravel.com.br\/blog\/wp-json\/wp\/v2\/posts\/2010\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ravel.com.br\/blog\/wp-json\/wp\/v2\/media\/2011"}],"wp:attachment":[{"href":"https:\/\/ravel.com.br\/blog\/wp-json\/wp\/v2\/media?parent=2010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ravel.com.br\/blog\/wp-json\/wp\/v2\/categories?post=2010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ravel.com.br\/blog\/wp-json\/wp\/v2\/tags?post=2010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}