{"id":57342,"date":"2023-02-23T08:22:08","date_gmt":"2023-02-23T11:22:08","guid":{"rendered":"https:\/\/abes.org.br\/?p=57342"},"modified":"2023-02-13T07:26:19","modified_gmt":"2023-02-13T10:26:19","slug":"governos-na-mira-dos-cibercriminosos","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/governos-na-mira-dos-cibercriminosos\/","title":{"rendered":"Governments targeted by cybercriminals"},"content":{"rendered":"<p>It&#039;s not just companies that are targeted by cybercriminals. The conflict between Russia and Ukraine, which does not point to a peaceful solution in the short term, has made it clear that cyberattacks can be a lethal weapon. In more than a year of hostilities, Ukraine has recorded cyberattacks on various government agencies and their infrastructure.<u><\/u><u><\/u><\/p>\n<p>But even in times of peace, governments have been targets of attacks, with the leaking of sensitive data of the populations of the most diverse countries, including Brazil. As government entities regularly collect sensitive personally identifiable information from citizens, from social security details to financial information and health data, it is only natural that they also become a priority target for cybercriminals.<u><\/u><u><\/u><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-57343 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/02\/hackergoverno.jpg\" alt=\"\" width=\"474\" height=\"316\" \/><\/p>\n<p>\u201cIn the eyes of hackers, the various spheres of government are seen not only as easy targets, but also attractive due to the fact that they give high visibility to their illegal actions\u201d, comments Caio Sposito, country manager Brazil at Arcserve, the world&#039;s most experienced provider of solutions backup, recovery, and immutable storage for unified data resiliency against ransomware and disasters.<u><\/u><u><\/u><\/p>\n<p>According to the\u00a0<a href=\"https:\/\/www.sonicwall.com\/2022-cyber-threat-report\/\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/bra01.safelinks.protection.outlook.com\/?url%3Dhttps%253A%252F%252Fwww.sonicwall.com%252F2022-cyber-threat-report%252F%26data%3D05%257C01%257C%257C7fa9c72d051540785a7d08db0aa571de%257C84df9e7fe9f640afb435aaaaaaaaaaaa%257C1%257C0%257C638115477950607506%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3Dd6HhwU%252BQOUKPOLVjcsSs3G89jCloswYmVPMePImNNqE%253D%26reserved%3D0&amp;source=gmail&amp;ust=1676369539924000&amp;usg=AOvVaw3rHJkl686zQt7RHQjq_Dbi\">SonicWall&#039;s 2022 Cyber Threat Report<\/a>\u00a0global ransomware volume skyrocketed by 105% a year and the numbers were particularly cruel to governments. Ransomware attempts on government entities increased by an impressive 1,885%. This is more than double the increase seen by the healthcare (755%), education (152%) and retail (21%) sectors combined.<u><\/u><u><\/u><\/p>\n<p>\u201cThe recipe for protecting data held by government agencies includes adopting immutable backups. The copy is made in almost real time, which allows the system to return to operation even in the event of a successful attack\u201d, comments Caio, who points to the exponential growth in the number of data generated by the public sector as something that must be taken in consideration.<u><\/u><u><\/u><\/p>\n<p>\u201cThis trend indicates that their storage systems will soon reach the limits of their capacities. Governments need a scalable storage solution that can accommodate significant data growth without the need for expensive upgrades\u201d, recommends Caio Sposito, adding that choosing efficient protection solutions already available on the market will allow Governments to protect their confidential data and use them to leverage services provided to your citizens.<\/p>","protected":false},"excerpt":{"rendered":"<p>N\u00e3o s\u00e3o apenas as empresas que est\u00e3o na mira dos cibercriminosos. O conflito entre a R\u00fassia e a Ucr\u00e2nia, que n\u00e3o sinaliza para uma solu\u00e7\u00e3o pac\u00edfica de curto prazo, deixou claro que os ciberataques podem ser uma arma letal. Neste mais de um ano de hostilidades, a Ucr\u00e2nia registrou ataques cibern\u00e9ticos a v\u00e1rios organismos governamentais [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[3706,1394,3704,2348,3705],"class_list":["post-57342","post","type-post","status-publish","format-standard","hentry","category-coluna-4","category-ultimas-noticias","tag-backups-imutaveis","tag-cibercriminosos","tag-dados-confidenciais","tag-hackers","tag-sistemas-de-armazenamento"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Governos na mira dos cibercriminosos - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/governos-na-mira-dos-cibercriminosos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Governos na mira dos cibercriminosos - ABES\" \/>\n<meta property=\"og:description\" content=\"N\u00e3o s\u00e3o apenas as empresas que est\u00e3o na mira dos cibercriminosos. O conflito entre a R\u00fassia e a Ucr\u00e2nia, que n\u00e3o sinaliza para uma solu\u00e7\u00e3o pac\u00edfica de curto prazo, deixou claro que os ciberataques podem ser uma arma letal. Neste mais de um ano de hostilidades, a Ucr\u00e2nia registrou ataques cibern\u00e9ticos a v\u00e1rios organismos governamentais [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/governos-na-mira-dos-cibercriminosos\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-23T11:22:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/02\/hackergoverno.jpg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/governos-na-mira-dos-cibercriminosos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/governos-na-mira-dos-cibercriminosos\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Governos na mira dos cibercriminosos\",\"datePublished\":\"2023-02-23T11:22:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/governos-na-mira-dos-cibercriminosos\\\/\"},\"wordCount\":437,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/governos-na-mira-dos-cibercriminosos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/hackergoverno.jpg\",\"keywords\":[\"backups imut\u00e1veis\",\"cibercriminosos\",\"dados confidenciais\",\"hackers\",\"sistemas de armazenamento\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/governos-na-mira-dos-cibercriminosos\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/governos-na-mira-dos-cibercriminosos\\\/\",\"name\":\"Governos na mira dos cibercriminosos - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/governos-na-mira-dos-cibercriminosos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/governos-na-mira-dos-cibercriminosos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/hackergoverno.jpg\",\"datePublished\":\"2023-02-23T11:22:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/governos-na-mira-dos-cibercriminosos\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/governos-na-mira-dos-cibercriminosos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/governos-na-mira-dos-cibercriminosos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/hackergoverno.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/hackergoverno.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/governos-na-mira-dos-cibercriminosos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Governos na mira dos cibercriminosos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Governments in the sights of cybercriminals - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/governos-na-mira-dos-cibercriminosos\/","og_locale":"en_US","og_type":"article","og_title":"Governos na mira dos cibercriminosos - ABES","og_description":"N\u00e3o s\u00e3o apenas as empresas que est\u00e3o na mira dos cibercriminosos. O conflito entre a R\u00fassia e a Ucr\u00e2nia, que n\u00e3o sinaliza para uma solu\u00e7\u00e3o pac\u00edfica de curto prazo, deixou claro que os ciberataques podem ser uma arma letal. Neste mais de um ano de hostilidades, a Ucr\u00e2nia registrou ataques cibern\u00e9ticos a v\u00e1rios organismos governamentais [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/governos-na-mira-dos-cibercriminosos\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2023-02-23T11:22:08+00:00","og_image":[{"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/02\/hackergoverno.jpg","type":"","width":"","height":""}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/governos-na-mira-dos-cibercriminosos\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/governos-na-mira-dos-cibercriminosos\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Governos na mira dos cibercriminosos","datePublished":"2023-02-23T11:22:08+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/governos-na-mira-dos-cibercriminosos\/"},"wordCount":437,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/governos-na-mira-dos-cibercriminosos\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/02\/hackergoverno.jpg","keywords":["backups imut\u00e1veis","cibercriminosos","dados confidenciais","hackers","sistemas de armazenamento"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/governos-na-mira-dos-cibercriminosos\/","url":"https:\/\/abes.org.br\/governos-na-mira-dos-cibercriminosos\/","name":"Governments in the sights of cybercriminals - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/governos-na-mira-dos-cibercriminosos\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/governos-na-mira-dos-cibercriminosos\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/02\/hackergoverno.jpg","datePublished":"2023-02-23T11:22:08+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/governos-na-mira-dos-cibercriminosos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/governos-na-mira-dos-cibercriminosos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/governos-na-mira-dos-cibercriminosos\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/02\/hackergoverno.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/02\/hackergoverno.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/governos-na-mira-dos-cibercriminosos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Governos na mira dos cibercriminosos"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-19 00:40:52","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/57342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=57342"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/57342\/revisions"}],"predecessor-version":[{"id":57344,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/57342\/revisions\/57344"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=57342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=57342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=57342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}