{"id":80733,"date":"2024-10-17T08:00:31","date_gmt":"2024-10-17T11:00:31","guid":{"rendered":"https:\/\/abes.org.br\/?p=80733"},"modified":"2024-10-07T23:20:38","modified_gmt":"2024-10-08T02:20:38","slug":"apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\/","title":{"rendered":"Only a third of organizations maintain 24-hour cyber surveillance, Trend Micro study finds"},"content":{"rendered":"<p><em>Research highlights critical flaws in cybersecurity and lack of commitment from senior leadership in global organizations\u00a0<\/em><\/p>\n<p>Research of <a href=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.4WK8f5yxV04ZS-2FaVz7ncmPSNULuGRKmEYupt5x2606vWxuhxal7X3jsVh3Q6P1ApgVpu_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hrTk0HC1yctc9XN2x16kI3Dxjg9JPII2LVOQfZtQYLZs1txX4k4Kaafp1RtpsXCOMwfikKZMHMzrCJvVFSfChKT-2FSCWCeBVp9RuQ0GrZYMOUEF1gQpDwdu2euOaYTneNGotLCaigEqoODuLeqfEpWd5xHrPom5phQxzr1SDI00idQ-3D-3D\">Trend Micro<\/a>, a world leader in cybersecurity, reveals a worrying lack of resources and a lack of engagement from senior management in companies in relation to monitoring and mitigating the risks of attacks on the digital environment.<\/p>\n<p>The survey surveyed 2,600 IT leaders responsible for cybersecurity in small, medium and large organizations with the aim of understanding attitudes towards attack surface risk management (ASRM).<\/p>\n<p>The main gaps identified by interviewees are in relation to:<\/p>\n<ul type=\"disc\">\n<li class=\"x_MsoNormal\"><strong>24 x 7 Cyber Security Monitoring<\/strong>: Only 36% of companies have comprehensive coverage.<\/li>\n<li class=\"x_MsoNormal\"><strong>Attack surface management techniques<\/strong>: only 35% implement techniques to measure risks adequately.<\/li>\n<li class=\"x_MsoNormal\"><strong>Adoption of proven regulatory frameworks<\/strong>: Only 34% follows established guidelines such as the NIST Cybersecurity Framework.<\/li>\n<\/ul>\n<p>The failure of most global companies to achieve these core cybersecurity principles can be attributed to a lack of leadership and accountability at the top of the organization. Half of the respondents (48%) said their leadership does not see cybersecurity as a direct responsibility, and more than half (54%) complained that their company\u2019s attitude toward cyber risk is inconsistent and varies from month to month.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-80734\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/10\/TREND-MICRO.png\" alt=\"\" width=\"918\" height=\"440\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/10\/TREND-MICRO.png 918w, https:\/\/abes.org.br\/wp-content\/uploads\/2024\/10\/TREND-MICRO-480x230.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 918px, 100vw\" \/><\/p>\n<p>When asked who should be responsible for mitigating business risks, respondents provided varied answers, highlighting a lack of clarity in the workflow. About a third (31%) said the responsibility lies with organizational IT teams.<\/p>\n<p>Nearly all respondents (96%) expressed concern about the vulnerability of their attack surfaces; more than a third (36%) are concerned about having a way to discover, assess, and mitigate high-risk areas; while 19% said they do not have a single, trusted source of information to guide their actions.<\/p>\n<p>\u201cA lack of clear cybersecurity leadership can lead to fragmented and reactive decision-making, weakening an organization\u2019s ability to address risks quickly and efficiently,\u201d said Bharat Mistry, chief technical officer at Trend Micro.<\/p>\n<p>The research reinforces the urgency of a greater commitment from business leaders to cybersecurity, as a strategic priority to ensure the protection of their assets and business continuity in an increasingly digital and challenging environment.<\/p>\n<p>\u201cCyber risk is on the rise and should increasingly be on the list of priorities for senior executives. It is up to CISOs to engage board members to establish effective cybersecurity strategies to continuously monitor and mitigate risks,\u201d recommends Fl\u00e1vio Silva, Chief Technology Officer at Trend Micro Brazil.<\/p>\n<p>Click\u00a0<a href=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.4WK8f5yxV04ZS-2FaVz7ncmPSNULuGRKmEYupt5x2606vw-2FDeGP-2Bw2bvecUR-2BSCJiCcZ-2BXol7ES0b-2BOp0dH9yIFN5ja5YVIaipsRNbPNNiO5jnj1e-2FbrVzkuWuN3sNEzSD-PMv_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hrTk0HC1yctc9XN2x16kI3Dxjg9JPII2LVOQfZtQYLZsweHnqsF1XnP4NunBeC79mY9OUgItIFypSJVIGiJjncSGiNR2SrMg2YUHjcpZTbSaz0AigRCx-2B1RDhADgfCJWFhOvNTHoi44usbt6XArJRvY3Wkt27jKoJMQqfeQ245U1A-3D-3D\">ON HERE<\/a>\u00a0to read all the details of the research \u201cThe CISO Credibility Gap: A Global Trend Micro Study\u201d.<\/p>\n<p><strong>About Trend Micro<\/strong><\/p>\n<p>Trend Micro, a global leader in cybersecurity, helps make the world a safer place to exchange digital information. Powered by decades of cybersecurity expertise, global threat research, and continuous innovation, Trend Micro\u2019s AI-powered cybersecurity platform protects hundreds of thousands of individuals and organizations across the cloud, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, Trend Micro delivers a powerful array of advanced threat defenses optimized for environments such as AWS, Microsoft, and Google, and central visibility for faster, better detection and response. With 7,000 employees across 70 countries, Trend Micro enables organizations to secure and simplify their connected world.<br \/>\nSite:\u00a0\u00a0<a href=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.4WK8f5yxV04ZS-2FaVz7ncmPSNULuGRKmEYupt5x2606vWxuhxal7X3jsVh3Q6P1Ap7mmB_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hrTk0HC1yctc9XN2x16kI3Dxjg9JPII2LVOQfZtQYLZsydywyuUEvi-2B1HVTJE9q-2FeLUoymDDch9eB-2FK6DARLmGp4C3nAI87U0R5-2BL5aAY91EgUcKWKoCJOjf9H3uwELCUfm9VBJzquzSvhZihlCbxz3-2BUVLc8YhO43JRtPNL2Y7lA-3D-3D\">Link<\/a><\/p>\n<p>Twitter: TrendmicroBR<\/p>\n<p>Linkedin:\u00a0<a href=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.4WK8f5yxV04ZS-2FaVz7ncmPFSqgP9TLBiKCWEYJ5RvtK-2BGuiGA7dXDTgQH7DTeUOc9-2FslgR3RJ-2FqPz5H3IR6BHA-3D-3DoxFQ_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hrTk0HC1yctc9XN2x16kI3Dxjg9JPII2LVOQfZtQYLZs-2FL0SY-2Fx4u0jBA93lj65vlsSovKpRX67Gqa-2BQM-2Bcrf0M-2B0kDmq0-2Fck8V4AjN-2FsAT8tVs29GUpTaNfyGFczSxWPgIRYcmg5C-2FEfIYk2KgSD-2BP84jEm5yGnuVJXT-2B6jrtFzA-3D-3D\">\u00a0Link<\/a><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Pesquisa aponta falhas cr\u00edticas na ciberseguran\u00e7a e falta de compromisso da alta lideran\u00e7a de organiza\u00e7\u00f5es globais\u00a0 Pesquisa da Trend Micro, l\u00edder mundial em seguran\u00e7a cibern\u00e9tica, revela uma preocupante car\u00eancia de recursos e falta de engajamento da alta lideran\u00e7a das empresas em rela\u00e7\u00e3o ao monitoramento e mitiga\u00e7\u00e3o dos riscos de ataques ao ambiente digital. O levantamento [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":80735,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[246,108,270],"class_list":["post-80733","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-ataques-ciberneticos","tag-ciberseguranca","tag-seguranca-cibernetica"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apenas um ter\u00e7o das organiza\u00e7\u00f5es mant\u00e9m vigil\u00e2ncia cibern\u00e9tica 24 horas por dia, revela estudo da Trend Micro - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apenas um ter\u00e7o das organiza\u00e7\u00f5es mant\u00e9m vigil\u00e2ncia cibern\u00e9tica 24 horas por dia, revela estudo da Trend Micro - ABES\" \/>\n<meta property=\"og:description\" content=\"Pesquisa aponta falhas cr\u00edticas na ciberseguran\u00e7a e falta de compromisso da alta lideran\u00e7a de organiza\u00e7\u00f5es globais\u00a0 Pesquisa da Trend Micro, l\u00edder mundial em seguran\u00e7a cibern\u00e9tica, revela uma preocupante car\u00eancia de recursos e falta de engajamento da alta lideran\u00e7a das empresas em rela\u00e7\u00e3o ao monitoramento e mitiga\u00e7\u00e3o dos riscos de ataques ao ambiente digital. O levantamento [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-17T11:00:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/10\/CIBERSEGURANCA-CADEADO.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\"},\"headline\":\"Apenas um ter\u00e7o das organiza\u00e7\u00f5es mant\u00e9m vigil\u00e2ncia cibern\u00e9tica 24 horas por dia, revela estudo da Trend Micro\",\"datePublished\":\"2024-10-17T11:00:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\\\/\"},\"wordCount\":702,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CIBERSEGURANCA-CADEADO.png\",\"keywords\":[\"ataques cibern\u00e9ticos\",\"ciberseguran\u00e7a\",\"seguran\u00e7a cibern\u00e9tica\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\\\/\",\"name\":\"Apenas um ter\u00e7o das organiza\u00e7\u00f5es mant\u00e9m vigil\u00e2ncia cibern\u00e9tica 24 horas por dia, revela estudo da Trend Micro - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CIBERSEGURANCA-CADEADO.png\",\"datePublished\":\"2024-10-17T11:00:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CIBERSEGURANCA-CADEADO.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CIBERSEGURANCA-CADEADO.png\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apenas um ter\u00e7o das organiza\u00e7\u00f5es mant\u00e9m vigil\u00e2ncia cibern\u00e9tica 24 horas por dia, revela estudo da Trend Micro\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Only a third of organizations maintain 24-hour cyber surveillance, Trend Micro study reveals - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\/","og_locale":"en_US","og_type":"article","og_title":"Apenas um ter\u00e7o das organiza\u00e7\u00f5es mant\u00e9m vigil\u00e2ncia cibern\u00e9tica 24 horas por dia, revela estudo da Trend Micro - ABES","og_description":"Pesquisa aponta falhas cr\u00edticas na ciberseguran\u00e7a e falta de compromisso da alta lideran\u00e7a de organiza\u00e7\u00f5es globais\u00a0 Pesquisa da Trend Micro, l\u00edder mundial em seguran\u00e7a cibern\u00e9tica, revela uma preocupante car\u00eancia de recursos e falta de engajamento da alta lideran\u00e7a das empresas em rela\u00e7\u00e3o ao monitoramento e mitiga\u00e7\u00e3o dos riscos de ataques ao ambiente digital. O levantamento [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2024-10-17T11:00:31+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/10\/CIBERSEGURANCA-CADEADO.png","type":"image\/png"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1"},"headline":"Apenas um ter\u00e7o das organiza\u00e7\u00f5es mant\u00e9m vigil\u00e2ncia cibern\u00e9tica 24 horas por dia, revela estudo da Trend Micro","datePublished":"2024-10-17T11:00:31+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\/"},"wordCount":702,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/10\/CIBERSEGURANCA-CADEADO.png","keywords":["ataques cibern\u00e9ticos","ciberseguran\u00e7a","seguran\u00e7a cibern\u00e9tica"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\/","url":"https:\/\/abes.org.br\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\/","name":"Only a third of organizations maintain 24-hour cyber surveillance, Trend Micro study reveals - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/10\/CIBERSEGURANCA-CADEADO.png","datePublished":"2024-10-17T11:00:31+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/10\/CIBERSEGURANCA-CADEADO.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/10\/CIBERSEGURANCA-CADEADO.png","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/apenas-um-terco-das-organizacoes-mantem-vigilancia-cibernetica-24-horas-por-dia-revela-estudo-da-trend-micro\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Apenas um ter\u00e7o das organiza\u00e7\u00f5es mant\u00e9m vigil\u00e2ncia cibern\u00e9tica 24 horas por dia, revela estudo da Trend Micro"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes2\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-28 08:35:20","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/80733","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=80733"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/80733\/revisions"}],"predecessor-version":[{"id":80736,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/80733\/revisions\/80736"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/80735"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=80733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=80733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=80733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}