{"id":81147,"date":"2024-10-31T08:00:43","date_gmt":"2024-10-31T11:00:43","guid":{"rendered":"https:\/\/abes.org.br\/?p=81147"},"modified":"2024-10-28T19:55:52","modified_gmt":"2024-10-28T22:55:52","slug":"estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\/","title":{"rendered":"Trend Micro Cyber Risk Study Reveals Devices and Accounts Are High-Risk Assets"},"content":{"rendered":"<p><em>The report reveals that the Americas have the highest average risk due to vulnerabilities in the banking sector and the region&#039;s attractiveness to cybercrime<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-81149 size-medium alignleft\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/10\/CYBERSECURITY-TREND-MICRO-300x169.jpg\" alt=\"\" width=\"300\" height=\"169\" \/>During Cybersecurity Awareness Month,\u00a0<a href=\"https:\/\/www.trendmicro.com\/pt_br\/business.html\">Trend Micro<\/a>, a global leader in cybersecurity, warns of the importance of companies increasing their visibility of the attack surface. This is because the new study* on cyber risk, with metrics by region, organization size, sectors and asset types, reveals that companies still have weak configurations that can compromise their security controls.<\/p>\n<p>\u201cMoving to a more risk-based approach to cybersecurity \u2013 covering the entire attack surface, using AI to calculate true risk, and providing mitigating control advice \u2013 enables an organization to improve its security posture. This is a game-changer for all industries,\u201d said Jon Clay, vice president of Threat Intelligence at Trend Micro.<\/p>\n<p>Using a catalog of risk events, the Trend Vision One\u2122 platform calculated a risk score for each asset type and an index for organizations by multiplying an asset\u2019s attack, exposure and security configuration by impact. An asset with low business impact and few privileges has a smaller attack surface, while higher-value assets with more privileges have a larger attack surface.<\/p>\n<p>Using this method, the following assets were considered high risk:<\/p>\n<p><strong><span data-olk-copy-source=\"MessageBody\">Devices:<\/span><\/strong>\u00a018 million devices in total, with 620,610 classified as high risk;<\/p>\n<p><strong>Accounts:<\/strong>\u00a044 million accounts in total, with 17,065 classified as high risk;<\/p>\n<p><strong>Cloud Assets:<\/strong>\u00a014.8 million total cloud assets, with 8,088 classified as high risk.<\/p>\n<p><strong>Internet-facing assets:<\/strong>\u00a01 million in total, with 1,141 classified as high risk.<\/p>\n<p><strong>Applications:<\/strong>\u00a08 million requests in total, with 565 classified as high risk.<\/p>\n<p>The number of high-risk devices was much higher than the number of accounts, even though there were more accounts overall. This means that devices have a larger attack surface, meaning they are more susceptible to threats. However, accounts are still valuable because they can grant threat actors access to a variety of resources.<\/p>\n<p><strong>Analysis by region<\/strong><\/p>\n<p>The report also shows that the Americas have the highest average risk among regions, with an index of 44.6, thanks to vulnerabilities in the banking sector, critical infrastructure and the region\u2019s attractiveness to profit-driven criminals.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-81150\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/10\/GRAFICO-TREND-MICRO-300x289.png\" alt=\"\" width=\"357\" height=\"344\" \/><\/p>\n<p>Europe is the region that is most likely to patch vulnerabilities, indicating strong security practices. In terms of methods, mining has the highest risk score compared to other verticals, due to its strategic position in global supply chains and large attack surface.<\/p>\n<p>The top risk event detected was access to cloud applications, which presents a high level of risk based on historical application data, known security features, and community knowledge. Old and inactive accounts, accounts with disabled security controls, and sensitive data sent off-network are also noteworthy.<\/p>\n<p>\u201cOrganizations need to create an action plan to prevent attacks before they happen, thus reducing overall risk in the short, medium and long term. By opting for a risk-based cybersecurity approach, a company is adopting a proactive rather than reactive strategy, thus staying one step ahead of attackers,\u201d says Trend Micro Brazil\u2019s Technology Director, Fl\u00e1vio Silva.<\/p>\n<p>As the threat landscape evolves, organizations\u2019 ability to identify and manage risks becomes increasingly critical. The Trend Vision One\u2122 platform, with integrated Attack Surface Risk Management (ASRM), provides the tools needed for comprehensive threat visibility and effective risk mitigation.<\/p>\n<p>Click\u00a0<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/intercepting-impact-2024-trend-micro-cyber-risk-report\">ON HERE<\/a>\u00a0to read the full report.<\/p>\n<p>*The report is based on telemetry data from Trend Micro\u2019s Attack Surface Risk Management (ASRM) solution on its flagship cybersecurity platform, Trend Vision One\u2122, as well as native Extended Detection and Response (XDR) tools. It is divided into two parts: user-facing, which assesses risk across assets, processes, and vulnerabilities, and attacker-facing, which maps behaviors, MITRE, and TTPs. Data points are based on telemetry from December 25, 2023, to June 30, 2024.<\/p>\n<p><strong>About Trend Micro<\/strong><\/p>\n<p>Trend Micro, a global leader in cybersecurity, helps make the world a safer place to exchange digital information. Powered by decades of cybersecurity expertise, global threat research, and continuous innovation, Trend Micro\u2019s AI-powered cybersecurity platform protects hundreds of thousands of individuals and organizations across the cloud, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, Trend Micro delivers a powerful array of advanced threat defenses optimized for environments such as AWS, Microsoft, and Google, and central visibility for faster, better detection and response. With 7,000 employees across 70 countries, Trend Micro enables organizations to secure and simplify their connected world.<\/p>\n<p>Site:\u00a0<a href=\"https:\/\/www.trendmicro.com\/pt_br\/business.html\">\u00a0www.trendmicro.com\/pt_br\/business.html<\/a><\/p>\n<p>Twitter: TrendmicroBR<\/p>\n<p>Linkedin:\u00a0\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/trend-micro-brasil\/\">www.linkedin.com\/company\/trend-micro-brasil\/<\/a><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>O relat\u00f3rio revela que as Am\u00e9ricas t\u00eam a maior m\u00e9dia de risco devido a vulnerabilidades no setor banc\u00e1rio e a atratividade da regi\u00e3o para o cibercrime No m\u00eas da Conscientiza\u00e7\u00e3o em Ciberseguran\u00e7a, a\u00a0Trend Micro,\u00a0l\u00edder global em seguran\u00e7a cibern\u00e9tica, alerta para a import\u00e2ncia de as empresas ampliarem a visibilidade da superf\u00edcie de ataque. Isso porque o [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":81149,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[379,2246,6135,6136],"class_list":["post-81147","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-cibercrime","tag-cyberseguranca","tag-dispositivos-de-alto-risco","tag-ia-para-calcular-risco-real"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Estudo da Trend Micro sobre risco cibern\u00e9tico revela que dispositivos e contas s\u00e3o ativos de alto risco - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Estudo da Trend Micro sobre risco cibern\u00e9tico revela que dispositivos e contas s\u00e3o ativos de alto risco - ABES\" \/>\n<meta property=\"og:description\" content=\"O relat\u00f3rio revela que as Am\u00e9ricas t\u00eam a maior m\u00e9dia de risco devido a vulnerabilidades no setor banc\u00e1rio e a atratividade da regi\u00e3o para o cibercrime No m\u00eas da Conscientiza\u00e7\u00e3o em Ciberseguran\u00e7a, a\u00a0Trend Micro,\u00a0l\u00edder global em seguran\u00e7a cibern\u00e9tica, alerta para a import\u00e2ncia de as empresas ampliarem a visibilidade da superf\u00edcie de ataque. Isso porque o [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-31T11:00:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/10\/CYBERSECURITY-TREND-MICRO.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\"},\"headline\":\"Estudo da Trend Micro sobre risco cibern\u00e9tico revela que dispositivos e contas s\u00e3o ativos de alto risco\",\"datePublished\":\"2024-10-31T11:00:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\\\/\"},\"wordCount\":994,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CYBERSECURITY-TREND-MICRO.jpg\",\"keywords\":[\"cibercrime\",\"cyberseguran\u00e7a\",\"dispositivos de alto risco\",\"IA para calcular risco real\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\\\/\",\"name\":\"Estudo da Trend Micro sobre risco cibern\u00e9tico revela que dispositivos e contas s\u00e3o ativos de alto risco - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CYBERSECURITY-TREND-MICRO.jpg\",\"datePublished\":\"2024-10-31T11:00:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CYBERSECURITY-TREND-MICRO.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CYBERSECURITY-TREND-MICRO.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Estudo da Trend Micro sobre risco cibern\u00e9tico revela que dispositivos e contas s\u00e3o ativos de alto risco\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Estudo da Trend Micro sobre risco cibern\u00e9tico revela que dispositivos e contas s\u00e3o ativos de alto risco - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\/","og_locale":"en_US","og_type":"article","og_title":"Estudo da Trend Micro sobre risco cibern\u00e9tico revela que dispositivos e contas s\u00e3o ativos de alto risco - ABES","og_description":"O relat\u00f3rio revela que as Am\u00e9ricas t\u00eam a maior m\u00e9dia de risco devido a vulnerabilidades no setor banc\u00e1rio e a atratividade da regi\u00e3o para o cibercrime No m\u00eas da Conscientiza\u00e7\u00e3o em Ciberseguran\u00e7a, a\u00a0Trend Micro,\u00a0l\u00edder global em seguran\u00e7a cibern\u00e9tica, alerta para a import\u00e2ncia de as empresas ampliarem a visibilidade da superf\u00edcie de ataque. Isso porque o [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2024-10-31T11:00:43+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/10\/CYBERSECURITY-TREND-MICRO.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1"},"headline":"Estudo da Trend Micro sobre risco cibern\u00e9tico revela que dispositivos e contas s\u00e3o ativos de alto risco","datePublished":"2024-10-31T11:00:43+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\/"},"wordCount":994,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/10\/CYBERSECURITY-TREND-MICRO.jpg","keywords":["cibercrime","cyberseguran\u00e7a","dispositivos de alto risco","IA para calcular risco real"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\/","url":"https:\/\/abes.org.br\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\/","name":"Estudo da Trend Micro sobre risco cibern\u00e9tico revela que dispositivos e contas s\u00e3o ativos de alto risco - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/10\/CYBERSECURITY-TREND-MICRO.jpg","datePublished":"2024-10-31T11:00:43+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/10\/CYBERSECURITY-TREND-MICRO.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/10\/CYBERSECURITY-TREND-MICRO.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/estudo-da-trend-micro-sobre-risco-cibernetico-revela-que-dispositivos-e-contas-sao-ativos-de-alto-risco\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Estudo da Trend Micro sobre risco cibern\u00e9tico revela que dispositivos e contas s\u00e3o ativos de alto risco"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes2\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-26 21:15:36","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/81147","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=81147"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/81147\/revisions"}],"predecessor-version":[{"id":81155,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/81147\/revisions\/81155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/81149"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=81147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=81147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=81147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}