{"id":82507,"date":"2024-12-17T08:00:30","date_gmt":"2024-12-17T11:00:30","guid":{"rendered":"https:\/\/abes.org.br\/?p=82507"},"modified":"2024-12-03T13:35:24","modified_gmt":"2024-12-03T16:35:24","slug":"seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\/","title":{"rendered":"Security in the collaboration and messaging environment requires special attention from companies"},"content":{"rendered":"<p><em>Email and corporate collaboration tools are among the main vectors of cyberattacks<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82508 size-medium alignleft\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/12\/CIBERCRIMINOSO-300x169.jpg\" alt=\"\" width=\"300\" height=\"169\" \/>Phishing via email remains one of the main attack vectors for digital crimes and, consequently, the priority entry point for cybercriminals. In 2023, almost half of the threats blocked by\u00a0<a href=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.4WK8f5yxV04ZS-2FaVz7ncmPSNULuGRKmEYupt5x2606vWxuhxal7X3jsVh3Q6P1Ap67wL_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hrUET6e07EATykLISIDa2dgzc0-2BuKRqGXHMiVb2V1-2Bd0bWSq0GpX2Lj2dLKUmV7kxudFxVWY4mtA6g5hxm89gU-2BUXhZW8cgFG2P4DhTtQ8r9kmfthuo5onHxmPkWI-2BdImF9KGwo-2Bclk065cTEv1tNaceWxtCwhMFi8QyIcdUFlutnUpCdnXm4gxptolmwBPo-2F4-3D\">Trend Micro<\/a>, a global leader in cybersecurity, took place via email.<\/p>\n<p>This type of infiltration has been a concern for companies as the use of collaborative tools such as Microsoft 365 and Google Workspace grows. Studies show that more than 901% of cyberattacks start with phishing, which is why it is so important to understand how these attacks are carried out, how to identify them, and what to do to increase the protection of the attack surface.<\/p>\n<p>\u201cEmail is the company\u2019s most important attack vector, the easiest entry point, because using social engineering all employees are potential targets, from the administrative assistant to the company\u2019s highest executive or advisor,\u201d points out Felippe Barros, Cyber Security Executive at Trend Micro Brazil.<\/p>\n<p>In 2024, the average cost of a data breach jumped to $4.88 million, up $101 million from last year and the highest level ever, according to IBM\u2019s Cost of a Data Bridge Report, which is based on data compiled by the Ponemon Institute. In total, the report analyzed the experiences of 604 organizations and 3,556 business cybersecurity leaders who had been impacted by a breach.<\/p>\n<p>This growth was driven by increased costs in the event of successful attacks, including operational downtime, lost customers, and the cost of post-breach responses such as hiring consulting firms and paying regulatory fines. The research also shows that organizations that applied AI and automation to security prevention had the greatest impact on reducing the cost of a breach, saving an average of US$1.4T 2.22 million compared to those that did not implement these technologies.<\/p>\n<p>Trend Micro&#039;s executive points out that browsing the digital environment requires constant vigilance, as the internet is a veritable minefield. \u201cCyber attacks are not isolated incidents. They have the power to paralyze systems, steal confidential information and cause financial and reputational damage,\u201d warns Felippe Barros.<br \/>\n<strong>\u00a0<\/strong><br \/>\n<strong>Spear Phishing\u00a0<\/strong><br \/>\nSpear phishing, a highly targeted and personalized form of cyberattack, targets specific users or organizations. In this case, hackers research their victims in detail and use advanced social engineering techniques to create convincing messages that appear legitimate. \u201cThey try to trick the victim into taking actions that will harm the organization. It could be a fake email from a high-ranking executive requesting payment of a bill or transfer of funds, which, due to the sender\u2019s level of importance in the corporation, ends up not arousing suspicion,\u201d explains the Cyber Security Executive at Trend Micro Brazil.<\/p>\n<p>Last year alone, Trend Vision One\u2122 \u2013 Email and Collaboration Security blocked nearly half a million BEC (Business Email Compromise) threats, as this type of scam is also known. That\u2019s why it\u2019s important to have security features that can control and prevent the messaging layer.<\/p>\n<p>\u201cEmail security tools should be a vital part of a company\u2019s cybersecurity strategy, acting as a primary layer of defense capable of blocking highly complex and evasive threats,\u201d recommends the Trend Micro executive.<\/p>\n<p><strong>About Trend Micro<\/strong><br \/>\nTrend Micro, a global leader in cybersecurity, helps make the world a safer place to exchange digital information. Powered by decades of cybersecurity expertise, global threat research, and continuous innovation, Trend Micro\u2019s AI-powered cybersecurity platform protects hundreds of thousands of individuals and organizations across the cloud, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, Trend Micro delivers a powerful array of advanced threat defenses optimized for environments such as AWS, Microsoft, and Google, and central visibility for faster, better detection and response. With 7,000 employees across 70 countries, Trend Micro enables organizations to secure and simplify their connected world.<\/p>\n<p>Site:\u00a0<a href=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.4WK8f5yxV04ZS-2FaVz7ncmPSNULuGRKmEYupt5x2606tFnGi-2BrKsnBvakKw9lJ2dvOpfrrepEDtsZ6yf1gKsnIg-3D-3DVCsH_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hrUET6e07EATykLISIDa2dgzc0-2BuKRqGXHMiVb2V1-2Bd0cm1X-2FyaD7oZ-2FBg8XSQgt-2BEwIP9R34DqtkSAJzGZ73-2BBrDKbXJZqBc5ahbFcrGWi93VysVinNdaarzDYDpmclQat93Lbawe5pfwNBgucqJgrEgF5O4dvc694KKHuCbDn2Pm0Co-2BKW7P48ys0imoxRXE-3D\">\u00a0www.trendmicro.com\/pt_br\/business.html<\/a><br \/>\nTwitter: TrendmicroBR<br \/>\nLinkedin:\u00a0<a href=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.4WK8f5yxV04ZS-2FaVz7ncmPFSqgP9TLBiKCWEYJ5RvtLXnA0OG5iyNzoAH88ov7lj2OaVEEGBzDDiHD4MDo6xIQ-3D-3DPX3Y_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hrUET6e07EATykLISIDa2dgzc0-2BuKRqGXHMiVb2V1-2Bd0R1TCj3HeJZQkwSm4xwysB2pjhmLifBzqlWv7fAHmXAuISpeUwig8nMwgQc9iMp7ZcKqQFRHYbIgMubCtVx1DldAd8AQXcxYK-2FtLGbWroG7v1jVIri4nmx4hketGsRE69D-2BLfhBAEKKjyi3-2BuX9ZDWY-3D\">\u00a0www.linkedin.com\/company\/trend-micro-brasil\/<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>E-mails e ferramentas de colabora\u00e7\u00e3o corporativa est\u00e3o entre os principais vetores de ataques cibern\u00e9ticos O phishing via e-mail continua sendo um dos principais vetores de ataque para crimes digitais e, por consequ\u00eancia, a porta de entrada priorit\u00e1ria dos cibercriminosos. Em 2023, quase metade das amea\u00e7as bloqueadas pela\u00a0Trend Micro,\u00a0l\u00edder global em seguran\u00e7a cibern\u00e9tica,\u00a0ocorreu via e-mail. Esse [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":82509,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[1394,6343,6341,6342],"class_list":["post-82507","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-cibercriminosos","tag-cibersecurity","tag-ferramentas-colaborativas","tag-spear-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Seguran\u00e7a no ambiente de colabora\u00e7\u00e3o e mensageria exige aten\u00e7\u00e3o especial das empresas - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seguran\u00e7a no ambiente de colabora\u00e7\u00e3o e mensageria exige aten\u00e7\u00e3o especial das empresas - ABES\" \/>\n<meta property=\"og:description\" content=\"E-mails e ferramentas de colabora\u00e7\u00e3o corporativa est\u00e3o entre os principais vetores de ataques cibern\u00e9ticos O phishing via e-mail continua sendo um dos principais vetores de ataque para crimes digitais e, por consequ\u00eancia, a porta de entrada priorit\u00e1ria dos cibercriminosos. Em 2023, quase metade das amea\u00e7as bloqueadas pela\u00a0Trend Micro,\u00a0l\u00edder global em seguran\u00e7a cibern\u00e9tica,\u00a0ocorreu via e-mail. Esse [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-17T11:00:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/12\/E-mail-seguro-Trend-micro.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\"},\"headline\":\"Seguran\u00e7a no ambiente de colabora\u00e7\u00e3o e mensageria exige aten\u00e7\u00e3o especial das empresas\",\"datePublished\":\"2024-12-17T11:00:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\\\/\"},\"wordCount\":811,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/E-mail-seguro-Trend-micro.jpg\",\"keywords\":[\"cibercriminosos\",\"cibersecurity\",\"ferramentas colaborativas\",\"spear phishing\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\\\/\",\"name\":\"Seguran\u00e7a no ambiente de colabora\u00e7\u00e3o e mensageria exige aten\u00e7\u00e3o especial das empresas - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/E-mail-seguro-Trend-micro.jpg\",\"datePublished\":\"2024-12-17T11:00:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/E-mail-seguro-Trend-micro.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/E-mail-seguro-Trend-micro.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguran\u00e7a no ambiente de colabora\u00e7\u00e3o e mensageria exige aten\u00e7\u00e3o especial das empresas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seguran\u00e7a no ambiente de colabora\u00e7\u00e3o e mensageria exige aten\u00e7\u00e3o especial das empresas - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\/","og_locale":"en_US","og_type":"article","og_title":"Seguran\u00e7a no ambiente de colabora\u00e7\u00e3o e mensageria exige aten\u00e7\u00e3o especial das empresas - ABES","og_description":"E-mails e ferramentas de colabora\u00e7\u00e3o corporativa est\u00e3o entre os principais vetores de ataques cibern\u00e9ticos O phishing via e-mail continua sendo um dos principais vetores de ataque para crimes digitais e, por consequ\u00eancia, a porta de entrada priorit\u00e1ria dos cibercriminosos. Em 2023, quase metade das amea\u00e7as bloqueadas pela\u00a0Trend Micro,\u00a0l\u00edder global em seguran\u00e7a cibern\u00e9tica,\u00a0ocorreu via e-mail. Esse [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2024-12-17T11:00:30+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/12\/E-mail-seguro-Trend-micro.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1"},"headline":"Seguran\u00e7a no ambiente de colabora\u00e7\u00e3o e mensageria exige aten\u00e7\u00e3o especial das empresas","datePublished":"2024-12-17T11:00:30+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\/"},"wordCount":811,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/12\/E-mail-seguro-Trend-micro.jpg","keywords":["cibercriminosos","cibersecurity","ferramentas colaborativas","spear phishing"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\/","url":"https:\/\/abes.org.br\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\/","name":"Seguran\u00e7a no ambiente de colabora\u00e7\u00e3o e mensageria exige aten\u00e7\u00e3o especial das empresas - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/12\/E-mail-seguro-Trend-micro.jpg","datePublished":"2024-12-17T11:00:30+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/12\/E-mail-seguro-Trend-micro.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/12\/E-mail-seguro-Trend-micro.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/seguranca-no-ambiente-de-colaboracao-e-mensageria-exige-atencao-especial-das-empresas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Seguran\u00e7a no ambiente de colabora\u00e7\u00e3o e mensageria exige aten\u00e7\u00e3o especial das empresas"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes2\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-19 23:25:51","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/82507","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=82507"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/82507\/revisions"}],"predecessor-version":[{"id":82510,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/82507\/revisions\/82510"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/82509"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=82507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=82507"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=82507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}