Arquivo de Documentos Técnicos

Tópicos mais recentes:

An IT Leader’s Guide to Data Protection for the New Threatscape

As the world continues to recalibrate and recentre after many months of life-altering events, the cybercrime industry has become more lucrative than ever. The most common tactic? Ransomware. The average weekly ransomware activi...

Ver relatório

Top Four Steps to Reduce Ransomware Risk

Despite feeling quite prepared for ransomware incidents these days, most organizations have a greater level of concern about ransomware than any other cyberthreat. The experts from FortiGuard Labs, including our threat research...

Ver Checklist

Stop Ransomware With Ongoing Preparation

Reports of successful ransomware breaches continue to rise at an alarming rate. New malware strains and advanced extortion techniques have made an impact on businesses of all sizes and in every industry sector. As organizations...

Ver E-Paper

We’re With You on the Journey

The journey to ransomware readiness requires maintaining staff security skillsets and employee awareness, plus regularly updating network (virtual, physical, or cloud) defenses and processes. Turnover in staff and employees, ne...

Ver infográfico

Global Threat Landscape Report

Another half-year through unprecedented times has passed. But as unique as these times may feel, we continue to see familiar exploits, names, and attacks taking up space. To help you and your business feel confident in your abi...

Ver Documento Técnico

Repel Ransomware Attacks With Fortinet Proactive, Reactive, and Managed Services

Today’s organizations are changing rapidly to meet the needs of the times, including Software-as-a-Service (SaaS) apps and cloud adoption, remote users, increased business collaboration tools, new acquisitions, and employee and...

Ver Documento Técnico

Talking Up Self-Serve Kiosks in Healthcare Patient Check-In

More and more, self-service kiosks are integrating sensory capabilities that make them more “service” than “self.” For instance, recent advancements in computer vision now allow kiosks to “see” the subjects of their interaction...

Ver Documento Técnico

Building Ransomware Resilience

Ransomware has become a popular weapon in the hands of malicious actors who try to harm governments, businesses, and individuals daily. Ransomware is the final stage of a more complex attack. The security breach could have alr...

Ver E-Book

The potential of payroll: Global payroll survey 2022

With greater business ambitions come greater expectations – there’s no such thing as ‘business as usual’ anymore. Our comprehensive research into global payroll shows how this historically overlooked function has the potential ...

Ver E-Book

Uma Aula de Mestre sobre a Segurança de TI: Roger Grimes Ensina Você a Mitigar o Phishing

Os ataques de phishing percorreram um longo caminho desde os e-mails "spray-and-pray" [espalha e reza] de apenas algumas décadas atrás. Agora eles são mais direcionados, mais astutos e mais perigosos. E essa enorme lacuna de se...

Assistir ao Webinar a Pedido
Subscrever a nossa newsletter
As notícias mais importantes gratuitamente por email