{"id":4952,"date":"2019-08-20T08:00:24","date_gmt":"2019-08-20T11:00:24","guid":{"rendered":"http:\/\/www.rcodigital.com.br\/blog\/?p=4952"},"modified":"2022-05-25T20:11:18","modified_gmt":"2022-05-25T20:11:18","slug":"dicas-para-garantir-a-seguranca-digital-de-pmes","status":"publish","type":"post","link":"https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/","title":{"rendered":"Dicas para garantir a seguran\u00e7a digital de PMEs"},"content":{"rendered":"\n\t\t\t\t\n<h2 class=\"wp-block-heading\">Lista da Vivo sobre o assunto traz estrat\u00e9gias simples para que as pequenas e m\u00e9dias empresas consigam combater as ciberamea\u00e7as de maneira efetiva.<\/h2>\n\n\n\n<!--more-->\n\n\n\n<p>O uso cada vez maior de novas<a href=\"http:\/\/www.intergate.net.br\/blog\/7-passos-para-guiar-a-inovacao-tecnologica-em-empresas\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" tecnologias (opens in a new tab)\"> tecnologias<\/a> e ferramentas fez com que a seguran\u00e7a digital deixasse de ser uma preocupa\u00e7\u00e3o apenas das grandes organiza\u00e7\u00f5es, tornando-se tamb\u00e9m uma realidade presente nas pequenas e m\u00e9dias empresas (PMEs), conforme aponta a Vivo.<\/p>\n\n\n\n<p>Em novo comunicado sobre o assunto, a operadora  cita um estudo da Alian\u00e7a Nacional de Cyber Seguran\u00e7a nos EUA, segundo o qual <strong>6 em cada 10 PMEs n\u00e3o conseguem manter as portas abertas depois de um incidente de seguran\u00e7a.<\/strong> <\/p>\n\n\n\n<p>Por conta disso, a Vivo, que recentemente integrou a ElevenPaths, unidade global de ciberseguran\u00e7a do Grupo Telef\u00f3nica, \u00e0 sua estrat\u00e9gia, listou algumas dicas simples para auxiliar&nbsp;as pequenas e m\u00e9dias empresas no combate de amea\u00e7as cibern\u00e9ticas, assim como na prote\u00e7\u00e3o, detec\u00e7\u00e3o e solu\u00e7\u00e3o de problemas. Confira abaixo!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Dicas para garantir a seguran\u00e7a digital de PMEs <\/h2>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" src=\"http:\/\/intergate.net.br\/blog\/wp-content\/uploads\/2019\/08\/cadeado-fechado-no-fundo-digital-seguranca-cibernetica_42077-2752.jpg\" alt=\"\" class=\"wp-image-5053\" width=\"467\" height=\"304\" srcset=\"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2019\/08\/cadeado-fechado-no-fundo-digital-seguranca-cibernetica_42077-2752.jpg 626w, https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2019\/08\/cadeado-fechado-no-fundo-digital-seguranca-cibernetica_42077-2752-600x390.jpg 600w, https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2019\/08\/cadeado-fechado-no-fundo-digital-seguranca-cibernetica_42077-2752-300x195.jpg 300w\" sizes=\"(max-width: 467px) 100vw, 467px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>1-Monitorar e controlar o acesso \u00e0 internet e ao e-mail<\/strong><\/h2>\n\n\n\n<p><strong>Websites maliciosos e e-mails s\u00e3o os principais vetores de contamina\u00e7\u00e3o de dispositivos e comprometimento de dados pessoais<\/strong>. Adotar solu\u00e7\u00f5es de monitoramento e controle de acesso \u00e0 internet e ao e-mail \u00e9 uma t\u00e1tica eficaz que pode evitar boa parte das amea\u00e7as digitais.<\/p>\n\n\n\n<p> Por meio dessas <a rel=\"noreferrer noopener\" aria-label=\"solu\u00e7\u00f5es (opens in a new tab)\" href=\"http:\/\/www.intergate.net.br\/blog\/estudo-machine-learning-para-seguranca-da-informacao\/\" target=\"_blank\">solu\u00e7\u00f5es<\/a>, as pequenas e m\u00e9dias empresas podem definir o que pode ser acessado, quando e por quem, al\u00e9m disso essas solu\u00e7\u00f5es contam com bases de dados com as amea\u00e7as conhecidas que s\u00e3o atualizadas continuamente por redes de intelig\u00eancia globais, impedindo acesso a links, anexos e sites que sejam classificados como perigosos.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>2-Utilizar um antiv\u00edrus pago<\/strong><\/h2>\n\n\n\n<p><strong>Pode parecer uma solu\u00e7\u00e3o prosaica, mas utilizar um antiv\u00edrus pago \u00e9 o primeiro passo para proteger os dispositivos<\/strong> \u2013 ou&nbsp;<em>endpoint<\/em>&nbsp;no jarg\u00e3o t\u00e9cnico \u2013 de amea\u00e7as conhecidas ou n\u00e3o. <\/p>\n\n\n\n<p>As solu\u00e7\u00f5es gratuitas oferecem prote\u00e7\u00e3o muito b\u00e1sica contra um conjunto reduzido de amea\u00e7as j\u00e1 conhecidas, diferentemente das pagas que j\u00e1 incluem recursos avan\u00e7ados de varredura e e-mail, arquivos, downloads e at\u00e9 an\u00e1lise de programas em execu\u00e7\u00e3o no&nbsp;<em>endpoint.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>3-Adotar gest\u00e3o na Nuvem<\/strong><\/h2>\n\n\n\n<p><strong>Adotar <a rel=\"noreferrer noopener\" aria-label=\"servi\u00e7os em nuvem (opens in a new tab)\" href=\"http:\/\/www.intergate.net.br\/blog\/sap-diz-queremos-todas-as-empresas-na-nuvem\/\" target=\"_blank\">servi\u00e7os em nuvem<\/a> pode ser uma boa alternativa \u00e0s pequenas e m\u00e9dias empresas. Normalmente essas plataformas j\u00e1 t\u00eam recursos de seguran\u00e7a \u201c<\/strong><em><strong>built-in<\/strong><\/em><strong>\u201d<\/strong>, redund\u00e2ncia e alta disponibilidade. Ter, por exemplo, e-mails e arquivos armazenados em nuvem pode evitar um desastre caso o ambiente interno da empresa seja comprometido. <\/p>\n\n\n\n<p>No entanto, \u00e9 preciso saber que toda a seguran\u00e7a proposta por servi\u00e7os em nuvem cai por terra se o usu\u00e1rio n\u00e3o levar em considera\u00e7\u00e3o nossa pr\u00f3xima dica, o uso correto de senhas.<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" src=\"http:\/\/intergate.net.br\/blog\/wp-content\/uploads\/2019\/08\/cloud-upload-icon-line-conexao-da-placa-de-circuito_1379-890.jpg\" alt=\"\" class=\"wp-image-5054\" width=\"468\" height=\"263\" srcset=\"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2019\/08\/cloud-upload-icon-line-conexao-da-placa-de-circuito_1379-890.jpg 626w, https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2019\/08\/cloud-upload-icon-line-conexao-da-placa-de-circuito_1379-890-600x337.jpg 600w, https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2019\/08\/cloud-upload-icon-line-conexao-da-placa-de-circuito_1379-890-300x169.jpg 300w\" sizes=\"(max-width: 468px) 100vw, 468px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>4-<\/strong><strong>Pol\u00edtica de uso de senhas e usu\u00e1rios<\/strong><\/h2>\n\n\n\n<p><strong>Neste ano, o Centro Nacional de Ciberseguran\u00e7a do Reino Unido descobriu que mais 23 milh\u00f5es de contas ainda utilizavam \u201c123456\u201d como senha.<\/strong> Se esse dado por si s\u00f3 j\u00e1 \u00e9 preocupante, metade dos usu\u00e1rios pesquisados usavam a mesma senha para e-mail e outros servi\u00e7os.<\/p>\n\n\n\n<p> Se imaginarmos que o e-mail \u00e9 por onde recuperamos a maioria das senhas, temos a ideia de como \u00e9 f\u00e1cil para um cibercriminoso obter dados pessoais e cometer fraudes.<\/p>\n\n\n\n<p><strong>O usu\u00e1rio deve usar uma senha para cada servi\u00e7o na internet, contendo ao menos 8 caracteres, com letras mai\u00fasculas e min\u00fasculas, n\u00fameros e caracteres especiais.<\/strong> Al\u00e9m disso, \u00e9 recomend\u00e1vel usar um segundo fator de autentica\u00e7\u00e3o, normalmente um app que oferece c\u00f3digos rand\u00f4micos que devem ser inseridos com as credenciais. <\/p>\n\n\n\n<p>Para facilitar a gest\u00e3o das senhas que se acumulam com os m\u00faltiplos servi\u00e7os utilizados, pode-se usar um cofre de senha, recurso que mant\u00e9m todos os dados armazenados de maneira segura, preenche automaticamente formul\u00e1rios e demanda uma \u00fanica senha mestra.<\/p>\n\n\n\n<p>Esperamos que esse texto tenha sido \u00fatil e que as dicas para garantir a seguran\u00e7a digital de PMEs sejam lembradas.<\/p>\n\n\n<p><strong>FONTE<\/strong>: <em>Computerworld<\/em><\/p>\n\n\n<p><\/p>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Lista da Vivo sobre o assunto traz estrat\u00e9gias simples para que as pequenas e m\u00e9dias empresas consigam combater as ciberamea\u00e7as de maneira efetiva.<\/p>\n","protected":false},"author":5,"featured_media":5062,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[18,5,13],"tags":[114,124,496],"class_list":["post-4952","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-erp","category-gestao-empresarial","category-categoria-tecnologia","tag-ciberameacas","tag-cloudplataform","tag-seguranca"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Dicas para garantir a seguran\u00e7a digital de PMEs - Blog InterGATE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dicas para garantir a seguran\u00e7a digital de PMEs - Blog InterGATE\" \/>\n<meta property=\"og:description\" content=\"Lista da Vivo sobre o assunto traz estrat\u00e9gias simples para que as pequenas e m\u00e9dias empresas consigam combater as ciberamea\u00e7as de maneira efetiva.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog InterGATE\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-20T11:00:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-25T20:11:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2019\/08\/cadeado.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"371\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Monica Nietsche\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Monica Nietsche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/dicas-para-garantir-a-seguranca-digital-de-pmes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/dicas-para-garantir-a-seguranca-digital-de-pmes\\\/\"},\"author\":{\"name\":\"Monica Nietsche\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#\\\/schema\\\/person\\\/6b1a11e7323bddf910bfd7b20b262288\"},\"headline\":\"Dicas para garantir a seguran\u00e7a digital de PMEs\",\"datePublished\":\"2019-08-20T11:00:24+00:00\",\"dateModified\":\"2022-05-25T20:11:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/dicas-para-garantir-a-seguranca-digital-de-pmes\\\/\"},\"wordCount\":689,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/dicas-para-garantir-a-seguranca-digital-de-pmes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/cadeado.jpg\",\"keywords\":[\"ciberamea\u00e7as\",\"cloudplataform\",\"seguran\u00e7a\"],\"articleSection\":[\"ERP\",\"Gest\u00e3o Empresarial\",\"Tecnologias\"],\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/dicas-para-garantir-a-seguranca-digital-de-pmes\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/dicas-para-garantir-a-seguranca-digital-de-pmes\\\/\",\"url\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/dicas-para-garantir-a-seguranca-digital-de-pmes\\\/\",\"name\":\"Dicas para garantir a seguran\u00e7a digital de PMEs - Blog InterGATE\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/dicas-para-garantir-a-seguranca-digital-de-pmes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/dicas-para-garantir-a-seguranca-digital-de-pmes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/cadeado.jpg\",\"datePublished\":\"2019-08-20T11:00:24+00:00\",\"dateModified\":\"2022-05-25T20:11:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/dicas-para-garantir-a-seguranca-digital-de-pmes\\\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/dicas-para-garantir-a-seguranca-digital-de-pmes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/dicas-para-garantir-a-seguranca-digital-de-pmes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/cadeado.jpg\",\"contentUrl\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/cadeado.jpg\",\"width\":660,\"height\":371,\"caption\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/dicas-para-garantir-a-seguranca-digital-de-pmes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dicas para garantir a seguran\u00e7a digital de PMEs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/\",\"name\":\"Blog InterGATE\",\"description\":\"Integra\u00e7\u00e3o de Sistemas com os ERPs SAP Business One ou Totvs Protheus\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#organization\",\"name\":\"InterGATE Consultoria Digital\",\"url\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/intergateLogo_original.jpg\",\"contentUrl\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/intergateLogo_original.jpg\",\"width\":512,\"height\":512,\"caption\":\"InterGATE Consultoria Digital\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/35540154\",\"https:\\\/\\\/www.youtube.com\\\/@intergateconsultoriadigita8503\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#\\\/schema\\\/person\\\/6b1a11e7323bddf910bfd7b20b262288\",\"name\":\"Monica Nietsche\",\"url\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/author\\\/monica\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dicas para garantir a seguran\u00e7a digital de PMEs - Blog InterGATE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/","og_locale":"pt_PT","og_type":"article","og_title":"Dicas para garantir a seguran\u00e7a digital de PMEs - Blog InterGATE","og_description":"Lista da Vivo sobre o assunto traz estrat\u00e9gias simples para que as pequenas e m\u00e9dias empresas consigam combater as ciberamea\u00e7as de maneira efetiva.","og_url":"https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/","og_site_name":"Blog InterGATE","article_published_time":"2019-08-20T11:00:24+00:00","article_modified_time":"2022-05-25T20:11:18+00:00","og_image":[{"width":660,"height":371,"url":"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2019\/08\/cadeado.jpg","type":"image\/jpeg"}],"author":"Monica Nietsche","twitter_misc":{"Escrito por":"Monica Nietsche","Tempo estimado de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/#article","isPartOf":{"@id":"https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/"},"author":{"name":"Monica Nietsche","@id":"https:\/\/www.intergate.net.br\/blog\/#\/schema\/person\/6b1a11e7323bddf910bfd7b20b262288"},"headline":"Dicas para garantir a seguran\u00e7a digital de PMEs","datePublished":"2019-08-20T11:00:24+00:00","dateModified":"2022-05-25T20:11:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/"},"wordCount":689,"commentCount":0,"publisher":{"@id":"https:\/\/www.intergate.net.br\/blog\/#organization"},"image":{"@id":"https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2019\/08\/cadeado.jpg","keywords":["ciberamea\u00e7as","cloudplataform","seguran\u00e7a"],"articleSection":["ERP","Gest\u00e3o Empresarial","Tecnologias"],"inLanguage":"pt-PT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/","url":"https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/","name":"Dicas para garantir a seguran\u00e7a digital de PMEs - Blog InterGATE","isPartOf":{"@id":"https:\/\/www.intergate.net.br\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/#primaryimage"},"image":{"@id":"https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2019\/08\/cadeado.jpg","datePublished":"2019-08-20T11:00:24+00:00","dateModified":"2022-05-25T20:11:18+00:00","breadcrumb":{"@id":"https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/#primaryimage","url":"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2019\/08\/cadeado.jpg","contentUrl":"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2019\/08\/cadeado.jpg","width":660,"height":371,"caption":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.intergate.net.br\/blog\/dicas-para-garantir-a-seguranca-digital-de-pmes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.intergate.net.br\/blog\/"},{"@type":"ListItem","position":2,"name":"Dicas para garantir a seguran\u00e7a digital de PMEs"}]},{"@type":"WebSite","@id":"https:\/\/www.intergate.net.br\/blog\/#website","url":"https:\/\/www.intergate.net.br\/blog\/","name":"Blog InterGATE","description":"Integra\u00e7\u00e3o de Sistemas com os ERPs SAP Business One ou Totvs Protheus","publisher":{"@id":"https:\/\/www.intergate.net.br\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intergate.net.br\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/www.intergate.net.br\/blog\/#organization","name":"InterGATE Consultoria Digital","url":"https:\/\/www.intergate.net.br\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.intergate.net.br\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2025\/06\/intergateLogo_original.jpg","contentUrl":"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2025\/06\/intergateLogo_original.jpg","width":512,"height":512,"caption":"InterGATE Consultoria Digital"},"image":{"@id":"https:\/\/www.intergate.net.br\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/35540154","https:\/\/www.youtube.com\/@intergateconsultoriadigita8503"]},{"@type":"Person","@id":"https:\/\/www.intergate.net.br\/blog\/#\/schema\/person\/6b1a11e7323bddf910bfd7b20b262288","name":"Monica Nietsche","url":"https:\/\/www.intergate.net.br\/blog\/author\/monica\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/posts\/4952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/comments?post=4952"}],"version-history":[{"count":0,"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/posts\/4952\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/media\/5062"}],"wp:attachment":[{"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/media?parent=4952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/categories?post=4952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/tags?post=4952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}