{"id":8642,"date":"2025-03-14T17:37:41","date_gmt":"2025-03-14T17:37:41","guid":{"rendered":"https:\/\/www.intergate.net.br\/blog\/?p=8642"},"modified":"2025-10-14T17:33:09","modified_gmt":"2025-10-14T20:33:09","slug":"o-que-e-engenharia-social-na-cyber-seguranca","status":"publish","type":"post","link":"https:\/\/www.intergate.net.br\/blog\/o-que-e-engenharia-social-na-cyber-seguranca\/","title":{"rendered":"O que \u00e9 engenharia social na Cyber seguran\u00e7a?"},"content":{"rendered":"\n<p>A engenharia social \u00e9 uma maneira de manipular as v\u00edtimas para conseguir informa\u00e7\u00f5es pessoais com o fim de realizar um ataque que pode comprometer a seguran\u00e7a pessoal ou a seguran\u00e7a de uma rede corporativa.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>Baixar software que n\u00e3o deveriam baixar, visitar sites que n\u00e3o deveriam visitar, enviar dinheiro para criminosos ou cometer outros erros que comprometam sua <a href=\"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2020\/10\/seguranca_de_dados-1.png\">seguran\u00e7a pessoal ou organizacional<\/a>.<\/p>\n\n\n\n<p>Um e-mail que parece ser de um colega de trabalho confi\u00e1vel solicitando informa\u00e7\u00f5es confidenciais, uma mensagem de voz amea\u00e7adora alegando ser da Receita Federal e uma oferta de riquezas de um potentado estrangeiro s\u00e3o apenas alguns exemplos de engenharia social.<\/p>\n\n\n\n<p>Como a engenharia social utiliza manipula\u00e7\u00e3o psicol\u00f3gica e explora o erro ou fraqueza humana em vez de vulnerabilidades t\u00e9cnicas ou de sistemas digitais, tamb\u00e9m \u00e9 conhecida como &#8220;<strong>hacking humano<\/strong>&#8220;.<\/p>\n\n\n\n<p>Os cibercriminosos frequentemente utilizam t\u00e1ticas de engenharia social para obter&nbsp;<strong>dados pessoais ou informa\u00e7\u00f5es financeiras<\/strong>, incluindo credenciais de acesso, n\u00fameros de cart\u00e3o de cr\u00e9dito, n\u00fameros de contas banc\u00e1rias e n\u00fameros da previd\u00eancia social.<\/p>\n\n\n\n<p>Eles utilizam as informa\u00e7\u00f5es que obt\u00eam para praticar roubo de identidade, podendo fazer compras com o dinheiro ou cr\u00e9dito de outras pessoas, solicitar empr\u00e9stimos em nome de outras pessoas, solicitar o seguro-desemprego de outras pessoas e outros crimes. <\/p>\n\n\n\n<p>Mas, um ataque de engenharia social tamb\u00e9m pode ser o primeiro est\u00e1gio de um\u00a0<a href=\"https:\/\/www.ibm.com\/br-pt\/topics\/cyber-attack\">ciberataque<\/a>\u00a0em grande escala.<\/p>\n\n\n\n<p>Por exemplo, um cibercriminoso pode enganar uma v\u00edtima para compartilhar um nome de usu\u00e1rio com senha e usar essas credenciais para plantar&nbsp;<a href=\"https:\/\/www.ibm.com\/br-pt\/topics\/ransomware\">ransomware<\/a>&nbsp;na rede do empregador da v\u00edtima.<\/p>\n\n\n\n<p><strong>A engenharia social \u00e9 atraente para os cibercriminosos, pois permite que acessem redes digitais, dispositivos e contas sem terem que fazer o trabalho t\u00e9cnico dif\u00edcil de superar firewalls, software antiv\u00edrus e outros controles de\u00a0seguran\u00e7a cibern\u00e9tica.<\/strong><\/p>\n\n\n\n<p>Essa \u00e9 uma das raz\u00f5es pelas quais a engenharia social \u00e9 a principal causa de comprometimento de redes atualmente de acordo com o\u00a0relat\u00f3rio State of Cybersecurity 2022 da\u00a0ISACA (link fora de ibm.com). <\/p>\n\n\n\n<p>De acordo com o relat\u00f3rio\u00a0Cost of a Data Breach 2024\u00a0da IBM, as viola\u00e7\u00f5es causadas por t\u00e1ticas de engenharia social (como phishing e comprometimento de e-mail comercial) estavam entre as mais caras.Relat\u00f3rioIBM Security X-Force Threat Intelligence Index<\/p>\n\n\n\n<p><strong>FONTE<\/strong>: <a href=\"https:\/\/www.ibm.com\/br-pt\/topics\/social-engineering#:~:text=A%20engenharia%20social%20%C3%A9%20uma,seguran%C3%A7a%20de%20uma%20rede%20corporativa.\">Blog IBM<\/a><\/p>\n\n\n\n<p><strong>FONTE IMAGEM<\/strong>: Imagem de freepik<\/p>\n","protected":false},"excerpt":{"rendered":"<p>O que \u00e9 engenharia social na Cyber seguran\u00e7a?<\/p>\n","protected":false},"author":5,"featured_media":8643,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[5],"tags":[754,755,757,756],"class_list":["post-8642","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-gestao-empresarial","tag-cyberseguranca","tag-engenhariasocial","tag-ransomware","tag-segurancacibernetica"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>O que \u00e9 engenharia social na Cyber seguran\u00e7a? - Blog InterGATE<\/title>\n<meta name=\"description\" content=\"O que \u00e9 engenharia social na Cyber seguran\u00e7a?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intergate.net.br\/blog\/o-que-e-engenharia-social-na-cyber-seguranca\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"O que \u00e9 engenharia social na Cyber seguran\u00e7a? - Blog InterGATE\" \/>\n<meta property=\"og:description\" content=\"O que \u00e9 engenharia social na Cyber seguran\u00e7a?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intergate.net.br\/blog\/o-que-e-engenharia-social-na-cyber-seguranca\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog InterGATE\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-14T17:37:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-14T20:33:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2025\/03\/engenharia-socia.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"376\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Monica Nietsche\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Monica Nietsche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/o-que-e-engenharia-social-na-cyber-seguranca\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/o-que-e-engenharia-social-na-cyber-seguranca\\\/\"},\"author\":{\"name\":\"Monica Nietsche\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#\\\/schema\\\/person\\\/6b1a11e7323bddf910bfd7b20b262288\"},\"headline\":\"O que \u00e9 engenharia social na Cyber seguran\u00e7a?\",\"datePublished\":\"2025-03-14T17:37:41+00:00\",\"dateModified\":\"2025-10-14T20:33:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/o-que-e-engenharia-social-na-cyber-seguranca\\\/\"},\"wordCount\":414,\"publisher\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/o-que-e-engenharia-social-na-cyber-seguranca\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/engenharia-socia.jpg\",\"keywords\":[\"Cyberseguranca\",\"engenhariasocial\",\"ransomware\",\"segurancacibernetica\"],\"articleSection\":[\"Gest\u00e3o Empresarial\"],\"inLanguage\":\"pt-PT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/o-que-e-engenharia-social-na-cyber-seguranca\\\/\",\"url\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/o-que-e-engenharia-social-na-cyber-seguranca\\\/\",\"name\":\"O que \u00e9 engenharia social na Cyber seguran\u00e7a? - Blog InterGATE\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/o-que-e-engenharia-social-na-cyber-seguranca\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/o-que-e-engenharia-social-na-cyber-seguranca\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/engenharia-socia.jpg\",\"datePublished\":\"2025-03-14T17:37:41+00:00\",\"dateModified\":\"2025-10-14T20:33:09+00:00\",\"description\":\"O que \u00e9 engenharia social na Cyber seguran\u00e7a?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/o-que-e-engenharia-social-na-cyber-seguranca\\\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/o-que-e-engenharia-social-na-cyber-seguranca\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/o-que-e-engenharia-social-na-cyber-seguranca\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/engenharia-socia.jpg\",\"contentUrl\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/engenharia-socia.jpg\",\"width\":660,\"height\":376},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/o-que-e-engenharia-social-na-cyber-seguranca\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"O que \u00e9 engenharia social na Cyber seguran\u00e7a?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/\",\"name\":\"Blog InterGATE\",\"description\":\"Integra\u00e7\u00e3o de Sistemas com os ERPs SAP Business One ou Totvs Protheus\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#organization\",\"name\":\"InterGATE Consultoria Digital\",\"url\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/intergateLogo_original.jpg\",\"contentUrl\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/intergateLogo_original.jpg\",\"width\":512,\"height\":512,\"caption\":\"InterGATE Consultoria Digital\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/35540154\",\"https:\\\/\\\/www.youtube.com\\\/@intergateconsultoriadigita8503\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/#\\\/schema\\\/person\\\/6b1a11e7323bddf910bfd7b20b262288\",\"name\":\"Monica Nietsche\",\"url\":\"https:\\\/\\\/www.intergate.net.br\\\/blog\\\/author\\\/monica\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"O que \u00e9 engenharia social na Cyber seguran\u00e7a? - Blog InterGATE","description":"O que \u00e9 engenharia social na Cyber seguran\u00e7a?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intergate.net.br\/blog\/o-que-e-engenharia-social-na-cyber-seguranca\/","og_locale":"pt_PT","og_type":"article","og_title":"O que \u00e9 engenharia social na Cyber seguran\u00e7a? - Blog InterGATE","og_description":"O que \u00e9 engenharia social na Cyber seguran\u00e7a?","og_url":"https:\/\/www.intergate.net.br\/blog\/o-que-e-engenharia-social-na-cyber-seguranca\/","og_site_name":"Blog InterGATE","article_published_time":"2025-03-14T17:37:41+00:00","article_modified_time":"2025-10-14T20:33:09+00:00","og_image":[{"width":660,"height":376,"url":"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2025\/03\/engenharia-socia.jpg","type":"image\/jpeg"}],"author":"Monica Nietsche","twitter_misc":{"Escrito por":"Monica Nietsche","Tempo estimado de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intergate.net.br\/blog\/o-que-e-engenharia-social-na-cyber-seguranca\/#article","isPartOf":{"@id":"https:\/\/www.intergate.net.br\/blog\/o-que-e-engenharia-social-na-cyber-seguranca\/"},"author":{"name":"Monica Nietsche","@id":"https:\/\/www.intergate.net.br\/blog\/#\/schema\/person\/6b1a11e7323bddf910bfd7b20b262288"},"headline":"O que \u00e9 engenharia social na Cyber seguran\u00e7a?","datePublished":"2025-03-14T17:37:41+00:00","dateModified":"2025-10-14T20:33:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intergate.net.br\/blog\/o-que-e-engenharia-social-na-cyber-seguranca\/"},"wordCount":414,"publisher":{"@id":"https:\/\/www.intergate.net.br\/blog\/#organization"},"image":{"@id":"https:\/\/www.intergate.net.br\/blog\/o-que-e-engenharia-social-na-cyber-seguranca\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2025\/03\/engenharia-socia.jpg","keywords":["Cyberseguranca","engenhariasocial","ransomware","segurancacibernetica"],"articleSection":["Gest\u00e3o Empresarial"],"inLanguage":"pt-PT"},{"@type":"WebPage","@id":"https:\/\/www.intergate.net.br\/blog\/o-que-e-engenharia-social-na-cyber-seguranca\/","url":"https:\/\/www.intergate.net.br\/blog\/o-que-e-engenharia-social-na-cyber-seguranca\/","name":"O que \u00e9 engenharia social na Cyber seguran\u00e7a? - Blog InterGATE","isPartOf":{"@id":"https:\/\/www.intergate.net.br\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intergate.net.br\/blog\/o-que-e-engenharia-social-na-cyber-seguranca\/#primaryimage"},"image":{"@id":"https:\/\/www.intergate.net.br\/blog\/o-que-e-engenharia-social-na-cyber-seguranca\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2025\/03\/engenharia-socia.jpg","datePublished":"2025-03-14T17:37:41+00:00","dateModified":"2025-10-14T20:33:09+00:00","description":"O que \u00e9 engenharia social na Cyber seguran\u00e7a?","breadcrumb":{"@id":"https:\/\/www.intergate.net.br\/blog\/o-que-e-engenharia-social-na-cyber-seguranca\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intergate.net.br\/blog\/o-que-e-engenharia-social-na-cyber-seguranca\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.intergate.net.br\/blog\/o-que-e-engenharia-social-na-cyber-seguranca\/#primaryimage","url":"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2025\/03\/engenharia-socia.jpg","contentUrl":"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2025\/03\/engenharia-socia.jpg","width":660,"height":376},{"@type":"BreadcrumbList","@id":"https:\/\/www.intergate.net.br\/blog\/o-que-e-engenharia-social-na-cyber-seguranca\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.intergate.net.br\/blog\/"},{"@type":"ListItem","position":2,"name":"O que \u00e9 engenharia social na Cyber seguran\u00e7a?"}]},{"@type":"WebSite","@id":"https:\/\/www.intergate.net.br\/blog\/#website","url":"https:\/\/www.intergate.net.br\/blog\/","name":"Blog InterGATE","description":"Integra\u00e7\u00e3o de Sistemas com os ERPs SAP Business One ou Totvs Protheus","publisher":{"@id":"https:\/\/www.intergate.net.br\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intergate.net.br\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/www.intergate.net.br\/blog\/#organization","name":"InterGATE Consultoria Digital","url":"https:\/\/www.intergate.net.br\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.intergate.net.br\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2025\/06\/intergateLogo_original.jpg","contentUrl":"https:\/\/www.intergate.net.br\/blog\/wp-content\/uploads\/2025\/06\/intergateLogo_original.jpg","width":512,"height":512,"caption":"InterGATE Consultoria Digital"},"image":{"@id":"https:\/\/www.intergate.net.br\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/35540154","https:\/\/www.youtube.com\/@intergateconsultoriadigita8503"]},{"@type":"Person","@id":"https:\/\/www.intergate.net.br\/blog\/#\/schema\/person\/6b1a11e7323bddf910bfd7b20b262288","name":"Monica Nietsche","url":"https:\/\/www.intergate.net.br\/blog\/author\/monica\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/posts\/8642","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/comments?post=8642"}],"version-history":[{"count":0,"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/posts\/8642\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/media\/8643"}],"wp:attachment":[{"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/media?parent=8642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/categories?post=8642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intergate.net.br\/blog\/wp-json\/wp\/v2\/tags?post=8642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}