{"id":1850,"date":"2022-07-17T16:17:18","date_gmt":"2022-07-17T23:17:18","guid":{"rendered":"https:\/\/32dd069598.nxcli.io\/servicos\/ciber-seguranca\/"},"modified":"2025-08-28T06:53:02","modified_gmt":"2025-08-28T13:53:02","slug":"ciber-seguranca","status":"publish","type":"page","link":"https:\/\/www.ethosvirtual.com\/pt-br\/servicos\/ciber-seguranca\/","title":{"rendered":"Ciberseguran\u00e7a"},"content":{"rendered":"<div id='layer_slider_1'  class='avia-layerslider main_color avia-shadow  avia-builder-el-0  el_before_av_section  avia-builder-el-first  container_wrap sidebar_right'  style='height: 101px;'  ><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-rmw8n-259993399df6bb250809e718e2e3b8c8\">\n.avia-section.av-rmw8n-259993399df6bb250809e718e2e3b8c8{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/07\/bg-E.png);\nbackground-position:0% 100%;\nbackground-attachment:scroll;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-rmw8n-259993399df6bb250809e718e2e3b8c8 main_color avia-section-default avia-no-border-styling  avia-builder-el-1  el_after_av_layerslider  avia-builder-el-last  avia-bg-style-scroll container_wrap sidebar_right'  data-section-bg-repeat='no-repeat'><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-1850'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-2d3xb-83b93aa0ba9250ed400ced14c996172d av_one_fourth  avia-builder-el-2  el_before_av_three_fourth  avia-builder-el-first  first flex_column_div  '     ><div  class='avia-builder-widget-area clearfix  avia-builder-el-3  avia-builder-el-no-sibling '><div id=\"nav_menu-2\" class=\"widget clearfix widget_nav_menu\"><h3 class=\"widgettitle\">IT Services<\/h3><div class=\"menu-sidebar-it-services-container\"><ul id=\"menu-sidebar-it-services\" class=\"menu\"><li id=\"menu-item-906\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-906\"><a href=\"https:\/\/www.ethosvirtual.com\/it-infrastructure\/\">Infraestrutura de TI<\/a><\/li>\n<li id=\"menu-item-907\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-907\"><a href=\"https:\/\/www.ethosvirtual.com\/erp\/\">ERP<\/a><\/li>\n<li id=\"menu-item-908\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-908\"><a href=\"https:\/\/www.ethosvirtual.com\/services\/cyber-security\/\">Ciberseguran\u00e7a<\/a><\/li>\n<li id=\"menu-item-909\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-909\"><a href=\"https:\/\/www.ethosvirtual.com\/services\/business-intelligence\/\">Intelig\u00eancia Empresarial<\/a><\/li>\n<li id=\"menu-item-910\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-910\"><a href=\"https:\/\/www.ethosvirtual.com\/services\/it-management\/\">Gerenciamento de TI<\/a><\/li>\n<\/ul><\/div><\/div><\/div><\/div><div  class='flex_column av-9ttjb-037f7d8fbfcc500a94dc1dd4ad3fc1fe av_three_fourth  avia-builder-el-4  el_after_av_one_fourth  avia-builder-el-last  flex_column_div  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l6c4q4r1-e15de49818c1f7685214107e1b38f75b\">\n#top .av-special-heading.av-l6c4q4r1-e15de49818c1f7685214107e1b38f75b{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-l6c4q4r1-e15de49818c1f7685214107e1b38f75b .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l6c4q4r1-e15de49818c1f7685214107e1b38f75b .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l6c4q4r1-e15de49818c1f7685214107e1b38f75b av-special-heading-h2  avia-builder-el-5  el_before_av_textblock  avia-builder-el-first '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Pacotes de seguran\u00e7a<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l6c4ykzg-2bd91af2bb2c7e21d01f6833578ecee6 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Ethos Security Packages are designed to offer different levels of protection for your business depending on currrent needs and threat levels.<\/p>\n<p><b><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-983 size-full alignright\" src=\"https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-Security-Package-xsm.png\" alt=\"\" width=\"150\" height=\"152\" srcset=\"https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-Security-Package-xsm.png 150w, https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-Security-Package-xsm-80x80.png 80w, https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-Security-Package-xsm-36x36.png 36w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>Package #1: Basic<\/b> &#8211; Our basic security package includes ISO 270001 diagnostics, All Aboard Training, an invitation to Ethos Cyber Security Week, and LGPD Implementation.<\/p>\n<p><b>Package #2: Intermediate<\/b> &#8211; All features included with our basic security package, plus: monitoring, server logs, server updates, firewall, internet connections, backups, server antivirus, SI Advisor (security information) role and implementation of SI policies, monthly security reports, threat analysis.<\/p>\n<p><b>Package #3: Advanced<\/b> &#8211; All features included with our basic and intermediate packages, plus:\u00a0 endpoint monitoring, antivirus, email, data loss prevention (DLP),\u00a0 SIEM, real-time threat monitoring via Ethos Security Operation Centre (SOC), Security Information Manager (SI), a dedicated security manager<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-l6qeulxc-e2736106e11000de0b3af4bac725c8da-wrap avia-button-left  avia-builder-el-7  el_after_av_textblock  el_before_av_heading '><a href='https:\/\/www.ethosvirtual.com\/pt-br\/servicos\/ciber-seguranca\/pacotes-de-seguranca\/'  class='avia-button av-l6qeulxc-e2736106e11000de0b3af4bac725c8da av-link-btn avia-icon_select-no avia-size-large avia-position-left avia-color-theme-color'   aria-label=\"Ver todos os pacotes de seguran\u00e7a\"><span class='avia_iconbox_title' >Ver todos os pacotes de seguran\u00e7a<\/span><\/a><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l6c2r3b8-37f0032b960b1938493a27cce2cf3fe3\">\n#top .av-special-heading.av-l6c2r3b8-37f0032b960b1938493a27cce2cf3fe3{\npadding-bottom:0;\n}\nbody .av-special-heading.av-l6c2r3b8-37f0032b960b1938493a27cce2cf3fe3 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l6c2r3b8-37f0032b960b1938493a27cce2cf3fe3 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l6c2r3b8-37f0032b960b1938493a27cce2cf3fe3 av-special-heading-h1 blockquote modern-quote  avia-builder-el-8  el_after_av_button  el_before_av_heading '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Ciberseguran\u00e7a<\/h1><div class='av-subheading av-subheading_below'><p>Ajudamos a garantir que seus dados e infraestrutura estejam protegidos<\/p>\n<\/div><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l6c3ri0n-3ae8bd06426091425add83d0fbfd6d92\">\n#top .av-special-heading.av-l6c3ri0n-3ae8bd06426091425add83d0fbfd6d92{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-l6c3ri0n-3ae8bd06426091425add83d0fbfd6d92 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l6c3ri0n-3ae8bd06426091425add83d0fbfd6d92 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l6c3ri0n-3ae8bd06426091425add83d0fbfd6d92 av-special-heading-h2  avia-builder-el-9  el_after_av_heading  el_before_av_textblock '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Oficial Virtual de Seguran\u00e7a da Informa\u00e7\u00e3o (vISO)<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l6c49vhk-186e90a2b7c6cf1e199faa38ecf611d3 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-970 size-medium alignleft\" src=\"https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-Virtual-Information-Security-Officer-vISO-ISO-625-300x175.jpg\" alt=\"\" width=\"300\" height=\"175\" srcset=\"https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-Virtual-Information-Security-Officer-vISO-ISO-625-300x175.jpg 300w, https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-Virtual-Information-Security-Officer-vISO-ISO-625.jpg 625w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>The CISO plays a very important role in the management of information security for any company. Taking care of data goes far beyond installing a firewall and antivirus, especially in today&#8217;s times, when we often deal with increasingly elaborate cyber threats.<\/p>\n<p>Understanding that data goes through different states with different vulnerabilities, this professional needs to have a broader look and, above all, identify and assess potential risks, in addition to making sure that all employees are involved in good security practices. It is responsible for providing leadership, training opportunities and mentoring to the organization&#8217;s team.<\/p>\n<p>Strategies for managing security also come from your vCISO, both in hardware and software, in policies, and even in the physical environment. Ensuring that everyone in the company adheres to the established rules, the CISO can be said to have overall responsibility for creating and maintaining more secure policies for the company with regard to how it handles information. In this way, their work is mainly preventive. The idea is to identify potential threats before they happen, in order to avoid more serious damage to the company and its reputation.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-l6qeq5x0-935b1e6399836b69541dd2fd1ee00a78-wrap avia-button-left  avia-builder-el-11  el_after_av_textblock  el_before_av_heading '><a href='https:\/\/www.ethosvirtual.com\/pt-br\/servicos\/ciber-seguranca\/vciso\/'  class='avia-button av-l6qeq5x0-935b1e6399836b69541dd2fd1ee00a78 av-link-btn avia-icon_select-no avia-size-large avia-position-left avia-color-theme-color'   aria-label=\"Saiba mais\"><span class='avia_iconbox_title' >Saiba mais<\/span><\/a><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l6c4d2j3-7ef20ebfe835ca193c6343f6b62a5caa\">\n#top .av-special-heading.av-l6c4d2j3-7ef20ebfe835ca193c6343f6b62a5caa{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-l6c4d2j3-7ef20ebfe835ca193c6343f6b62a5caa .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l6c4d2j3-7ef20ebfe835ca193c6343f6b62a5caa .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l6c4d2j3-7ef20ebfe835ca193c6343f6b62a5caa av-special-heading-h2  avia-builder-el-12  el_after_av_button  el_before_av_textblock '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Auditorias de Seguran\u00e7a Cibern\u00e9tica<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l6c4i7ph-9ca772610b460be39f858afa639a8b95 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-973 size-portfolio\" src=\"https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Cyber-Security-Audits-495x351.jpg\" alt=\"\" width=\"495\" height=\"351\" srcset=\"https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Cyber-Security-Audits-495x351.jpg 495w, https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Cyber-Security-Audits-260x185.jpg 260w\" sizes=\"auto, (max-width: 495px) 100vw, 495px\" \/><\/p>\n<p>The Cyber Security audit uses international frameworks widely used by large corporations that have been tested and validated.\u00a0 The NIST is a technical roadmap that helps companies understand their level of maturity in the application and vision of cybersecurity within the organization.<\/p>\n<p>Its 5 basic functions with 23 categories and 108 subcategories respond to normative references such as COBIT, ISO 27001, 27002, 27001 and several others. Thus, the search for good practices becomes more assertive in a shorter time. Identify, Protect, Detect, Respond and Recover, that&#8217;s our mission.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l6c2rgej-12d31deadd0fb9626f5d70c467a03e93\">\n#top .av-special-heading.av-l6c2rgej-12d31deadd0fb9626f5d70c467a03e93{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-l6c2rgej-12d31deadd0fb9626f5d70c467a03e93 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l6c2rgej-12d31deadd0fb9626f5d70c467a03e93 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l6c2rgej-12d31deadd0fb9626f5d70c467a03e93 av-special-heading-h2  avia-builder-el-14  el_after_av_textblock  el_before_av_textblock '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Treinamento de seguran\u00e7a do usu\u00e1rio<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l6c3np61-f87fc9fdf888346e08a5b68b0aad84fe '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Ethos provides online virtual training courses to help employees get up to speed on staying safe with personal and business data.<img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-964\" src=\"https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-LGPD-Treinamento-Certificado-de-Conclusao-300x212.jpg\" alt=\"Ethos LGPD Treinamento Certificado de Conclusao\" width=\"300\" height=\"212\" srcset=\"https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-LGPD-Treinamento-Certificado-de-Conclusao-300x212.jpg 300w, https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-LGPD-Treinamento-Certificado-de-Conclusao-1030x727.jpg 1030w, https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-LGPD-Treinamento-Certificado-de-Conclusao-768x542.jpg 768w, https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-LGPD-Treinamento-Certificado-de-Conclusao-260x185.jpg 260w, https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-LGPD-Treinamento-Certificado-de-Conclusao-705x497.jpg 705w, https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-LGPD-Treinamento-Certificado-de-Conclusao.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-l77rbp7g-2b2320f955b5b369d862bb5e56424b97-wrap avia-button-left  avia-builder-el-16  el_after_av_textblock  avia-builder-el-last '><a href='https:\/\/www.ethosvirtual.com\/pt-br\/cursos-de-treinamento\/lgpd-curso-de-capacitacao-em-privacidade-e-protecao-de-dados\/'  class='avia-button av-l77rbp7g-2b2320f955b5b369d862bb5e56424b97 av-link-btn avia-icon_select-no avia-size-large avia-position-left avia-color-theme-color'   aria-label=\"Detalhes do curso\"><span class='avia_iconbox_title' >Detalhes do curso<\/span><\/a><\/div><\/p><\/div><\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-1850'><div class='entry-content-wrapper clearfix'>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"parent":1842,"menu_order":30,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1850","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/pages\/1850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/comments?post=1850"}],"version-history":[{"count":4,"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/pages\/1850\/revisions"}],"predecessor-version":[{"id":2464,"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/pages\/1850\/revisions\/2464"}],"up":[{"embeddable":true,"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/pages\/1842"}],"wp:attachment":[{"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/media?parent=1850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}