Articles
Unxpose Blog
•
February 27, 2024
In January 2024, Microsoft experienced a cyberattack that exploited a weak password on a device within its network, granting access to employees' emails and documents. This attack, known as password spraying, is a straightforward technique where criminals test common passwords across multiple accounts.
•
July 3, 2023
The SSPM from Unxpose checks security best practices on platforms like Google Workspace and Microsoft 365, detects credential leaks, and consolidates an overview of employees' security posture, promoting protection and compliance with easy integration.
•
April 18, 2023
With 103 billion attempted attacks in 2022, cybersecurity has become an unavoidable necessity for businesses. Investing in prevention is more cost-effective than dealing with breaches, which can cost millions and ruin reputations.
•
March 1, 2023
The resolution published on February 27 is the final step in holding offenders accountable. The document establishes the categories of infractions and the rates of sanctions.
•
November 23, 2022
SMEs and startups in Brazil are facing a rise in cyber attacks due to vulnerabilities that hackers are exploiting. Solutions such as password managers, cybersecurity training, and digital asset mapping help reduce risks.
•
October 20, 2022
The article discusses how companies can comply with the LGPD in cloud environments, highlighting practices such as encryption, access management, and privacy governance. It provides practical solutions for protecting personal data and meeting legal requirements.
•
September 27, 2021
Google Workspace (formerly G Suite) brings together cloud applications for productivity and collaboration. Certain configurations of Google Workspace applications can directly impact the security and privacy of organizational data. Here are 5 initiatives that can be adopted by both account administrators and regular users to ensure the security of Google Workspace.
•
March 21, 2022
Understanding concept of attack surface is vital for companies of all sizes. The idea is related to continuous visibility over the company's exposed assets, what the threats are, the actual impact on the business, and how to fix the issues.
•
October 25, 2021
Wellness apps and medical service platforms attract cybercriminals interested in the most sensitive and valuable type of data: patient information. But is it possible to strengthen the cybersecurity of health startups without incurring significant costs or having a specialized team on the matter?
•
October 18, 2021
The new banking technology arrives in the country raising many questions. It is necessary to learn from the lessons of Europe to discuss the implementation of Open Banking in Brazil and then prepare the market for the new security challenges that will come.
•
October 30, 2021
Protecting data and operations in the cloud is a challenge. However, many security disasters could be avoided with simple tips that do not create bottlenecks for the technology team and instead foster innovation.
•
January 23, 2021
The challenge for many managers in the field is to create an effective Information Security Policy that prevents and mitigates incidents while ensuring the company complies with market standards and regulations, such as ISO 27001 and the LGPD (General Data Protection Law). Moreover, the policy needs to be current, aligned with the business reality, and not hinder processes. Is it possible?
•
September 16, 2021
Implementing security processes for the first time can leave any manager feeling confused or even lost. However, we have outlined some basic steps and created a roadmap of essential elements that should not be overlooked.
•
October 16, 2021
Malwares are among the biggest concerns for companies worldwide. Preventing a cyberattack may seem impossible, but using the right technologies to strengthen people and processes can drastically reduce a company's risk of exposure.
•
October 26, 2021
With exponential increase in cyber threats, companies are faced with the challenge of effectively managing security vulnerabilities. Unxpose offers an automated prioritization solution that takes into account the impact, likelihood, and context of the assets, saving valuable time for teams and optimizing resources to protect what truly matters to the business.
•
November 14, 2024
With attacks on the rise globally, small businesses and startups are becoming preferred targets due to inadequate protection. Learn how this crime operates, the financial and reputational damages it can cause, and discover best practices to safeguard your company against these threats.
•
August 20, 2021
In today's landscape, the exposure surface of companies is continually expanding, presenting new challenges for digital security. Asset Discovery becomes a vital strategy, automating the identification of exposed assets and allowing organizations to proactively mitigate risks. Explore how this practice can revolutionize the way you safeguard your business!
•
August 20, 2021
In this highlighted section, CEO Josemando Sobral discusses the impacts of digital transformation and remote work on corporate security, emphasizing the challenges that Brazilian companies need to face.
•
August 20, 2021
In an interview with Estadão, Josemando Sobral, CEO of Unxpose, explains how the solution automates the identification of exposed assets and the correction of security vulnerabilities.
•
August 20, 2021