{"id":339,"date":"2024-03-12T05:18:44","date_gmt":"2024-03-12T05:18:44","guid":{"rendered":"https:\/\/cyberwissen.io\/pt\/solution\/managed-security-awareness-copy\/"},"modified":"2024-03-27T16:43:36","modified_gmt":"2024-03-27T16:43:36","slug":"incident-response","status":"publish","type":"solution","link":"https:\/\/cyberwissen.io\/pt\/solution\/incident-response\/","title":{"rendered":"Resposta a incidentes"},"content":{"rendered":"<section class=\"\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row align-items-start\">\n<div class=\"col-lg-5 col-xs-12 text-left\">\n<h4 class=\"blue\">CyberWissen O seu parceiro pode confiar<\/h4>\n<h2>Quando os ataques cibern\u00e9ticos resultam numa viola\u00e7\u00e3o ou num incidente cibern\u00e9tico, as organiza\u00e7\u00f5es precisam de um parceiro comprovado<\/h2>\n<div class=\"vGap10\"><\/div>\n<p>A CyberWissen Resposta a incidentes \u00e9 um l\u00edder de confian\u00e7a na resposta a incidentes (IR), alavancando uma estrutura que permite a r\u00e1pida corre\u00e7\u00e3o de qualquer emerg\u00eancia cibern\u00e9tica em escala. Valorizada pela amplitude das capacidades de IR, pela profundidade t\u00e9cnica dos investigadores de incidentes e pelo servi\u00e7o excecional prestado ao longo dos compromissos de IR, a CyberWissen Incident Response \u00e9 um parceiro preferencial das transportadoras de seguros cibern\u00e9ticos.<\/p>\n<\/div>\n<div class=\"col-lg-6 col-xs-12 offset-lg-1 text-left\">\n<div class=\"tabsContainer\">\n<ul class=\"nav nav-tabs custom_tabs\" id=\"myTab\" role=\"tablist\">\n<li role=\"presentation\">\n    <a  id=\"tab_1\" data-bs-toggle=\"tab\" data-bs-target=\"#tab_content_1\" type=\"button\" role=\"tab\" aria-controls=\"home\" aria-selected=\"true\" class=\"active\"><img data-opt-id=53426965  fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/shield_508281-blue.svg\" class=\"icon\"\/><br \/>Seguro    <\/a>\n  <\/li>\n<li role=\"presentation\">\n    <a  id=\"tab_2\" data-bs-toggle=\"tab\" data-bs-target=\"#tab_content_2\" type=\"button\" role=\"tab\" aria-controls=\"home\" aria-selected=\"true\"><img data-opt-id=1617147962  fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/019-analysis-blue.svg\" class=\"icon\"\/><br \/>An\u00e1lises    <\/a>\n  <\/li>\n<li role=\"presentation\">\n    <a  id=\"tab_3\" data-bs-toggle=\"tab\" data-bs-target=\"#tab_content_3\" type=\"button\" role=\"tab\" aria-controls=\"home\" aria-selected=\"true\"><img data-opt-id=1288396110  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_respond_blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" class=\"optimole-lazy-only  icon\"\/><br \/>Restaurar    <\/a>\n  <\/li>\n<\/ul>\n<div class=\"tab-content \" id=\"myTabContent\">\n<div class=\"tab-pane fade  active show custom_tabs_content \" id=\"tab_content_1\" role=\"tabpanel\" aria-labelledby=\"home-tab\">\n<p>Conter a amea\u00e7a e impedir<\/p>\n<p>que o agente da amea\u00e7a volte a ter acesso<\/p>\n<p>\n<\/div>\n<div class=\"tab-pane fade  custom_tabs_content\" id=\"tab_content_2\" role=\"tabpanel\" aria-labelledby=\"home-tab\">\n<p>Identificar a causa principal e a extens\u00e3o da atividade maliciosa<\/p>\n<p>\n<\/div>\n<div class=\"tab-pane fade  custom_tabs_content\" id=\"tab_content_3\" role=\"tabpanel\" aria-labelledby=\"home-tab\">\n<p>Recuperar dados, restaurar sistemas e regressar \u00e0s opera\u00e7\u00f5es comerciais normais<\/p>\n<p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vGap15\"><\/div>\n<\/section>\n<div style=\"height:75px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<section id=\"\" class=\"\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-lg-8 col-xs-12  text-left\">\n<h4 class=\"primary uppercase\"> BENEF\u00cdCIOS DA RESPOSTA A INCIDENTES DA CYBERWISSEN<\/h4>\n<h3 class=\"  \">Reagir mais rapidamente . Recuperar mais depressa . Emerge mais forte. <\/h3>\n<p class=\"xl\">\n<\/div><\/div>\n<div class=\"vGap25\"><\/div>\n<div class=\"row \">\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1072407334  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_expertise-2_blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Resposta mais r\u00e1pida<\/h4>\n<p><p>Independentemente do local onde se encontra ou da hora do dia, o CyberWissen est\u00e1 pronto para ajudar quando precisar. Criado especificamente para a resposta remota a incidentes, o CyberWissen pode come\u00e7ar a trabalhar imediatamente.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1288396110  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_respond_blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Restauro mais r\u00e1pido<\/h4>\n<p><p>A CyberWissen \u00e9 uma das poucas empresas de resposta a incidentes que d\u00e1 prioridade \u00e0 recupera\u00e7\u00e3o de dados e ao restabelecimento da atividade, ao mesmo tempo que efectua a investiga\u00e7\u00e3o forense, permitindo-lhe retomar a atividade mais rapidamente.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1086443471  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_security_blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Remedia\u00e7\u00e3o completa<\/h4>\n<p><p>Analisamos a causa principal e a extens\u00e3o do ataque e removemos o acesso do agente da amea\u00e7a ao ambiente. Isto limita a capacidade do cibercriminoso de criar backdoors e recuperar o acesso.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<\/section>\n<section class=\"\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row justify-content-left\">\n<div class=\"col-lg-8 col-xs-12 text-left\">\n<h4 class=\"primary uppercase\"> Como ajudamos<\/h4>\n<div class=\"vGap25\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"row\">\n<div class=\"col-lg-12 col-xs-12\">\n<h4 style=\"text-align: center;\"><strong>TIPOS DE INCIDENTES NORMALMENTE RESOLVIDOS<\/strong><\/h4>\n<p><\/p>\n<p style=\"text-align: center;\">Independentemente do vetor de ataque, temos experi\u00eancia em mitigar a amea\u00e7a e remediar<\/p>\n<p>os danos em ambientes de endpoint, rede, identidade e nuvem<\/p>\n<p><\/p>\n<p>&nbsp;<\/p>\n<p>\n   <\/div>\n<\/p><\/div>\n<div class=\"vGap25\"><\/div>\n<div class=\"row\">\n<div class=\"col-lg-12 col-xs-12 text-center\">\n      <img data-opt-id=1813494064  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/infograph_4.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" style=\"width:70% !important; margin:0 auto;\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap15\"><\/div>\n<\/div><\/div>\n<\/div>\n<\/section>\n<div style=\"height:75px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<section class=\"\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row justify-content-left\">\n<div class=\"col-lg-8 col-xs-12 text-left\">\n<h4 class=\"primary uppercase\"> Como funciona<\/h4>\n<h3 class=\"  \">Linha de tempo da resposta a incidentes da CyberWissen <\/h3>\n<div class=\"vGap25\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"row\">\n<div class=\"col-lg-12 col-xs-12\">\n      <\/div>\n<\/p><\/div>\n<div class=\"vGap25\"><\/div>\n<div class=\"row\">\n<div class=\"col-lg-12 col-xs-12 text-center\">\n      <img data-opt-id=1237498593  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/infograph_new.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" style=\"width:70% !important; margin:0 auto;\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap15\"><\/div>\n<\/div><\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Make CyberWissen your first call when you have a breach or cyber incident. We are ready to stop the attack and restore your organization to pre-incident business operations.<\/p>\n","protected":false},"featured_media":3122,"template":"","meta":{"inline_featured_image":false},"class_list":["post-339","solution","type-solution","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/solution\/339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/solution"}],"about":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/types\/solution"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/media\/3122"}],"wp:attachment":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/media?parent=339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}