{"id":237612,"date":"2022-03-28T19:39:24","date_gmt":"2022-03-29T02:39:24","guid":{"rendered":"https:\/\/www.faronics.com\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you"},"modified":"2022-04-29T10:41:10","modified_gmt":"2022-04-29T17:41:10","slug":"cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","status":"publish","type":"post","link":"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","title":{"rendered":"ATAQUES CIBERN\u00c9TICOS, VULNERABILIDADES E COMO A ADMINISTRA\u00c7\u00c3O DE PATCHES PODE AJUDAR VOC\u00ca"},"content":{"rendered":"<div>\n<div>\n<p><b><span lang=\"PT-BR\">O que ocorreria se um hacker invadir os seus sistemas, alterar ou roubar informa\u00e7\u00f5es, ou deixar os usu\u00e1rios sem acesso a servi\u00e7os essenciais?<\/span><\/b><span lang=\"PT-BR\"><\/span><\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<p><span lang=\"PT-BR\">A probabilidade de que isso ocorra \u00e9 alta se considerarmos que:<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"PT-BR\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"PT-BR\">Duas em cada tr\u00eas empresas sofreram um ataque cibern\u00e9tico no ano passado<a href=\"applewebdata:\/\/672917F3-C904-4DD9-A83D-B1F36D38ADA0#_ftn1\" name=\"_ftnref1\" title=\"\"><sup><span>[1]<\/span><\/sup><\/a>.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"PT-BR\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"PT-BR\">Um hacker poderia invadir 93% das empresas<a href=\"applewebdata:\/\/672917F3-C904-4DD9-A83D-B1F36D38ADA0#_ftn2\" name=\"_ftnref2\" title=\"\"><sup><span>[2]<\/span><\/sup><\/a>.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"PT-BR\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"PT-BR\">Existem mais de 170.000 vulnerabilidades e surgem outras a cada ano<a href=\"applewebdata:\/\/672917F3-C904-4DD9-A83D-B1F36D38ADA0#_ftn3\" name=\"_ftnref3\" title=\"\"><sup><span>[3]<\/span><\/sup><\/a>.<\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<div>\n<h4 style=\"text-align: center;\"><span lang=\"ES\">&#8221; A administra\u00e7\u00e3o de patches n\u00e3o apenas corrige bugs, ou melhora a usabilidade ou o desempenho: tamb\u00e9m aborda vulnerabilidades de seguran\u00e7a conhecidas.&#8221;<\/span><span lang=\"ES\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<p><b><span lang=\"PT-BR\">Como se proteger?<\/span><\/b><\/p>\n<p>Para proteger os seus sistemas, voc\u00ea precisa ter uma estrat\u00e9gia de defesa profunda ou em camadas, que inclui design de arquitetura segura, administra\u00e7\u00e3o de riscos, um plano de continuidade dos neg\u00f3cios, e monitoramento e resposta a incidentes.<\/p>\n<p>A administra\u00e7\u00e3o de patches \u00e9 uma das contramedidas de seguran\u00e7a mais importantes e eficazes que voc\u00ea pode aplicar para eliminar vulnerabilidades em sistemas.<\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><sup><\/sup><\/a><\/p>\n<div>\n<p><b><span lang=\"PT-BR\">Vulnerabilidades e patches<\/span><\/b><\/p>\n<p><span lang=\"PT-BR\">Os ataques cibern\u00e9ticos, que aproveitam vulnerabilidades de sistemas, podem ter um grande impacto sobre a integridade, a disponibilidade e a confidencialidade das informa\u00e7\u00f5es administradas por esses sistemas. De acordo com o Canadian Center for Cyber \u200b\u200bSecurity (CCCS), aplicar patches em sistemas operacionais e aplicativos \u00e9 a segunda a\u00e7\u00e3o de seguran\u00e7a de TI mais importante que uma organiza\u00e7\u00e3o pode adotar para minimizar invas\u00f5es e seus impactos.<\/span><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><sup>[4]<\/sup><\/a><\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<div>\n<p><span lang=\"PT-BR\">A administra\u00e7\u00e3o de patches \u00e9 um processo em 4 est\u00e1gios:<\/span><\/p>\n<\/div>\n<\/div>\n<div>\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"624\">\n<tbody>\n<tr>\n<td width=\"200\" valign=\"top\"><a href=\"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\/picture1-6\" rel=\"attachment wp-att-237576\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.faronics.com\/assets\/Picture1-8.png\" alt=\"\" width=\"282\" height=\"282\" class=\"aligncenter size-full wp-image-237582\" \/><\/a><\/td>\n<td width=\"424\" valign=\"top\">\n<div>\n<p><b><span lang=\"PT-BR\">1) Identificar os patches: <\/span><\/b><span lang=\"PT-BR\">certifique-se de instalar as atualiza\u00e7\u00f5es<\/span><\/p>\n<\/div>\n<div>\n<p><b><span lang=\"PT-BR\">2) Testar o patch:<\/span><\/b><span lang=\"PT-BR\"> Teste o patch antes de aplicar, para verificar se \u00e9 compat\u00edvel com seu software e ambiente existentes.<\/span><\/p>\n<\/div>\n<div>\n<p><b><span lang=\"PT-BR\">3) Notificar as pessoas afetadas<\/span><\/b><\/p>\n<\/div>\n<div><b><span lang=\"PT-BR\">4) Instalar o patch:<\/span><\/b><\/div>\n<div><span lang=\"PT-BR\"> Aplique os patches de seguran\u00e7a assim que for poss\u00edvel, para garantir a seguran\u00e7a dos dispositivos. Para evitar interrup\u00e7\u00f5es, agende atualiza\u00e7\u00f5es e patches fora do hor\u00e1rio de trabalho.<\/span><\/div>\n<div><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<p><b><span lang=\"ES\">\u00a0<\/span><\/b><\/p>\n<\/div>\n<div>\n<div>\n<p><b><span lang=\"PT-BR\">Boas pr\u00e1ticas e recomenda\u00e7\u00f5es em administra\u00e7\u00e3o de patches<\/span><\/b><\/p>\n<\/div>\n<div>\n<p><span lang=\"PT-BR\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"PT-BR\">Se uma vulnerabilidade ainda n\u00e3o foi explorada, pondere com cuidado os riscos de seguran\u00e7a de n\u00e3o aplicar o patch em rela\u00e7\u00e3o aos riscos operacionais de aplicar o patch sem fazer testes abrangentes antes.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"PT-BR\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"PT-BR\">Voc\u00ea deve garantir que os usu\u00e1rios n\u00e3o possam desativar patches, especialmente os patches cr\u00edticos.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"PT-BR\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"PT-BR\">O invent\u00e1rio de software deve incluir n\u00e3o apenas quais softwares est\u00e3o instalados, mas tamb\u00e9m a vers\u00e3o.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"PT-BR\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"PT-BR\">Voc\u00ea deve equilibrar as suas necessidades de seguran\u00e7a em rela\u00e7\u00e3o \u00e0s necessidades de usabilidade e disponibilidade.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"PT-BR\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"PT-BR\">Voc\u00ea deve garantir que a administra\u00e7\u00e3o de patches seja eficiente, para evitar situa\u00e7\u00f5es de sobrecarga de tarefas.<\/span><\/p>\n<\/div>\n<\/div>\n<div>\n<p><a href=\"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\/picture1-7\" rel=\"attachment wp-att-237584\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.faronics.com\/assets\/Picture1-9.png\" alt=\"\" width=\"400\" height=\"242\" class=\"aligncenter wp-image-237590\" \/><\/a><\/p>\n<\/div>\n<div>\n<p align=\"center\">\n<\/div>\n<\/div>\n<div id=\"ftn1\">\n<div>\n<p><span>Para saber mais, <\/span><a href=\"https:\/\/www.youtube.com\/watch?v=nekxxBdpzqM\">assista o nosso webinar no Youtube<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div>\n<p><span lang=\"PT-BR\"><\/span><\/p>\n<\/div>\n<p><a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftnref1\" name=\"_ftn1\" title=\"\"><sup><span lang=\"ES\"><span>[1]<\/span><\/span><\/sup><\/a><span lang=\"ES\"> https:\/\/safeatlast.co\/blog\/cybercrime-statistics\/<\/span><\/p>\n<\/div>\n<div id=\"ftn2\">\n<p><a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftnref2\" name=\"_ftn2\" title=\"\"><sup><span lang=\"ES\"><span>[2]<\/span><\/span><\/sup><\/a><span lang=\"ES\"> https:\/\/www.ptsecurity.com\/ww-en\/analytics\/external-pentests-results-2020\/<\/span><\/p>\n<\/div>\n<div id=\"ftn3\">\n<p><a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftnref3\" name=\"_ftn3\" title=\"\"><sup><span lang=\"ES\"><span>[3]<\/span><\/span><\/sup><\/a><span lang=\"ES\"> https:\/\/www.cvedetails.com\/browse-by-date.php<\/span><\/p>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftnref1\" name=\"_ftn1\" title=\"\"><sup><span lang=\"ES\"><span>[4]<\/span><\/span><\/sup><\/a><span lang=\"ES\"> https:\/\/cyber.gc.ca\/en\/guidance\/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<div>\n<div>\n<p>O que ocorreria se um hacker invadir os seus sistemas, alterar ou roubar informa\u00e7\u00f5es, ou deixar os usu\u00e1rios sem acesso a servi\u00e7os essenciais?<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div>\n<div>\n<p>A probabilidade de que isso ocorra \u00e9 alta se considerarmos que:<\/p>\n<\/p><\/div>\n<div>\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 Duas em cada tr\u00eas empresas sofreram um ataque cibern\u00e9tico no ano passado<a href=\"applewebdata:\/\/672917F3-C904-4DD9-A83D-B1F36D38ADA0#_ftn1\" name=\"_ftnref1\" title=\"\">[1]<\/a>.<\/p>\n<\/p><\/div>\n<div>\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 Um hacker poderia invadir 93% das empresas<a href=\"applewebdata:\/\/672917F3-C904-4DD9-A83D-B1F36D38ADA0#_ftn2\" name=\"_ftnref2\" title=\"\">[2]<\/a>.<\/p>\n<\/p><\/div>\n<div>\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 Existem mais de 170.000 vulnerabilidades e surgem outras a cada ano<a href=\"applewebdata:\/\/672917F3-C904-4DD9-A83D-B1F36D38ADA0#_ftn3\" name=\"_ftnref3\" title=\"\">[3]<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div>\n<div>\n<div> &#8221; A administra\u00e7\u00e3o de patches n\u00e3o apenas corrige bugs, ou melhora a usabilidade ou o desempenho: tamb\u00e9m aborda vulnerabilidades de seguran\u00e7a conhecidas.&#8221; <\/p>\n<p>&nbsp;<\/p>\n<p>Como se proteger?<\/p>\n<p>Para proteger os seus sistemas, voc\u00ea precisa ter uma estrat\u00e9gia de defesa profunda ou em camadas, que inclui design de arquitetura segura, administra\u00e7\u00e3o de riscos, um plano de continuidade dos neg\u00f3cios, e monitoramento e resposta a incidentes.<\/p>\n<p>A administra\u00e7\u00e3o de patches \u00e9 uma das contramedidas de seguran\u00e7a mais importantes e eficazes que voc\u00ea pode aplicar para eliminar vulnerabilidades em sistemas.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div>\n<div>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><\/a><\/p>\n<div>\n<p>Vulnerabilidades e patches<\/p>\n<p>Os ataques cibern\u00e9ticos, que aproveitam vulnerabilidades de sistemas, podem ter um grande impacto sobre a integridade, a disponibilidade e a confidencialidade das informa\u00e7\u00f5es administradas por esses sistemas. De acordo com o Canadian Center for Cyber \u200b\u200bSecurity (CCCS), aplicar patches em sistemas operacionais e aplicativos \u00e9 a segunda a\u00e7\u00e3o de seguran\u00e7a de TI mais importante que uma organiza\u00e7\u00e3o pode <\/p>\n<div class=\"more\"><a href=\"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\">Continue Reading&#8230;<\/a><\/div>\n","protected":false},"author":151,"featured_media":237600,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[3646],"tags":[],"class_list":["post-237612","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-pt-br"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ATAQUES CIBERN\u00c9TICOS, VULNERABILIDADES E COMO A ADMINISTRA\u00c7\u00c3O DE PATCHES PODE AJUDAR VOC\u00ca - Faronics<\/title>\n<meta name=\"description\" content=\"O que ocorreria se um hacker invadir os seus sistemas, alterar ou roubar informa\u00e7\u00f5es, ou deixar os usu\u00e1rios sem acesso a servi\u00e7os essenciais? A\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ATAQUES CIBERN\u00c9TICOS, VULNERABILIDADES E COMO A ADMINISTRA\u00c7\u00c3O DE PATCHES PODE AJUDAR VOC\u00ca\" \/>\n<meta property=\"og:description\" content=\"O que ocorreria se um hacker invadir os seus sistemas, alterar ou roubar informa\u00e7\u00f5es, ou deixar os usu\u00e1rios sem acesso a servi\u00e7os essenciais? A\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\" \/>\n<meta property=\"og:site_name\" content=\"Faronics\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/faronics\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-29T02:39:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-29T17:41:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1999\" \/>\n\t<meta property=\"og:image:height\" content=\"1332\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jorge Ojeda\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@faronics\" \/>\n<meta name=\"twitter:site\" content=\"@faronics\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jorge Ojeda\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\"},\"author\":{\"name\":\"Jorge Ojeda\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br#\\\/schema\\\/person\\\/1f33a5b8117ed728b756afd49eefd85c\"},\"headline\":\"ATAQUES CIBERN\u00c9TICOS, VULNERABILIDADES E COMO A ADMINISTRA\u00c7\u00c3O DE PATCHES PODE AJUDAR VOC\u00ca\",\"datePublished\":\"2022-03-29T02:39:24+00:00\",\"dateModified\":\"2022-04-29T17:41:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\"},\"wordCount\":485,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/faronics-patch-management.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.faronics.com\\\/pt-br\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/pt-br\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\",\"name\":\"ATAQUES CIBERN\u00c9TICOS, VULNERABILIDADES E COMO A ADMINISTRA\u00c7\u00c3O DE PATCHES PODE AJUDAR VOC\u00ca - Faronics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/faronics-patch-management.jpg\",\"datePublished\":\"2022-03-29T02:39:24+00:00\",\"dateModified\":\"2022-04-29T17:41:10+00:00\",\"description\":\"O que ocorreria se um hacker invadir os seus sistemas, alterar ou roubar informa\u00e7\u00f5es, ou deixar os usu\u00e1rios sem acesso a servi\u00e7os essenciais? A\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.faronics.com\\\/pt-br\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/faronics-patch-management.jpg\",\"contentUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/faronics-patch-management.jpg\",\"width\":1999,\"height\":1332,\"caption\":\"Update Software Computer Program Upgrade Business technology Internet Concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.faronics.com\\\/pt-br\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ATAQUES CIBERN\u00c9TICOS, VULNERABILIDADES E COMO A ADMINISTRA\u00c7\u00c3O DE PATCHES PODE AJUDAR VOC\u00ca\",\"item\":\"https:\\\/\\\/www.faronics.com\\\/pt-br\\\/ataques-ciberneticos-vulnerabilidades-e-como-a-administracao-de-patches-pode-ajudar-voce\\\/\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br#website\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/pt-br\",\"name\":\"Faronics\",\"description\":\"Simplifying Computer Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.faronics.com\\\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br#organization\",\"name\":\"Faronics\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/footer-faronics-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/footer-faronics-logo.png\",\"width\":155,\"height\":44,\"caption\":\"Faronics\"},\"image\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/faronics\",\"https:\\\/\\\/x.com\\\/faronics\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/pt-br#\\\/schema\\\/person\\\/1f33a5b8117ed728b756afd49eefd85c\",\"name\":\"Jorge Ojeda\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/JorgeOjeda.png\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/JorgeOjeda.png\",\"contentUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/JorgeOjeda.png\",\"caption\":\"Jorge Ojeda\"},\"description\":\"Jorge Ojeda is a product specialist in the Faronics Latam team in Canada.Jorge has a master's degree in cybersecurity and his friends think that he is a MasterChef cooking Chilean empanadas. In his free time he loves to walk and take photos in beautiful Vancouver.\",\"sameAs\":[\"https:\\\/\\\/www.faronics.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ATAQUES CIBERN\u00c9TICOS, VULNERABILIDADES E COMO A ADMINISTRA\u00c7\u00c3O DE PATCHES PODE AJUDAR VOC\u00ca - Faronics","description":"O que ocorreria se um hacker invadir os seus sistemas, alterar ou roubar informa\u00e7\u00f5es, ou deixar os usu\u00e1rios sem acesso a servi\u00e7os essenciais? A","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","og_locale":"pt_BR","og_type":"article","og_title":"ATAQUES CIBERN\u00c9TICOS, VULNERABILIDADES E COMO A ADMINISTRA\u00c7\u00c3O DE PATCHES PODE AJUDAR VOC\u00ca","og_description":"O que ocorreria se um hacker invadir os seus sistemas, alterar ou roubar informa\u00e7\u00f5es, ou deixar os usu\u00e1rios sem acesso a servi\u00e7os essenciais? A","og_url":"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","og_site_name":"Faronics","article_publisher":"https:\/\/www.facebook.com\/faronics","article_published_time":"2022-03-29T02:39:24+00:00","article_modified_time":"2022-04-29T17:41:10+00:00","og_image":[{"width":1999,"height":1332,"url":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","type":"image\/jpeg"}],"author":"Jorge Ojeda","twitter_card":"summary_large_image","twitter_creator":"@faronics","twitter_site":"@faronics","twitter_misc":{"Escrito por":"Jorge Ojeda","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#article","isPartOf":{"@id":"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you"},"author":{"name":"Jorge Ojeda","@id":"https:\/\/www.faronics.com\/pt-br#\/schema\/person\/1f33a5b8117ed728b756afd49eefd85c"},"headline":"ATAQUES CIBERN\u00c9TICOS, VULNERABILIDADES E COMO A ADMINISTRA\u00c7\u00c3O DE PATCHES PODE AJUDAR VOC\u00ca","datePublished":"2022-03-29T02:39:24+00:00","dateModified":"2022-04-29T17:41:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you"},"wordCount":485,"commentCount":0,"publisher":{"@id":"https:\/\/www.faronics.com\/pt-br#organization"},"image":{"@id":"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage"},"thumbnailUrl":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","url":"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","name":"ATAQUES CIBERN\u00c9TICOS, VULNERABILIDADES E COMO A ADMINISTRA\u00c7\u00c3O DE PATCHES PODE AJUDAR VOC\u00ca - Faronics","isPartOf":{"@id":"https:\/\/www.faronics.com\/pt-br#website"},"primaryImageOfPage":{"@id":"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage"},"image":{"@id":"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage"},"thumbnailUrl":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","datePublished":"2022-03-29T02:39:24+00:00","dateModified":"2022-04-29T17:41:10+00:00","description":"O que ocorreria se um hacker invadir os seus sistemas, alterar ou roubar informa\u00e7\u00f5es, ou deixar os usu\u00e1rios sem acesso a servi\u00e7os essenciais? A","breadcrumb":{"@id":"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage","url":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","contentUrl":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","width":1999,"height":1332,"caption":"Update Software Computer Program Upgrade Business technology Internet Concept."},{"@type":"BreadcrumbList","@id":"https:\/\/www.faronics.com\/pt-br\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.faronics.com\/pt-br"},{"@type":"ListItem","position":2,"name":"ATAQUES CIBERN\u00c9TICOS, VULNERABILIDADES E COMO A ADMINISTRA\u00c7\u00c3O DE PATCHES PODE AJUDAR VOC\u00ca","item":"https:\/\/www.faronics.com\/pt-br\/ataques-ciberneticos-vulnerabilidades-e-como-a-administracao-de-patches-pode-ajudar-voce\/"}]},{"@type":"WebSite","@id":"https:\/\/www.faronics.com\/pt-br#website","url":"https:\/\/www.faronics.com\/pt-br","name":"Faronics","description":"Simplifying Computer Management","publisher":{"@id":"https:\/\/www.faronics.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.faronics.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.faronics.com\/pt-br#organization","name":"Faronics","url":"https:\/\/www.faronics.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.faronics.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.faronics.com\/assets\/footer-faronics-logo.png","contentUrl":"https:\/\/www.faronics.com\/assets\/footer-faronics-logo.png","width":155,"height":44,"caption":"Faronics"},"image":{"@id":"https:\/\/www.faronics.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/faronics","https:\/\/x.com\/faronics"]},{"@type":"Person","@id":"https:\/\/www.faronics.com\/pt-br#\/schema\/person\/1f33a5b8117ed728b756afd49eefd85c","name":"Jorge Ojeda","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.faronics.com\/assets\/JorgeOjeda.png","url":"https:\/\/www.faronics.com\/assets\/JorgeOjeda.png","contentUrl":"https:\/\/www.faronics.com\/assets\/JorgeOjeda.png","caption":"Jorge Ojeda"},"description":"Jorge Ojeda is a product specialist in the Faronics Latam team in Canada.Jorge has a master's degree in cybersecurity and his friends think that he is a MasterChef cooking Chilean empanadas. In his free time he loves to walk and take photos in beautiful Vancouver.","sameAs":["https:\/\/www.faronics.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.faronics.com\/pt-br\/wp-json\/wp\/v2\/posts\/237612","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.faronics.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.faronics.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.faronics.com\/pt-br\/wp-json\/wp\/v2\/users\/151"}],"replies":[{"embeddable":true,"href":"https:\/\/www.faronics.com\/pt-br\/wp-json\/wp\/v2\/comments?post=237612"}],"version-history":[{"count":2,"href":"https:\/\/www.faronics.com\/pt-br\/wp-json\/wp\/v2\/posts\/237612\/revisions"}],"predecessor-version":[{"id":238514,"href":"https:\/\/www.faronics.com\/pt-br\/wp-json\/wp\/v2\/posts\/237612\/revisions\/238514"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.faronics.com\/pt-br\/wp-json\/wp\/v2\/media\/237600"}],"wp:attachment":[{"href":"https:\/\/www.faronics.com\/pt-br\/wp-json\/wp\/v2\/media?parent=237612"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.faronics.com\/pt-br\/wp-json\/wp\/v2\/categories?post=237612"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.faronics.com\/pt-br\/wp-json\/wp\/v2\/tags?post=237612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}