{"id":717,"date":"2023-03-28T10:09:17","date_gmt":"2023-03-28T10:09:17","guid":{"rendered":"https:\/\/beta.pegasinet.com\/pt\/?page_id=717"},"modified":"2026-03-31T21:47:36","modified_gmt":"2026-03-31T21:47:36","slug":"ciberseguranca","status":"publish","type":"page","link":"https:\/\/www.pegasi.pt\/pt\/servicos\/ciberseguranca\/","title":{"rendered":"Ciberseguran\u00e7a"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row disable_element=&#8221;yes&#8221;][vc_column offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_widget_sidebar sidebar_id=&#8221;sidebar-5b8f8fdb9861f&#8221;][\/vc_column][\/vc_row][vc_section css_animation=&#8221;none&#8221; css=&#8221;.vc_custom_1575627032846{padding-bottom: 80px !important;}&#8221; el_id=&#8221;overview&#8221;][vc_row gap=&#8221;30&#8243; css=&#8221;.vc_custom_1575627036895{margin-right: -15px !important;margin-left: -15px !important;padding-top: 50px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;PREVINIR \u00c9 A MELHOR DEFESA&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;35px&#8221;][vc_column_text]Segundo o FBI, em 2020 os ciberataques aumentaram mais de 300%, com perdas estimadas em mais de 4,1 mil milh\u00f5es de d\u00f3lares. T\u00e9cnicas como o Phishing, Malware ou DoS resultaram em ataques de Ransomware, BEC (business email compromise) ou roubo de dados confidenciais.<em><br \/>\n<\/em><\/p>\n<p>J\u00e1 todos ouviram falar em ciberseguran\u00e7a mas ser\u00e1 que entendem a import\u00e2ncia da preven\u00e7\u00e3o, implementa\u00e7\u00e3o de pol\u00edticas e pr\u00e1ticas que previnem os ataques? Definir uma boa estrat\u00e9gia de ciberseguran\u00e7a \u00e9 fundamental para o sucesso na defesa do seu neg\u00f3cio.<\/p>\n<p>A Pegasi pode ajud\u00e1-lo a definir e implementar essa estrat\u00e9gia, bem como pro-ativamente monitorizar a sua atual estrutura de neg\u00f3cio.[\/vc_column_text][vc_empty_space height=&#8221;40px&#8221;][vc_column_text]<a class=\"_ps2id button no-bg\" href=\"\/pt\/contacto\/\" data-ps2id-offset=\"\">Pe\u00e7a-nos uma proposta<\/a>[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<ul class=\"iconlist iconlist iconlist-icon-mini \"><li><div ><div class=\"iconlist-item-icon\"><i class=\"entypo-icon entypo-icon-cd\"><\/i><\/div><div class=\"iconlist-item-content\"><h4>A Equipa Certa<\/h4><p>Identificar e formar as pessoas indicadas para tratar dos v\u00e1rios apectos relacionados com a implementa\u00e7\u00e3o e acompanhamento das pol\u00edticas de seguran\u00e7a da empresa.<\/div><\/div><\/li><li><div ><div class=\"iconlist-item-icon\"><i class=\"entypo-icon entypo-icon-cd\"><\/i><\/div><div class=\"iconlist-item-content\"><h4>Pontos de Falha<\/h4><p>Analisar e identificar sistemas de informa\u00e7\u00e3o, infraestrutura, aplica\u00e7\u00f5es inform\u00e1ticas e pr\u00e1ticas de neg\u00f3cio que possam gerar pontos de falha ou vulnerabilidades.<\/div><\/div><\/li><li><div ><div class=\"iconlist-item-icon\"><i class=\"entypo-icon entypo-icon-cd\"><\/i><\/div><div class=\"iconlist-item-content\"><h4>Plano Continuidade Neg\u00f3cio<\/h4><p>Definir um bom plano de continuidade de neg\u00f3cio permite organizar todos os recursos (infraestrutura, software, processos), definir servi\u00e7os indispens\u00e1veis e prioridades para que o impacto de uma falha seja minimizado.<\/div><\/div><\/li><li><div ><div class=\"iconlist-item-icon\"><i class=\"entypo-icon entypo-icon-cd\"><\/i><\/div><div class=\"iconlist-item-content\"><h4>Recupera\u00e7\u00e3o de Desastre<\/h4><p>Definir protocolos e procedimentos a seguir em caso de desastre para que o tempo de reposi\u00e7\u00e3o seja o menor poss\u00edvel e sejam cumpridas todas as normas e leis em vigor, como a eventual notifica\u00e7\u00e3o das autoridades competentes no caso de envolvimento de dados pessoais.<\/div><\/div><\/li><\/ul>[vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1575627041884{margin-right: 10px !important;margin-left: 10px !important;}&#8221;][vc_column width=&#8221;1\/5&#8243; offset=&#8221;vc_col-xs-6&#8243; css=&#8221;.vc_custom_1554171868193{padding-right: 5px !important;padding-left: 5px !important;}&#8221;]<div class=\"counter aligncenter shadow  vc_custom_1774993060815\"> <div class=\"counter-detail\">\n\t\t<h3 class=\"counter-content\">\n\t\t\t<span class=\"counter-prefix\">+<\/span><span class=\"counter-value\" data-from=\"0\" data-to=\"10000\" data-speed=\"1000\">0<\/span><span class=\"counter-suffix\"><\/span>\n\t\t<\/h3>\n\t<div class=\"counter-title\">Recursos Monitorizados<\/div><\/div><\/div>[vc_empty_space height=&#8221;10px&#8221;][\/vc_column][vc_column width=&#8221;1\/5&#8243; offset=&#8221;vc_col-xs-6&#8243; css=&#8221;.vc_custom_1554171873037{padding-right: 5px !important;padding-left: 5px !important;}&#8221;]<div class=\"counter aligncenter shadow  vc_custom_1774993287476\"> <div class=\"counter-detail\">\n\t\t<h3 class=\"counter-content\">\n\t\t\t<span class=\"counter-prefix\"><\/span><span class=\"counter-value\" data-from=\"0\" data-to=\"3\" data-speed=\"1000\">0<\/span><span class=\"counter-suffix\">h<\/span>\n\t\t<\/h3>\n\t<div class=\"counter-title\">Tempo Resposta<\/div><\/div><\/div>[vc_empty_space height=&#8221;10px&#8221;][\/vc_column][vc_column width=&#8221;1\/5&#8243; offset=&#8221;vc_col-xs-6&#8243; css=&#8221;.vc_custom_1554171878745{padding-right: 5px !important;padding-left: 5px !important;}&#8221;]<div class=\"counter aligncenter shadow  vc_custom_1774993611818\"> <div class=\"counter-detail\">\n\t\t<h3 class=\"counter-content\">\n\t\t\t<span class=\"counter-prefix\"><\/span><span class=\"counter-value\" data-from=\"0\" data-to=\"100\" data-speed=\"1000\">0<\/span><span class=\"counter-suffix\">%<\/span>\n\t\t<\/h3>\n\t<div class=\"counter-title\">Resolu\u00e7\u00f5es<\/div><\/div><\/div>[vc_empty_space height=&#8221;10px&#8221;][\/vc_column][vc_column width=&#8221;1\/5&#8243; offset=&#8221;vc_col-xs-6&#8243; css=&#8221;.vc_custom_1554171883772{padding-right: 5px !important;padding-left: 5px !important;}&#8221;]<div class=\"counter aligncenter shadow  vc_custom_1774993304739\"> <div class=\"counter-detail\">\n\t\t<h3 class=\"counter-content\">\n\t\t\t<span class=\"counter-prefix\"><\/span><span class=\"counter-value\" data-from=\"0\" data-to=\"2\" data-speed=\"1000\">0<\/span><span class=\"counter-suffix\">h<\/span>\n\t\t<\/h3>\n\t<div class=\"counter-title\">Patch Management<\/div><\/div><\/div>[vc_empty_space height=&#8221;10px&#8221;][\/vc_column][vc_column width=&#8221;1\/5&#8243; offset=&#8221;vc_col-xs-12&#8243; css=&#8221;.vc_custom_1554171889438{padding-right: 5px !important;padding-left: 5px !important;}&#8221;]<div class=\"counter aligncenter shadow  vc_custom_1774993442162\"> <div class=\"counter-detail\">\n\t\t<h3 class=\"counter-content\">\n\t\t\t<span class=\"counter-prefix\">+<\/span><span class=\"counter-value\" data-from=\"0\" data-to=\"425\" data-speed=\"1000\">0<\/span><span class=\"counter-suffix\"><\/span>\n\t\t<\/h3>\n\t<div class=\"counter-title\">Clientes Empresas<\/div><\/div><\/div>[vc_empty_space height=&#8221;10px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;40px&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center; font-size: 15px;\">A nossa equipa pode ajud\u00e1-lo. <a class=\"dot\" href=\"\/pt\/contacto\/\">Contacte-nos<\/a><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section css_animation=&#8221;none&#8221; css=&#8221;.vc_custom_1575627051214{padding-top: 80px !important;padding-bottom: 30px !important;background-color: #ffffff !important;}&#8221; el_id=&#8221;solutions&#8221;][vc_row][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;SOLU\u00c7\u00d5ES INTEGRADAS&#8221; font_container=&#8221;tag:h6|font_size:10px|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;style1&#8243;][vc_empty_space height=&#8221;6px&#8221;][vc_custom_heading text=&#8221;SERVI\u00c7OS EM CIBERSEGURAN\u00c7A&#8221; font_container=&#8221;tag:h2|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;60px&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row][vc_column]<ul class=\"iconlist iconlist iconlist-icon-small columns-3 gap-50\"><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-genius\"><\/i><\/div><div class=\"iconlist-item-content\"><h4>Infraestrutura<\/h4><p>A utiliza\u00e7\u00e3o de redes seguras, sejam locais ou multi-site, garantem a seguran\u00e7a dos dados em tr\u00e2nsito.<\/div><\/div><\/li><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-laptop\"><\/i><\/div><div class=\"iconlist-item-content\"><h4>Postos de Trabalho<\/h4><p>Prote\u00e7\u00e3o dos postos de trabalho com ferramentas de vanguarda que protegem e garantem c\u00f3pia dos dados para locais seguros.<\/div><\/div><\/li><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-mobile\"><\/i><\/div><div class=\"iconlist-item-content\"><h4>Equipamentos<\/h4><p>Cada vez mais outros tipos de equipamentos est\u00e3o presentes nas nossas redes, sendo necess\u00e1rio um constante acompanhamento de vulnerabilidades.<\/div><\/div><\/li><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-adjustments\"><\/i><\/div><div class=\"iconlist-item-content\"><h4>Pol\u00edticas de Seguran\u00e7a<\/h4><p>Ao entender como funciona o seu neg\u00f3cio podemos ajudar a definir pol\u00edtica de seguran\u00e7a mais indicada para a sua empresa.<\/div><\/div><\/li><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-puzzle\"><\/i><\/div><div class=\"iconlist-item-content\"><h4>Auditoria<\/h4><p>Servi\u00e7o de auditoria a sites e ferramentas Web incidindo nas vulnerabilidades OWASP e boas pr\u00e1ticas de mercado.<\/div><\/div><\/li><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-layers\"><\/i><\/div><div class=\"iconlist-item-content\"><h4>Solu\u00e7\u00f5es \u00e0 Medida<\/h4><p>N\u00e3o vendemos solu\u00e7\u00f5es fechadas por acreditamos que cada empresa \u00e9 diferentel. Diga-no o que pretende e desenharemos uma solu\u00e7\u00e3o \u00e0 sua medida.<\/div><\/div><\/li><\/ul>[\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row disable_element=&#8221;yes&#8221;][vc_column offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_widget_sidebar sidebar_id=&#8221;sidebar-5b8f8fdb9861f&#8221;][\/vc_column][\/vc_row][vc_section css_animation=&#8221;none&#8221; css=&#8221;.vc_custom_1575627032846{padding-bottom: 80px !important;}&#8221; el_id=&#8221;overview&#8221;][vc_row gap=&#8221;30&#8243; css=&#8221;.vc_custom_1575627036895{margin-right: -15px !important;margin-left: -15px !important;padding-top: 50px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;PREVINIR \u00c9 A MELHOR DEFESA&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;35px&#8221;][vc_column_text]Segundo o FBI, em 2020 os ciberataques aumentaram mais de 300%, com perdas estimadas em mais de 4,1 mil milh\u00f5es de d\u00f3lares. T\u00e9cnicas como o Phishing, Malware ou DoS resultaram [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2542,"parent":707,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"tmpl\/template-fullwidth.php","meta":{"footnotes":""},"class_list":["post-717","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.pegasi.pt\/pt\/wp-json\/wp\/v2\/pages\/717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pegasi.pt\/pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.pegasi.pt\/pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.pegasi.pt\/pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pegasi.pt\/pt\/wp-json\/wp\/v2\/comments?post=717"}],"version-history":[{"count":20,"href":"https:\/\/www.pegasi.pt\/pt\/wp-json\/wp\/v2\/pages\/717\/revisions"}],"predecessor-version":[{"id":2821,"href":"https:\/\/www.pegasi.pt\/pt\/wp-json\/wp\/v2\/pages\/717\/revisions\/2821"}],"up":[{"embeddable":true,"href":"https:\/\/www.pegasi.pt\/pt\/wp-json\/wp\/v2\/pages\/707"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pegasi.pt\/pt\/wp-json\/wp\/v2\/media\/2542"}],"wp:attachment":[{"href":"https:\/\/www.pegasi.pt\/pt\/wp-json\/wp\/v2\/media?parent=717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}