{"id":15760,"date":"2021-06-17T10:15:05","date_gmt":"2021-06-17T10:15:05","guid":{"rendered":"https:\/\/gatefy.com\/?p=15760"},"modified":"2021-06-17T15:24:51","modified_gmt":"2021-06-17T15:24:51","slug":"como-funciona-a-seguranca-de-e-mail","status":"publish","type":"post","link":"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/","title":{"rendered":"Como funciona a seguran\u00e7a de e-mail?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"15760\" class=\"elementor elementor-15760\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71d4f8be elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"71d4f8be\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-79830c4f\" data-id=\"79830c4f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54169af elementor-widget elementor-widget-heading\" data-id=\"54169af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Como funciona a seguran\u00e7a de e-mail?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-161d464 elementor-widget elementor-widget-template\" data-id=\"161d464\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4201\" class=\"elementor elementor-4201 elementor-4192 elementor-4192\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dffd2b9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dffd2b9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb88354\" data-id=\"bb88354\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8309bfc elementor-align-left elementor-tablet-align-center elementor-widget elementor-widget-post-info\" data-id=\"8309bfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-07d5219 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-calendar-alt\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Atualizado em<\/span>\n\t\t\t\t\t\t\t\t\t\t<time>17 junho, 2021<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-573941e elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-user-circle\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Por<\/span>\n\t\t\t\t\t\t\t\t\t\tGatefy\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-389e7a6 elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-list\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/category\/blog\/\" class=\"elementor-post-info__terms-list-item\">Blog<\/a>, <a href=\"https:\/\/gatefy.com\/pt-br\/category\/blog\/educacao\/\" class=\"elementor-post-info__terms-list-item\">Educa\u00e7\u00e3o<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-255fe8b elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"255fe8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/05\/funcionamento-seguranca-email.jpg\" class=\"attachment-full size-full wp-image-15762\" alt=\"Hacker tentando invadir forte seguran\u00e7a de e-mail.\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/05\/funcionamento-seguranca-email.jpg 800w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/05\/funcionamento-seguranca-email-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/05\/funcionamento-seguranca-email-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3476e9c elementor-widget elementor-widget-template\" data-id=\"3476e9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4319\" class=\"elementor elementor-4319 elementor-4237 elementor-4237\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b3a25ba elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"b3a25ba\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-baf9f65\" data-id=\"baf9f65\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ffe851 elementor-share-buttons--view-icon elementor-share-buttons--shape-rounded elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"4ffe851\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_reddit\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no reddit\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-reddit\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ec99e1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3ec99e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7767a29 elementor-widget elementor-widget-text-editor\" data-id=\"7767a29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O e-mail foi criado para facilitar a comunica\u00e7\u00e3o entre as pessoas. Mas n\u00e3o foi projetado para garantir a seguran\u00e7a dos dados. Apesar disso, o e-mail sempre foi muito utilizado para compartilhar dados sigilosos, principalmente no caso de empresas. \u00c9 aqui que a <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-seguranca-de-email\/\" target=\"_blank\" rel=\"noopener\">seguran\u00e7a de e-mail<\/a> ganha import\u00e2ncia.<\/p><p>\u00c9 comum que as empresas compartilhem por e-mail dados confidenciais de clientes, funcion\u00e1rios e projetos. Outros exemplos comuns s\u00e3o o pagamento de faturas que s\u00e3o recebidas por e-mail e at\u00e9 mesmo o envio de senhas e credenciais, o que n\u00e3o \u00e9 recomendado e muito menos seguro.<\/p><p>Obviamente, os hackers sabem de tudo isso e se aproveitam da situa\u00e7\u00e3o. Portanto, para se proteger, voc\u00ea precisa entender o que \u00e9 seguran\u00e7a de email, os mitos que cercam o assunto e, principalmente, como funciona a prote\u00e7\u00e3o de email. Falaremos mais sobre isso neste artigo. Fique atento.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec7a7cf elementor-widget elementor-widget-template\" data-id=\"ec7a7cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4327\" class=\"elementor elementor-4327 elementor-4215 elementor-4215\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aa2f920 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aa2f920\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4faaeec\" data-id=\"4faaeec\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c7bf09 elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"8c7bf09\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;],&quot;marker_view&quot;:&quot;bullets&quot;,&quot;icon&quot;:{&quot;value&quot;:&quot;far fa-dot-circle&quot;,&quot;library&quot;:&quot;fa-regular&quot;},&quot;no_headings_message&quot;:&quot;N\\u00e3o foram encontrados cabe\\u00e7alhos nesta p\\u00e1gina.&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h2 class=\"elementor-toc__header-title\">\n\t\t\t\tNeste artigo, voc\u00ea vai ler mais sobre:\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__8c7bf09\" aria-expanded=\"true\" aria-label=\"Abrir Tabela de Conte\u00fados\"><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__8c7bf09\" aria-expanded=\"true\" aria-label=\"Fechar Tabela de Conte\u00fados\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__8c7bf09\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c0406b elementor-widget elementor-widget-template\" data-id=\"7c0406b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4303\" class=\"elementor elementor-4303\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-13ca685 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"13ca685\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f3824af\" data-id=\"f3824af\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 1 PT BEC banner&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-26ab6fe elementor-widget elementor-widget-image\" data-id=\"26ab6fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/materiais\/bec-business-email-compromise\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/elementor\/thumbs\/bec-whitepaper-pt-p44ei873l77kv9n3u68beco60vyk1orejgjks299z2.jpg\" title=\"bec-whitepaper-pt\" alt=\"bec-whitepaper-pt\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2928299\" data-id=\"2928299\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7bbb67b elementor-widget elementor-widget-heading\" data-id=\"7bbb67b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">BEC - Business Email Compromise<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58730f6 elementor-widget elementor-widget-text-editor\" data-id=\"58730f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Fa\u00e7a o download deste ebook para entender tudo sobre BEC, das caracter\u00edsticas \u00e0s t\u00e9cnicas mais usadas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 1 PT BEC botao&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-a3d21a0 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"a3d21a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/gatefy.com\/pt-br\/materiais\/ebook\/bec-business-email-compromise\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Baixar Agora!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-802296a elementor-widget elementor-widget-heading\" data-id=\"802296a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Estrutura de e-mail e a semelhan\u00e7a com cartas<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d3a22c elementor-widget elementor-widget-text-editor\" data-id=\"3d3a22c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Antes de nos aprofundarmos no assunto da seguran\u00e7a de e-mail, \u00e9 importante entender como funciona o processo de envio de e-mails e a <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-partes-de-um-e-mail\/\" target=\"_blank\" rel=\"noopener\">estrutura b\u00e1sica de um e-mail<\/a>.\u00a0<\/p><p>Dessa forma, fica mais f\u00e1cil de reconhecer pontos de vulnerabilidade e de perceber como o e-mail \u00e9 explorado por cibercriminosos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74f39f7 elementor-widget elementor-widget-heading\" data-id=\"74f39f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Quais s\u00e3o os elementos do e-mail?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b159dd elementor-widget elementor-widget-text-editor\" data-id=\"7b159dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Para entender a estrutura do e-mail, n\u00f3s gostamos da compara\u00e7\u00e3o entre um e-mail e uma carta. Ela simplifica o entendimento, pois tanto a carta quanto o e-mail possuem os seguintes elementos b\u00e1sicos:<\/p><ul><li>Envelope, que cont\u00e9m informa\u00e7\u00f5es sobre o remetente e o destinat\u00e1rio.<\/li><li>Cabe\u00e7alho, com diferentes informa\u00e7\u00f5es, como data, endere\u00e7o e nome do remetente, endere\u00e7o e nome do destinat\u00e1rio e assunto.<\/li><li>Corpo, que \u00e9 a pr\u00f3pria mensagem seguida pela assinatura do remetente.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8d5732 elementor-widget elementor-widget-text-editor\" data-id=\"e8d5732\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Certamente, o e-mail \u00e9 muito mais complexo do que a carta.\u00a0 Ele possui outros elementos e recursos que despertam ainda mais o interesse dos criminosos, como a capacidade de anexar arquivos e enviar links.<\/p><p>Por enquanto, \u00e9 importante saber que os hackers falsificam e exploram cada um desses elementos b\u00e1sicos do e-mail para <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-de-ataques-de-engenharia-social\/\" target=\"_blank\" rel=\"noopener\">enganar, persuadir e brincar<\/a> com as suas v\u00edtimas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fdc285 elementor-widget elementor-widget-heading\" data-id=\"8fdc285\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Como funciona o e-mail?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c2948df elementor-widget elementor-widget-text-editor\" data-id=\"c2948df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pode n\u00e3o parecer, mas o processo de envio de e-mails tem tantas etapas quanto o envio de cartas. Quando voc\u00ea envia um e-mail, a sua mensagem, geralmente, passa por uma s\u00e9rie de m\u00e1quinas ou <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-servidor-de-email-mail-server\/\" target=\"_blank\" rel=\"noopener\">servidores<\/a> at\u00e9 ser entregue ao destinat\u00e1rio.<\/p><p>\u00c9 como uma carta que depende de v\u00e1rias pessoas e percorre v\u00e1rias ag\u00eancias dos Correios, localizadas em locais diferentes, at\u00e9 chegar ao destinat\u00e1rio.<\/p><p>Uma tecnologia chamada de\u00a0<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-smtp-simple-mail-transfer-protocol\/\" target=\"_blank\" rel=\"noopener\">SMTP<\/a> (Simple Mail Transfer Protocol) \u00e9 respons\u00e1vel pelo transporte do e-mail, enquanto as tecnologias POP3 e IMAP se encarregam de entreg\u00e1-lo. Mas n\u00e3o se engane. Este \u00e9 um processo complexo e, \u00e0s vezes, demorado que costuma ser explorado por cibercriminosos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e991316 elementor-widget elementor-widget-heading\" data-id=\"e991316\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Amea\u00e7as e t\u00e9cnicas de e-mail<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23d9154 elementor-widget elementor-widget-text-editor\" data-id=\"23d9154\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As amea\u00e7as de e-mail exploram vulnerabilidades tecnol\u00f3gicas e humanas. Na pr\u00e1tica, para enganar as pessoas, os hackers usam t\u00e9cnicas de spoofing para falsificar um endere\u00e7o de e-mail e tamb\u00e9m usam\u00a0<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-engenharia-social\/\" target=\"_blank\" rel=\"noopener\">engenharia social<\/a> para se passar por uma marca.<\/p><p>Em outras palavras, os criminosos exploram a tecnologia e o <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-fator-humano-como-os-funcionarios-tornam-a-sua-empresa-vulneravel\/\" target=\"_blank\" rel=\"noopener\">fator humano<\/a> ao mesmo tempo. Inclusive, o fator humano \u00e9 conhecido como o elo mais fraco na cadeia de seguran\u00e7a da informa\u00e7\u00e3o, devido \u00e0 dificuldade de controle e \u00e0 imprevisibilidade.<\/p><p>A seguir, apresentaremos amea\u00e7as e t\u00e9cnicas comuns de explora\u00e7\u00e3o de e-mail.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-810aa7b elementor-widget elementor-widget-heading\" data-id=\"810aa7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Spoofing<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5374b01 elementor-widget elementor-widget-text-editor\" data-id=\"5374b01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O\u00a0<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-spoofing-de-dominio\/\" target=\"_blank\" rel=\"noopener\">spoofing<\/a> se refere \u00e0 falsifica\u00e7\u00e3o de nomes e endere\u00e7os de pessoas, e-mails e sites. Essa \u00e9 uma t\u00e9cnica amplamente usada em amea\u00e7as de e-mail, como <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/\" target=\"_blank\" rel=\"noopener\">phishing<\/a> e <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-spam\/\" target=\"_blank\" rel=\"noopener\">spam<\/a>. Ao usar spoofing, o hacker est\u00e1 tentando se passar por uma pessoa ou empresa que voc\u00ea conhece.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d92c4e elementor-widget elementor-widget-heading\" data-id=\"2d92c4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Engenharia Social<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-124551c elementor-widget elementor-widget-text-editor\" data-id=\"124551c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-engenharia-social\/\" target=\"_blank\" rel=\"noopener\">engenharia social<\/a> \u00e9 uma amea\u00e7a que permite ao hacker enganar e persuadir pessoas. Por exemplo, antes de enviar um <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/emails-falsos-e-perigosos\/\" target=\"_blank\" rel=\"noopener\">e-mail malicioso<\/a> para a sua empresa, o cibercriminoso buscar\u00e1 saber o que a sua empresa faz, com quais outras empresas ela se relaciona e quem s\u00e3o os seus funcion\u00e1rios.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f017a7b elementor-widget elementor-widget-heading\" data-id=\"f017a7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Impersonation ou personifica\u00e7\u00e3o<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74842ac elementor-widget elementor-widget-text-editor\" data-id=\"74842ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O impersonation ou a personifica\u00e7\u00e3o \u00e9 a capacidade do hacker de assumir a identidade de outra pessoa. Imagine que algu\u00e9m est\u00e1 se passando por um alto executivo da sua empresa para enviar e-mails maliciosos ao departamento financeiro solicitando o pagamento de uma fatura.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1ee481 elementor-widget elementor-widget-heading\" data-id=\"c1ee481\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Comprometimento de e-mail<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-346110c elementor-widget elementor-widget-text-editor\" data-id=\"346110c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O comprometimento de e-mail \u00e9 uma esp\u00e9cie de sequestro. A sua empresa pode ter sido infectada com <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-malware\/\" target=\"_blank\" rel=\"noopener\">malware<\/a> que deu acesso \u00e0 caixa de correio do CEO. Neste caso, o hacker pode ler e enviar e-mails como se fosse o CEO. Esse tipo de golpe \u00e9 chamado de <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-bec-business-email-compromise-fraudedoceo\/\" target=\"_blank\" rel=\"noopener\">BEC (Business Email Compromise)<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23de9ee elementor-widget elementor-widget-heading\" data-id=\"23de9ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Sequestro de dom\u00ednio e de servidor de e-mail<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d281e93 elementor-widget elementor-widget-text-editor\" data-id=\"d281e93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O seu dom\u00ednio e servidor de e-mail tamb\u00e9m podem ser sequestrados por hackers. Depois de hackear o seu servidor com algum tipo de malware, os cibercriminosos ter\u00e3o acesso a todas as informa\u00e7\u00f5es que trafegam pela sua rede de e-mail.\u00a0<\/p><p>Al\u00e9m disso, eles poder\u00e3o usar o seu dom\u00ednio para enganar funcion\u00e1rios, clientes e parceiros.<\/p><p>Agora que voc\u00ea aprendeu um pouco mais sobre como o e-mail \u00e9 explorado, vamos falar sobre phishing para entender melhor como funcionam os ataques de e-mail na pr\u00e1tica.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1005d57 elementor-widget elementor-widget-heading\" data-id=\"1005d57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Etapas de um ataque de phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-963baa4 elementor-widget elementor-widget-text-editor\" data-id=\"963baa4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O phishing \u00e9 o crime cibern\u00e9tico com maior n\u00famero de v\u00edtimas no mundo, <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/relatorio-fbi-ic3-cibercrimes-2020\/\" target=\"_blank\" rel=\"noopener\">de acordo com dados do FBI<\/a>. O golpe de phishing acontece quando o hacker usa spoofing, engenharia social, impersonation e outros mecanismos para roubar dados ou obter acesso a m\u00e1quinas e sistemas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72f5803 elementor-widget elementor-widget-heading\" data-id=\"72f5803\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Identifica\u00e7\u00e3o da v\u00edtima<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91f887f elementor-widget elementor-widget-text-editor\" data-id=\"91f887f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Primeiro, o hacker precisa identificar a sua v\u00edtima, que pode ser uma pessoa ou empresa. Nesse est\u00e1gio, o cibercriminoso coletar\u00e1 o m\u00e1ximo poss\u00edvel de informa\u00e7\u00f5es sobre voc\u00ea e a sua empresa.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d5942e elementor-widget elementor-widget-heading\" data-id=\"6d5942e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Cria\u00e7\u00e3o do golpe<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4bf4b4 elementor-widget elementor-widget-text-editor\" data-id=\"a4bf4b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nesta etapa, o cibercriminoso tentar\u00e1 se passar por algu\u00e9m que voc\u00ea e a sua empresa j\u00e1 conhecem e trabalham, como um provedor de servi\u00e7os. Para fazer isso, ele criar\u00e1 um e-mail malicioso que se parece muito com o e-mail leg\u00edtimo do seu parceiro.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c41013 elementor-widget elementor-widget-heading\" data-id=\"3c41013\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Explora\u00e7\u00e3o do fator humano<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91c9dc2 elementor-widget elementor-widget-text-editor\" data-id=\"91c9dc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Na \u00faltima etapa, o criminoso busca, por meio de uma s\u00e9rie de e-mails, criar um v\u00ednculo de confian\u00e7a com a v\u00edtima, que \u00e9 um funcion\u00e1rio da sua empresa. No final, ele persuadir\u00e1 a v\u00edtima a realizar alguma a\u00e7\u00e3o, como enviar dinheiro ou compartilhar dados confidenciais.<\/p><p>O grande desafio da seguran\u00e7a de e-mail \u00e9 que os criminosos est\u00e3o se tornando mais espertos a cada dia. Eles est\u00e3o sempre desenvolvendo novas formas de hackear. Para ficar seguro, voc\u00ea precisa entender como se proteger.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e27fce elementor-widget elementor-widget-heading\" data-id=\"7e27fce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Como funciona a seguran\u00e7a de e-mail<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9ab851 elementor-widget elementor-widget-text-editor\" data-id=\"b9ab851\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A seguran\u00e7a de e-mail requer, necessariamente, a ado\u00e7\u00e3o de <a href=\"https:\/\/gatefy.com\/pt-br\/seguranca-email-nuvem\/\" target=\"_blank\" rel=\"noopener\">solu\u00e7\u00f5es de prote\u00e7\u00e3o de e-mail<\/a> e o investimento na educa\u00e7\u00e3o dos funcion\u00e1rios da empresa. Em outras palavras, a sua empresa precisa usar tecnologia avan\u00e7ada de seguran\u00e7a e a sua equipe precisa aprender a reconhecer amea\u00e7as, mitigando riscos.<\/p><p>Vamos falar agora sobre 2 solu\u00e7\u00f5es de seguran\u00e7a de e-mail importantes e essenciais.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02aa302 elementor-widget elementor-widget-heading\" data-id=\"02aa302\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Secure Email Gateway (SEG)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a100181 elementor-widget elementor-widget-text-editor\" data-id=\"a100181\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O\u00a0<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-um-secure-email-gateway-seg\/\" target=\"_blank\" rel=\"noopener\">Secure Email Gateway (SEG)<\/a> \u00e9 uma solu\u00e7\u00e3o de seguran\u00e7a cibern\u00e9tica que atua como uma barreira para bloquear amea\u00e7as de e-mail. Ou seja, quando e-mails maliciosos s\u00e3o enviados para a sua empresa, o SEG deve detect\u00e1-los, evitando que a amea\u00e7a chegue \u00e0s caixas de correio.<\/p><p>Para cumprir o seu papel, o SEG utiliza diversos mecanismos e tecnologias, como filtros de spam, listas de reputa\u00e7\u00e3o de endere\u00e7os e de IPs, detec\u00e7\u00e3o de anomalias, ferramentas antiv\u00edrus e, sobretudo, intelig\u00eancia artificial.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae3f0e6 elementor-widget elementor-widget-heading\" data-id=\"ae3f0e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">DMARC<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c98d332 elementor-widget elementor-widget-text-editor\" data-id=\"c98d332\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O\u00a0<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-sao-dmarc-dkim-spf\/\" target=\"_blank\" rel=\"noopener\">DMARC<\/a> (Domain-based Message Authentication Reporting &amp; Conformance) \u00e9 um protocolo e mecanismo de autentica\u00e7\u00e3o de e-mail. Basicamente, o DMARC padroniza a maneira como os e-mails s\u00e3o escaneados e verificados.<\/p><p>Ou seja, o DMARC informa se um e-mail \u00e9 leg\u00edtimo ou n\u00e3o. Dessa forma, ele evita que hackers usem o dom\u00ednio da sua empresa para cometer golpes e fraudes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd76802 elementor-widget elementor-widget-heading\" data-id=\"bd76802\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Palavra final<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b80a68b elementor-widget elementor-widget-text-editor\" data-id=\"b80a68b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Os e-mails s\u00e3o uma das maneiras mais f\u00e1ceis de se comunicar. No entanto, eles tamb\u00e9m s\u00e3o usados por cibercriminosos como isca para roubar dados, espalhar malware e hackear empresas. Portanto, \u00e9 sempre necess\u00e1rio estar \u00e0 frente dos criminosos.<\/p>\n<p>A ado\u00e7\u00e3o de diferentes solu\u00e7\u00f5es de seguran\u00e7a de e-mail, como as mencionadas neste artigo, e o treinamento de pessoas, certamente, ajudar\u00e3o voc\u00ea a manter a sua empresa e os seus dados protegidos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e004ea3 elementor-widget elementor-widget-template\" data-id=\"e004ea3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4620\" class=\"elementor elementor-4620\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-95982b0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"95982b0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7f77959\" data-id=\"7f77959\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 3 PT Demo banner&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-f614fab elementor-widget elementor-widget-image\" data-id=\"f614fab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/demo\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security.jpg\" class=\"attachment-full size-full wp-image-97\" alt=\"Gatefy Dashboard\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security.jpg 1280w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-300x169.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-1024x576.jpg 1024w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-768x432.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-1200x675.jpg 1200w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b50450b\" data-id=\"b50450b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9416cd4 elementor-widget elementor-widget-text-editor\" data-id=\"9416cd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMelhore a seguran\u00e7a da sua empresa. Agende demo!\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b1deb1 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"3b1deb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 3 PT Demo form&quot;}\" class=\"events-tracker-for-elementor\" id=\"cta3_pt\" name=\"cta3_pt\" aria-label=\"cta3_pt\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"4620\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"3b1deb1\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"LGPD: 10 bases legais para entender a aplica\u00e7\u00e3o da lei - Gatefy\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"15632\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tNome\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Nome*\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tE-mail Corporativo\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"E-mail Corporativo*\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_e594bbf elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_e594bbf\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tTelefone\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_e594bbf]\" id=\"form-field-field_e594bbf\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Telefone*\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Apenas n\u00fameros e caracteres de telefone (#, -, *, etc.) s\u00e3o aceitos.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-select elementor-field-group elementor-column elementor-field-group-field_d2f3e82 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_d2f3e82\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCargo\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field elementor-select-wrapper remove-before \">\n\t\t\t<div class=\"select-caret-down-wrapper\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-caret-down\"><\/i>\t\t\t<\/div>\n\t\t\t<select name=\"form_fields[field_d2f3e82]\" id=\"form-field-field_d2f3e82\" class=\"elementor-field-textual elementor-size-sm\" required=\"required\">\n\t\t\t\t\t\t\t\t\t<option value=\"Cargo*\">Cargo*<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Tecnologia\">Tecnologia<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Financeiro\">Financeiro<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Recursos Humanos\">Recursos Humanos<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Comercial\">Comercial<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Marketing\">Marketing<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Outro\">Outro<\/option>\n\t\t\t\t\t\t\t<\/select>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_e5faed5 elementor-col-100\">\n\t\t\t\t\t<label> <font size=\"2\">\n<input type=\"checkbox\" data-privacy=\"true\" name=\"communications\"\u00a0 value=\"1\">\nConcordo em receber informa\u00e7\u00f5es de acordo com a <a href=\"https:\/\/gatefy.com\/pt-br\/politica-privacidade\/\"\ntarget=\"_blank\">Pol\u00edtica de Privacidade e Cookies da Gatefy<\/a>.\nVoc\u00ea pode cancelar a assinatura a qualquer momento.\n<input type=\"hidden\" data-privacy=\"true\" name=\"privacy_policy\" value=\"1\">\n\u00a0<input type=\"hidden\" data-privacy=\"true\" name=\"terms_of_use\" value=\"1\">\n<\/font>\n<\/label>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_83eebfa elementor-col-100 recaptcha_v3-bottomright\">\n\t\t\t\t\t<div class=\"elementor-field\" id=\"form-field-field_83eebfa\"><div class=\"elementor-g-recaptcha\" data-sitekey=\"6Ley0Y4aAAAAADbdMG_0j3T4a82SexhiFrcCP5JE\" data-type=\"v3\" data-action=\"Form\" data-badge=\"bottomright\" data-size=\"invisible\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Receber contato<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-41e2d34\" data-id=\"41e2d34\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5368f99 elementor-widget elementor-widget-template\" data-id=\"5368f99\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_offset&quot;:100,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;laptop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4297\" class=\"elementor elementor-4297\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ab703fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ab703fd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a46a065\" data-id=\"a46a065\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;Sidebar 1 PT banner&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-8362479 elementor-widget elementor-widget-image\" data-id=\"8362479\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/materiais\/phishing\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"370\" height=\"230\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/casos-phishing-gatefy-ebook-1.png\" class=\"attachment-full size-full wp-image-16407\" alt=\"\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/casos-phishing-gatefy-ebook-1.png 370w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/casos-phishing-gatefy-ebook-1-300x186.png 300w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-654f745 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"654f745\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2924798\" data-id=\"2924798\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b22d40 elementor-widget elementor-widget-wp-widget-recent-posts\" data-id=\"4b22d40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-recent-posts.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\n\t\t<h5>Veja tamb\u00e9m<\/h5><nav aria-label=\"Veja tamb\u00e9m\">\n\t\t<ul>\n\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\">3 maneiras que a LGPD afeta o e-mail da sua empresa<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/materiais\/ebook-lgpg\/\">LGPD<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\">Quais s\u00e3o os 3 tipos de pol\u00edticas DMARC?<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t<\/ul>\n\n\t\t<\/nav>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d229c13 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d229c13\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f9f7398\" data-id=\"f9f7398\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c2f385d elementor-widget elementor-widget-template\" data-id=\"c2f385d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4151\" class=\"elementor elementor-4151 elementor-3964 elementor-3964\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-03c5dac elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"03c5dac\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-782b239\" data-id=\"782b239\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-056265e elementor-widget elementor-widget-heading\" data-id=\"056265e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">N\u00e3o esque\u00e7a de compartilhar este post<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88cfcd1 elementor-share-buttons--view-icon elementor-share-buttons--shape-rounded elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"88cfcd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_reddit\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no reddit\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-reddit\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af288c9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"af288c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e31e090 elementor-widget elementor-widget-heading\" data-id=\"e31e090\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Not\u00edcias Relacionadas<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce216ce elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"ce216ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"hm hm-arrow-down\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4182cb elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"d4182cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-8305 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-dicas-conselhos\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa-300x150.jpg\" class=\"attachment-medium size-medium wp-image-8308\" alt=\"Checklist para LGPD assegurar prote\u00e7\u00e3o de e-mail.\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa-768x384.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\" >\n\t\t\t\t3 maneiras que a LGPD afeta o e-mail da sua empresa\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\" aria-label=\"Leia mais sobre 3 maneiras que a LGPD afeta o e-mail da sua empresa\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-7960 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-educacao\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc-300x150.jpg\" class=\"attachment-medium size-medium wp-image-7961\" alt=\"Quais s\u00e3o os 3 tipos de pol\u00edticas DMARC?\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc-768x384.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\" >\n\t\t\t\tQuais s\u00e3o os 3 tipos de pol\u00edticas DMARC?\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\" aria-label=\"Leia mais sobre Quais s\u00e3o os 3 tipos de pol\u00edticas DMARC?\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-16789 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-educacao\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/boas-praticas-de-seguranca-de-email-para-proteger-sua-empresa\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email-300x150.jpg\" class=\"attachment-medium size-medium wp-image-16791\" alt=\"cadeado, escudo (senhas fortes e mecanismos de prote\u00e7\u00e3o) e outras boas praticas de seguran\u00e7a de e-mail\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email-768x384.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/boas-praticas-de-seguranca-de-email-para-proteger-sua-empresa\/\" >\n\t\t\t\t6 boas pr\u00e1ticas de seguran\u00e7a de e-mail para proteger sua empresa\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/boas-praticas-de-seguranca-de-email-para-proteger-sua-empresa\/\" aria-label=\"Leia mais sobre 6 boas pr\u00e1ticas de seguran\u00e7a de e-mail para proteger sua empresa\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":15762,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,37],"tags":[],"class_list":["post-15760","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-educacao"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Como funciona a seguran\u00e7a de e-mail? - Gatefy&#039;s Blog<\/title>\n<meta name=\"description\" content=\"O e-mail sempre foi utilizado para compartilhar dados e \u00e9 aqui que o assunto ganha import\u00e2ncia. Saiba como funciona a seguran\u00e7a de e-mail!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Como funciona a seguran\u00e7a de e-mail? - Gatefy&#039;s Blog\" \/>\n<meta property=\"og:description\" content=\"O e-mail sempre foi utilizado para compartilhar dados e \u00e9 aqui que o assunto ganha import\u00e2ncia. Saiba como funciona a seguran\u00e7a de e-mail!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/\" \/>\n<meta property=\"og:site_name\" content=\"Gatefy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gatefy\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-17T10:15:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-17T15:24:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/05\/funcionamento-seguranca-email.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gatefy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@gatefy_security\" \/>\n<meta name=\"twitter:site\" content=\"@gatefy_security\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gatefy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/\"},\"author\":{\"name\":\"Gatefy\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94\"},\"headline\":\"Como funciona a seguran\u00e7a de e-mail?\",\"datePublished\":\"2021-06-17T10:15:05+00:00\",\"dateModified\":\"2021-06-17T15:24:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/\"},\"wordCount\":1452,\"publisher\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#organization\"},\"image\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/05\/funcionamento-seguranca-email.jpg\",\"articleSection\":[\"Blog\",\"Educa\u00e7\u00e3o\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/\",\"url\":\"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/\",\"name\":\"Como funciona a seguran\u00e7a de e-mail? - Gatefy's Blog\",\"isPartOf\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/05\/funcionamento-seguranca-email.jpg\",\"datePublished\":\"2021-06-17T10:15:05+00:00\",\"dateModified\":\"2021-06-17T15:24:51+00:00\",\"description\":\"O e-mail sempre foi utilizado para compartilhar dados e \u00e9 aqui que o assunto ganha import\u00e2ncia. Saiba como funciona a seguran\u00e7a de e-mail!\",\"breadcrumb\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/#primaryimage\",\"url\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/05\/funcionamento-seguranca-email.jpg\",\"contentUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/05\/funcionamento-seguranca-email.jpg\",\"width\":800,\"height\":400,\"caption\":\"Hacker tentando invadir forte seguran\u00e7a de e-mail.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gatefy.com\/pt-br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Como funciona a seguran\u00e7a de e-mail?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#website\",\"url\":\"https:\/\/gatefy.com\/pt-br\/\",\"name\":\"Gatefy\",\"description\":\"We use artificial intelligence and machine learning to improve businesses&#039; inbound and outbound email security. Integrates with O365, Exchange and G Suite.\",\"publisher\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gatefy.com\/pt-br\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#organization\",\"name\":\"Gatefy Email Security\",\"url\":\"https:\/\/gatefy.com\/pt-br\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png\",\"contentUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png\",\"width\":1500,\"height\":500,\"caption\":\"Gatefy Email Security\"},\"image\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/gatefy\",\"https:\/\/x.com\/gatefy_security\",\"https:\/\/www.linkedin.com\/company\/gatefy\",\"https:\/\/www.youtube.com\/channel\/UCFSZUkcvfwYSrGopaRtUSog\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94\",\"name\":\"Gatefy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g\",\"caption\":\"Gatefy\"},\"url\":\"https:\/\/gatefy.com\/pt-br\/author\/gatefy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Como funciona a seguran\u00e7a de e-mail? - Gatefy's Blog","description":"O e-mail sempre foi utilizado para compartilhar dados e \u00e9 aqui que o assunto ganha import\u00e2ncia. Saiba como funciona a seguran\u00e7a de e-mail!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/","og_locale":"pt_BR","og_type":"article","og_title":"Como funciona a seguran\u00e7a de e-mail? - Gatefy's Blog","og_description":"O e-mail sempre foi utilizado para compartilhar dados e \u00e9 aqui que o assunto ganha import\u00e2ncia. Saiba como funciona a seguran\u00e7a de e-mail!","og_url":"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/","og_site_name":"Gatefy","article_publisher":"https:\/\/www.facebook.com\/gatefy","article_published_time":"2021-06-17T10:15:05+00:00","article_modified_time":"2021-06-17T15:24:51+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/05\/funcionamento-seguranca-email.jpg","type":"image\/jpeg"}],"author":"Gatefy","twitter_card":"summary_large_image","twitter_creator":"@gatefy_security","twitter_site":"@gatefy_security","twitter_misc":{"Escrito por":"Gatefy","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/#article","isPartOf":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/"},"author":{"name":"Gatefy","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94"},"headline":"Como funciona a seguran\u00e7a de e-mail?","datePublished":"2021-06-17T10:15:05+00:00","dateModified":"2021-06-17T15:24:51+00:00","mainEntityOfPage":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/"},"wordCount":1452,"publisher":{"@id":"https:\/\/gatefy.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/#primaryimage"},"thumbnailUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/05\/funcionamento-seguranca-email.jpg","articleSection":["Blog","Educa\u00e7\u00e3o"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/","url":"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/","name":"Como funciona a seguran\u00e7a de e-mail? - Gatefy's Blog","isPartOf":{"@id":"https:\/\/gatefy.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/#primaryimage"},"image":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/#primaryimage"},"thumbnailUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/05\/funcionamento-seguranca-email.jpg","datePublished":"2021-06-17T10:15:05+00:00","dateModified":"2021-06-17T15:24:51+00:00","description":"O e-mail sempre foi utilizado para compartilhar dados e \u00e9 aqui que o assunto ganha import\u00e2ncia. Saiba como funciona a seguran\u00e7a de e-mail!","breadcrumb":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/#primaryimage","url":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/05\/funcionamento-seguranca-email.jpg","contentUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/05\/funcionamento-seguranca-email.jpg","width":800,"height":400,"caption":"Hacker tentando invadir forte seguran\u00e7a de e-mail."},{"@type":"BreadcrumbList","@id":"https:\/\/gatefy.com\/pt-br\/blog\/como-funciona-a-seguranca-de-e-mail\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gatefy.com\/pt-br\/"},{"@type":"ListItem","position":2,"name":"Como funciona a seguran\u00e7a de e-mail?"}]},{"@type":"WebSite","@id":"https:\/\/gatefy.com\/pt-br\/#website","url":"https:\/\/gatefy.com\/pt-br\/","name":"Gatefy","description":"We use artificial intelligence and machine learning to improve businesses&#039; inbound and outbound email security. Integrates with O365, Exchange and G Suite.","publisher":{"@id":"https:\/\/gatefy.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gatefy.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/gatefy.com\/pt-br\/#organization","name":"Gatefy Email Security","url":"https:\/\/gatefy.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png","contentUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png","width":1500,"height":500,"caption":"Gatefy Email Security"},"image":{"@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gatefy","https:\/\/x.com\/gatefy_security","https:\/\/www.linkedin.com\/company\/gatefy","https:\/\/www.youtube.com\/channel\/UCFSZUkcvfwYSrGopaRtUSog"]},{"@type":"Person","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94","name":"Gatefy","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g","caption":"Gatefy"},"url":"https:\/\/gatefy.com\/pt-br\/author\/gatefy\/"}]}},"_links":{"self":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/posts\/15760","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/comments?post=15760"}],"version-history":[{"count":0,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/posts\/15760\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/media\/15762"}],"wp:attachment":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/media?parent=15760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/categories?post=15760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/tags?post=15760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}