{"id":7161,"date":"2021-03-22T16:57:02","date_gmt":"2021-03-22T16:57:02","guid":{"rendered":"https:\/\/198.27.90.141\/?p=7161"},"modified":"2021-03-22T20:57:09","modified_gmt":"2021-03-22T20:57:09","slug":"historia-da-engenharia-social-computador-internet","status":"publish","type":"post","link":"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/","title":{"rendered":"A hist\u00f3ria da engenharia social na era dos computadores e da internet"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7161\" class=\"elementor elementor-7161 elementor-6133\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71d4f8be elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"71d4f8be\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-79830c4f\" data-id=\"79830c4f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4edb00e elementor-widget elementor-widget-heading\" data-id=\"4edb00e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">A hist\u00f3ria da engenharia social na era dos computadores e da internet<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-161d464 elementor-widget elementor-widget-template\" data-id=\"161d464\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4201\" class=\"elementor elementor-4201 elementor-4192 elementor-4192\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dffd2b9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dffd2b9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb88354\" data-id=\"bb88354\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8309bfc elementor-align-left elementor-tablet-align-center elementor-widget elementor-widget-post-info\" data-id=\"8309bfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-07d5219 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-calendar-alt\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Atualizado em<\/span>\n\t\t\t\t\t\t\t\t\t\t<time>22 mar\u00e7o, 2021<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-573941e elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-user-circle\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Por<\/span>\n\t\t\t\t\t\t\t\t\t\tGatefy\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-389e7a6 elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-list\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/category\/blog\/\" class=\"elementor-post-info__terms-list-item\">Blog<\/a>, <a href=\"https:\/\/gatefy.com\/pt-br\/category\/blog\/educacao\/\" class=\"elementor-post-info__terms-list-item\">Educa\u00e7\u00e3o<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-255fe8b elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"255fe8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/A_historia_da_engenharia_social_na_era_dos_computadores_e_da_internet.jpg\" class=\"attachment-full size-full wp-image-7162\" alt=\"Rec\u00e9m-nascido chegando de bal\u00e3o na tela de homem que l\u00ea sobre a hist\u00f3ria da engenharia social\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/A_historia_da_engenharia_social_na_era_dos_computadores_e_da_internet.jpg 800w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/A_historia_da_engenharia_social_na_era_dos_computadores_e_da_internet-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/A_historia_da_engenharia_social_na_era_dos_computadores_e_da_internet-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3476e9c elementor-widget elementor-widget-template\" data-id=\"3476e9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4319\" class=\"elementor elementor-4319 elementor-4237 elementor-4237\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b3a25ba elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"b3a25ba\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-baf9f65\" data-id=\"baf9f65\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ffe851 elementor-share-buttons--view-icon elementor-share-buttons--shape-rounded elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"4ffe851\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_reddit\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no reddit\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-reddit\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ec99e1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3ec99e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7767a29 elementor-widget elementor-widget-text-editor\" data-id=\"7767a29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>No contexto da seguran\u00e7a da informa\u00e7\u00e3o, a engenharia social \u00e9 um dos t\u00f3picos da moda. \u00c9 uma t\u00e9cnica utilizada por hackers para aumentar a credibilidade de seus golpes e fraudes. De maneira sucinta, podemos dizer que a engenharia social envolve manipula\u00e7\u00e3o e persuas\u00e3o, e tem rela\u00e7\u00e3o direta com roubo de identidade, impersonation e spoofing. Na pr\u00e1tica, isto significa que os hackers usam a engenharia social como uma ferramenta para se passar por pessoas ou empresas leg\u00edtimas, conquistando a confian\u00e7a de suas v\u00edtimas.<\/p><p>Em outras palavras, a <a href=\"https:\/\/gatefy.com\/pt-br\/postagem\/o-que-e-engenharia-social\/\" target=\"_blank\" rel=\"noopener\">engenharia social<\/a> \u00e9 usada para induzir pessoas a agirem de uma certa maneira. Sem d\u00favidas, esta n\u00e3o \u00e9 uma t\u00e1tica nova. A engenharia social est\u00e1 presente desde os prim\u00f3rdios da humanidade. Os grandes casos de espionagem, por exemplo, envolvem engenharia social. Se voc\u00ea \u00e9 f\u00e3 das hist\u00f3rias de James Bond, sabe do que eu estou falando. A hist\u00f3ria do guerreiro grego Ulisses e seu grande cavalo de madeira que foi usado para superar as muralhas de Troia \u00e9 outro exemplo.<\/p><p>Mas o meu exemplo preferido para ilustrar e definir a engenharia social vem dos quadrinhos. A personagem ficcional M\u00edstica, dos X-men, \u00e9 a engenharia social em \u201cpessoa\u201d. M\u00edstica \u00e9 uma mutante que nasceu com a habilidade de mudar de forma. Ou seja, ela pode imitar quem ela quiser, quando ela quiser, com extrema precis\u00e3o. Ent\u00e3o, n\u00f3s podemos dizer que a personagem \u00e9 uma social engineer.<\/p><p>Na vida real, a engenharia social \u00e9 usada de v\u00e1rias maneiras. Na maioria dos casos, ela \u00e9 utilizada em golpes cibern\u00e9ticos, como campanhas de <a href=\"https:\/\/gatefy.com\/pt-br\/postagem\/o-que-e-spam\/\" target=\"_blank\" rel=\"noopener\">spam<\/a> e ataques de <a href=\"https:\/\/gatefy.com\/pt-br\/postagem\/o-que-e-phishing\/\" target=\"_blank\" rel=\"noopener\">phishing<\/a> e de <a href=\"https:\/\/gatefy.com\/pt-br\/postagem\/o-que-e-spear-phishing\/\" target=\"_blank\" rel=\"noopener\">spear phishing<\/a>. Mas tamb\u00e9m \u00e9 usada em fraudes que envolvem telefonemas, SMS e at\u00e9 presen\u00e7a f\u00edsica.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec7a7cf elementor-widget elementor-widget-template\" data-id=\"ec7a7cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4327\" class=\"elementor elementor-4327 elementor-4215 elementor-4215\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aa2f920 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aa2f920\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4faaeec\" data-id=\"4faaeec\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c7bf09 elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"8c7bf09\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;],&quot;marker_view&quot;:&quot;bullets&quot;,&quot;icon&quot;:{&quot;value&quot;:&quot;far fa-dot-circle&quot;,&quot;library&quot;:&quot;fa-regular&quot;},&quot;no_headings_message&quot;:&quot;N\\u00e3o foram encontrados cabe\\u00e7alhos nesta p\\u00e1gina.&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h2 class=\"elementor-toc__header-title\">\n\t\t\t\tNeste artigo, voc\u00ea vai ler mais sobre:\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__8c7bf09\" aria-expanded=\"true\" aria-label=\"Abrir Tabela de Conte\u00fados\"><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__8c7bf09\" aria-expanded=\"true\" aria-label=\"Fechar Tabela de Conte\u00fados\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__8c7bf09\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c0406b elementor-widget elementor-widget-template\" data-id=\"7c0406b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4303\" class=\"elementor elementor-4303\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-13ca685 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"13ca685\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f3824af\" data-id=\"f3824af\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 1 PT BEC banner&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-26ab6fe elementor-widget elementor-widget-image\" data-id=\"26ab6fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/materiais\/bec-business-email-compromise\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/elementor\/thumbs\/bec-whitepaper-pt-p44ei873l77kv9n3u68beco60vyk1orejgjks299z2.jpg\" title=\"bec-whitepaper-pt\" alt=\"bec-whitepaper-pt\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2928299\" data-id=\"2928299\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7bbb67b elementor-widget elementor-widget-heading\" data-id=\"7bbb67b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">BEC - Business Email Compromise<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58730f6 elementor-widget elementor-widget-text-editor\" data-id=\"58730f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Fa\u00e7a o download deste ebook para entender tudo sobre BEC, das caracter\u00edsticas \u00e0s t\u00e9cnicas mais usadas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 1 PT BEC botao&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-a3d21a0 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"a3d21a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/gatefy.com\/pt-br\/materiais\/ebook\/bec-business-email-compromise\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Baixar Agora!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bdd1852 elementor-widget elementor-widget-heading\" data-id=\"bdd1852\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">O termo engenharia social e a seguran\u00e7a da informa\u00e7\u00e3o<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b01fef elementor-widget elementor-widget-text-editor\" data-id=\"1b01fef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dentro do mundo da ciberseguran\u00e7a, a quem diga que a populariza\u00e7\u00e3o do termo engenharia social se deve ao especialista em ciberseguran\u00e7a Kevin Mitnick. Em 2013, Mitnick publicou o livro \u201cThe Art of Deception: Controlling the Human Element of Security\u201d. Nele, o especialista fala sobre o conceito e as t\u00e9cnicas de engenharia social e relata a sua pr\u00f3pria experi\u00eancia como um social engineer e hacker.<\/p><p>Mitnick j\u00e1 foi condenado, nos Estados Unidos, por diversos crimes, incluindo roubo de senhas e acesso n\u00e3o autorizado a redes de computadores de grandes corpora\u00e7\u00f5es mundiais. No livro, ele conta que um dos primeiros encontros dele com a engenharia social aconteceu no ensino m\u00e9dio, na d\u00e9cada de 70.<\/p><p>Mitnick aprendeu como hackear a companhia telef\u00f4nica explorando os sistemas e os funcion\u00e1rios da empresa. Com isso, ele tinha acesso a informa\u00e7\u00f5es confidencias de clientes e ainda fazia chamadas gratuitas. Al\u00e9m disso, ele costumava promover pegadinhas. Quando uma v\u00edtima dele tentava telefonar de casa, recebia uma mensagem dizendo que precisava pagar pela liga\u00e7\u00e3o por se tratar de um telefone p\u00fablico.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b49e2b9 elementor-widget elementor-widget-heading\" data-id=\"b49e2b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Primeiros casos de engenharia social<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f5f88d elementor-widget elementor-widget-text-editor\" data-id=\"2f5f88d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Certamente, a engenharia social j\u00e1 existia antes dos computadores e da internet. Mas a pergunta mais interessante a ser feita \u00e9: quais seriam os primeiros casos de engenharia social na era dos computadores e da internet?<\/p><p>\u00c9 uma pergunta dif\u00edcil de ser respondida porque os casos de hacking mais antigos carecem de recursos e fontes. O que \u00e9 facilmente observ\u00e1vel \u00e9 que a engenharia social passou a ganhar mais for\u00e7a a partir dos anos 2000, depois do boom dos computadores e da internet na d\u00e9cada de 90.<\/p><p>Apesar da dificuldade, criamos uma lista tr\u00edplice. S\u00e3o tr\u00eas casos reais de ataques que remetem \u00e0s origens e ao uso da engenharia social na era dos computadores e da internet.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4fea52 elementor-widget elementor-widget-heading\" data-id=\"f4fea52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Elk Cloner, 1982<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-204dbdb elementor-widget elementor-widget-text-editor\" data-id=\"204dbdb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u201cIt will get on all your disks. It will infiltrate your chips. Yes, it\u2019s Cloner! It will stick to you like glue. It will modify RAM too. Send in the Cloner!\u201d. Esta \u00e9 a mensagem (ou poema?) que apareceria na sua tela se o seu computador fosse infectado pelo Elk Cloner.<\/p><p>O Cloner \u00e9 um malware do tipo v\u00edrus que foi criado em 1982 como uma pegadinha por um garoto de 15 anos. Ele era transmitido via disquete e pode ser citado como um dos primeiros casos de engenharia social na era os dispositivos eletr\u00f4nicos porque as v\u00edtimas acreditavam se tratar de um jogo.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa47fb9 elementor-widget elementor-widget-heading\" data-id=\"aa47fb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Melissa, 1999<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c14969d elementor-widget elementor-widget-text-editor\" data-id=\"c14969d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O v\u00edrus <a href=\"https:\/\/gatefy.com\/pt-br\/postagem\/casos-reais-e-famosos-de-ataques-de-malware\/\" target=\"_blank\" rel=\"noopener\">Melissa<\/a> \u00e9 considerado um dos primeiros casos de engenharia social da hist\u00f3ria e um marco porque infectou milhares de computadores no final da d\u00e9cada de 90. O Melissa foi propagado atrav\u00e9s de um ataque de phishing que utilizava um anexo malicioso do Microsoft Word.<\/p><p>Ele enganava o usu\u00e1rio com o seguinte assunto: \u201cMensagem importante de (nome de algu\u00e9m conhecido pelo alvo)\u201d. O preju\u00edzo estimado do Melissa chega a USD 80 milh\u00f5es.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e354849 elementor-widget elementor-widget-heading\" data-id=\"e354849\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. ILOVEYOU, 2000<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-632d5b2 elementor-widget elementor-widget-text-editor\" data-id=\"632d5b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O <a href=\"https:\/\/gatefy.com\/pt-br\/postagem\/qual-e-diferenca-entre-worm-e-virus\/\" target=\"_blank\" rel=\"noopener\">worm<\/a> ILOVEYOU \u00e9 outro caso emblem\u00e1tico de engenharia social. Ele se disfar\u00e7ava de uma suposta carta de amor que a v\u00edtima recebia por e-mail. Obviamente, o anexo se tratava de um <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/4-maneiras-de-identificar-anexos-maliciosos-emails\/\" target=\"_blank\" rel=\"noopener\">arquivo malicioso<\/a>.<\/p><p>No e-mail, o social engineer (se passando por um pobre apaixonado) pedia para que a v\u00edtima gentilmente olhasse a carta. Nos anos 2000, o preju\u00edzo estimado do ILOVEYOU chega a 15 bilh\u00f5es de d\u00f3lares.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1646d8b elementor-widget elementor-widget-heading\" data-id=\"1646d8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Como se proteger contra engenharia social<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-871c1a2 elementor-widget elementor-widget-text-editor\" data-id=\"871c1a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O interessante a se notar sobre a engenharia social \u00e9 que ela envolve manipula\u00e7\u00e3o psicol\u00f3gica. Ela brinca com as emo\u00e7\u00f5es a as cren\u00e7as dos usu\u00e1rios (ou potenciais v\u00edtimas). Ao explorar as pessoas ou, como dizemos, o fator humano, a engenharia social se torna atrativa para o cibercriminoso, que pode ignorar aqueles meios de prote\u00e7\u00e3o e seguran\u00e7a que foram projetados para detectar ataques convencionais.<\/p><p>Se n\u00f3s pegarmos como base um <a href=\"https:\/\/gatefy.com\/pt-br\/postagem\/relatorio-da-verizon-ransomware-phishing-bec\/\" target=\"_blank\" rel=\"noopener\">relat\u00f3rio da Verizon<\/a>, podemos dizer que de cada 10 vazamentos de dados em empresas hoje, 3 deles envolvem engenharia social. Observe que estamos falando apenas de empresas. Imagine o que h\u00e1 para al\u00e9m disso.<\/p><p>Basta pegarmos como exemplo a enxurrada de ataques que utilizam o nome e a marca de grandes empresas, como Apple, <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/email-phishing-amazon\/\" target=\"_blank\" rel=\"noopener\">Amazon<\/a>, <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/phishing-email-conta-netflix-deve-ser-atualizada\/\" target=\"_blank\" rel=\"noopener\">Netflix<\/a>, Microsoft, Spotify, entre outras. Centenas de novos golpes s\u00e3o criados diariamente.<\/p><p>Uma das dicas mais importantes para se proteger contra ataques de engenharia social \u00e9 cuidar bem dos seus dados e informa\u00e7\u00f5es. Isto significa, inclusive, n\u00e3o compartilhar informa\u00e7\u00f5es pessoais em sites suspeitos e cuidar com a sua presen\u00e7a nas redes sociais.<\/p><p>Outra dica valiosa \u00e9 n\u00e3o interagir com e-mails, telefonemas ou mensagens suspeitas. Em caso de d\u00favidas, procure confirmar a informa\u00e7\u00e3o de outra maneira. Manter os seus sistemas atualizados e usar softwares de prote\u00e7\u00e3o tamb\u00e9m evitam infec\u00e7\u00f5es.<\/p><p>No caso de empresas, d\u00ea uma olhada neste post: <a href=\"https:\/\/gatefy.com\/pt-br\/postagem\/dicas-proteger-empresa-ataques-engenharia-social\/\" target=\"_blank\" rel=\"noopener\">4 dicas para proteger a sua empresa contra ataques de engenharia social<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e004ea3 elementor-widget elementor-widget-template\" data-id=\"e004ea3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4620\" class=\"elementor elementor-4620\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-95982b0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"95982b0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7f77959\" data-id=\"7f77959\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 3 PT Demo banner&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-f614fab elementor-widget elementor-widget-image\" data-id=\"f614fab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/demo\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security.jpg\" class=\"attachment-full size-full wp-image-97\" alt=\"Gatefy Dashboard\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security.jpg 1280w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-300x169.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-1024x576.jpg 1024w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-768x432.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-1200x675.jpg 1200w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b50450b\" data-id=\"b50450b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9416cd4 elementor-widget elementor-widget-text-editor\" data-id=\"9416cd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMelhore a seguran\u00e7a da sua empresa. Agende demo!\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b1deb1 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"3b1deb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 3 PT Demo form&quot;}\" class=\"events-tracker-for-elementor\" id=\"cta3_pt\" name=\"cta3_pt\" aria-label=\"cta3_pt\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"4620\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"3b1deb1\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Gatefy\" \/>\n\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tNome\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Nome*\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tE-mail Corporativo\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"E-mail Corporativo*\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_e594bbf elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_e594bbf\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tTelefone\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_e594bbf]\" id=\"form-field-field_e594bbf\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Telefone*\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Apenas n\u00fameros e caracteres de telefone (#, -, *, etc.) s\u00e3o aceitos.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-select elementor-field-group elementor-column elementor-field-group-field_d2f3e82 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_d2f3e82\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCargo\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field elementor-select-wrapper remove-before \">\n\t\t\t<div class=\"select-caret-down-wrapper\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-caret-down\"><\/i>\t\t\t<\/div>\n\t\t\t<select name=\"form_fields[field_d2f3e82]\" id=\"form-field-field_d2f3e82\" class=\"elementor-field-textual elementor-size-sm\" required=\"required\">\n\t\t\t\t\t\t\t\t\t<option value=\"Cargo*\">Cargo*<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Tecnologia\">Tecnologia<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Financeiro\">Financeiro<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Recursos Humanos\">Recursos Humanos<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Comercial\">Comercial<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Marketing\">Marketing<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Outro\">Outro<\/option>\n\t\t\t\t\t\t\t<\/select>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_e5faed5 elementor-col-100\">\n\t\t\t\t\t<label> <font size=\"2\">\n<input type=\"checkbox\" data-privacy=\"true\" name=\"communications\"\u00a0 value=\"1\">\nConcordo em receber informa\u00e7\u00f5es de acordo com a <a href=\"https:\/\/gatefy.com\/pt-br\/politica-privacidade\/\"\ntarget=\"_blank\">Pol\u00edtica de Privacidade e Cookies da Gatefy<\/a>.\nVoc\u00ea pode cancelar a assinatura a qualquer momento.\n<input type=\"hidden\" data-privacy=\"true\" name=\"privacy_policy\" value=\"1\">\n\u00a0<input type=\"hidden\" data-privacy=\"true\" name=\"terms_of_use\" value=\"1\">\n<\/font>\n<\/label>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_83eebfa elementor-col-100 recaptcha_v3-bottomright\">\n\t\t\t\t\t<div class=\"elementor-field\" id=\"form-field-field_83eebfa\"><div class=\"elementor-g-recaptcha\" data-sitekey=\"6Ley0Y4aAAAAADbdMG_0j3T4a82SexhiFrcCP5JE\" data-type=\"v3\" data-action=\"Form\" data-badge=\"bottomright\" data-size=\"invisible\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Receber contato<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-41e2d34\" data-id=\"41e2d34\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5368f99 elementor-widget elementor-widget-template\" data-id=\"5368f99\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_offset&quot;:100,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;laptop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4297\" class=\"elementor elementor-4297\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ab703fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ab703fd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a46a065\" data-id=\"a46a065\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;Sidebar 1 PT banner&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-8362479 elementor-widget elementor-widget-image\" data-id=\"8362479\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/materiais\/phishing\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"370\" height=\"230\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/casos-phishing-gatefy-ebook-1.png\" class=\"attachment-full size-full wp-image-16407\" alt=\"\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/casos-phishing-gatefy-ebook-1.png 370w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/casos-phishing-gatefy-ebook-1-300x186.png 300w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-654f745 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"654f745\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2924798\" data-id=\"2924798\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b22d40 elementor-widget elementor-widget-wp-widget-recent-posts\" data-id=\"4b22d40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-recent-posts.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\n\t\t<h5>Veja tamb\u00e9m<\/h5><nav aria-label=\"Veja tamb\u00e9m\">\n\t\t<ul>\n\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\">3 maneiras que a LGPD afeta o e-mail da sua empresa<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/materiais\/ebook-lgpg\/\">LGPD<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\">Quais s\u00e3o os 3 tipos de pol\u00edticas DMARC?<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t<\/ul>\n\n\t\t<\/nav>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d229c13 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d229c13\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f9f7398\" data-id=\"f9f7398\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c2f385d elementor-widget elementor-widget-template\" data-id=\"c2f385d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4151\" class=\"elementor elementor-4151 elementor-3964 elementor-3964\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-03c5dac elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"03c5dac\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-782b239\" data-id=\"782b239\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-056265e elementor-widget elementor-widget-heading\" data-id=\"056265e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">N\u00e3o esque\u00e7a de compartilhar este post<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88cfcd1 elementor-share-buttons--view-icon elementor-share-buttons--shape-rounded elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"88cfcd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_reddit\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no reddit\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-reddit\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af288c9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"af288c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e31e090 elementor-widget elementor-widget-heading\" data-id=\"e31e090\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Not\u00edcias Relacionadas<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce216ce elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"ce216ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"hm hm-arrow-down\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4182cb elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"d4182cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-8305 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-dicas-conselhos\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa-300x150.jpg\" class=\"attachment-medium size-medium wp-image-8308\" alt=\"Checklist para LGPD assegurar prote\u00e7\u00e3o de e-mail.\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa-768x384.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\" >\n\t\t\t\t3 maneiras que a LGPD afeta o e-mail da sua empresa\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\" aria-label=\"Leia mais sobre 3 maneiras que a LGPD afeta o e-mail da sua empresa\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-7960 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-educacao\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc-300x150.jpg\" class=\"attachment-medium size-medium wp-image-7961\" alt=\"Quais s\u00e3o os 3 tipos de pol\u00edticas DMARC?\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc-768x384.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\" >\n\t\t\t\tQuais s\u00e3o os 3 tipos de pol\u00edticas DMARC?\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\" aria-label=\"Leia mais sobre Quais s\u00e3o os 3 tipos de pol\u00edticas DMARC?\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-16789 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-educacao\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/boas-praticas-de-seguranca-de-email-para-proteger-sua-empresa\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email-300x150.jpg\" class=\"attachment-medium size-medium wp-image-16791\" alt=\"cadeado, escudo (senhas fortes e mecanismos de prote\u00e7\u00e3o) e outras boas praticas de seguran\u00e7a de e-mail\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email-768x384.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/boas-praticas-de-seguranca-de-email-para-proteger-sua-empresa\/\" >\n\t\t\t\t6 boas pr\u00e1ticas de seguran\u00e7a de e-mail para proteger sua empresa\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/boas-praticas-de-seguranca-de-email-para-proteger-sua-empresa\/\" aria-label=\"Leia mais sobre 6 boas pr\u00e1ticas de seguran\u00e7a de e-mail para proteger sua empresa\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5729850 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5729850\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-08b4503\" data-id=\"08b4503\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":7162,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,37],"tags":[],"class_list":["post-7161","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-educacao"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A hist\u00f3ria da engenharia social na era dos computadores e da internet - Gatefy<\/title>\n<meta name=\"description\" content=\"A engenharia social tem causado problemas de neg\u00f3cios desde a d\u00e9cada de 1980. Confira a hist\u00f3ria desse perigoso ataque cibern\u00e9tico.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A hist\u00f3ria da engenharia social na era dos computadores e da internet - Gatefy\" \/>\n<meta property=\"og:description\" content=\"A engenharia social tem causado problemas de neg\u00f3cios desde a d\u00e9cada de 1980. Confira a hist\u00f3ria desse perigoso ataque cibern\u00e9tico.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/\" \/>\n<meta property=\"og:site_name\" content=\"Gatefy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gatefy\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-22T16:57:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-22T20:57:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/A_historia_da_engenharia_social_na_era_dos_computadores_e_da_internet.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gatefy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@gatefy_security\" \/>\n<meta name=\"twitter:site\" content=\"@gatefy_security\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gatefy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/\"},\"author\":{\"name\":\"Gatefy\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94\"},\"headline\":\"A hist\u00f3ria da engenharia social na era dos computadores e da internet\",\"datePublished\":\"2021-03-22T16:57:02+00:00\",\"dateModified\":\"2021-03-22T20:57:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/\"},\"wordCount\":1153,\"publisher\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#organization\"},\"image\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/A_historia_da_engenharia_social_na_era_dos_computadores_e_da_internet.jpg\",\"articleSection\":[\"Blog\",\"Educa\u00e7\u00e3o\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/\",\"url\":\"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/\",\"name\":\"A hist\u00f3ria da engenharia social na era dos computadores e da internet - Gatefy\",\"isPartOf\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/A_historia_da_engenharia_social_na_era_dos_computadores_e_da_internet.jpg\",\"datePublished\":\"2021-03-22T16:57:02+00:00\",\"dateModified\":\"2021-03-22T20:57:09+00:00\",\"description\":\"A engenharia social tem causado problemas de neg\u00f3cios desde a d\u00e9cada de 1980. Confira a hist\u00f3ria desse perigoso ataque cibern\u00e9tico.\",\"breadcrumb\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/#primaryimage\",\"url\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/A_historia_da_engenharia_social_na_era_dos_computadores_e_da_internet.jpg\",\"contentUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/A_historia_da_engenharia_social_na_era_dos_computadores_e_da_internet.jpg\",\"width\":800,\"height\":400,\"caption\":\"Rec\u00e9m-nascido chegando de bal\u00e3o na tela de homem que l\u00ea sobre a hist\u00f3ria da engenharia social\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gatefy.com\/pt-br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A hist\u00f3ria da engenharia social na era dos computadores e da internet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#website\",\"url\":\"https:\/\/gatefy.com\/pt-br\/\",\"name\":\"Gatefy\",\"description\":\"We use artificial intelligence and machine learning to improve businesses&#039; inbound and outbound email security. Integrates with O365, Exchange and G Suite.\",\"publisher\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gatefy.com\/pt-br\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#organization\",\"name\":\"Gatefy Email Security\",\"url\":\"https:\/\/gatefy.com\/pt-br\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png\",\"contentUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png\",\"width\":1500,\"height\":500,\"caption\":\"Gatefy Email Security\"},\"image\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/gatefy\",\"https:\/\/x.com\/gatefy_security\",\"https:\/\/www.linkedin.com\/company\/gatefy\",\"https:\/\/www.youtube.com\/channel\/UCFSZUkcvfwYSrGopaRtUSog\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94\",\"name\":\"Gatefy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g\",\"caption\":\"Gatefy\"},\"url\":\"https:\/\/gatefy.com\/pt-br\/author\/gatefy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A hist\u00f3ria da engenharia social na era dos computadores e da internet - Gatefy","description":"A engenharia social tem causado problemas de neg\u00f3cios desde a d\u00e9cada de 1980. Confira a hist\u00f3ria desse perigoso ataque cibern\u00e9tico.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/","og_locale":"pt_BR","og_type":"article","og_title":"A hist\u00f3ria da engenharia social na era dos computadores e da internet - Gatefy","og_description":"A engenharia social tem causado problemas de neg\u00f3cios desde a d\u00e9cada de 1980. Confira a hist\u00f3ria desse perigoso ataque cibern\u00e9tico.","og_url":"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/","og_site_name":"Gatefy","article_publisher":"https:\/\/www.facebook.com\/gatefy","article_published_time":"2021-03-22T16:57:02+00:00","article_modified_time":"2021-03-22T20:57:09+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/A_historia_da_engenharia_social_na_era_dos_computadores_e_da_internet.jpg","type":"image\/jpeg"}],"author":"Gatefy","twitter_card":"summary_large_image","twitter_creator":"@gatefy_security","twitter_site":"@gatefy_security","twitter_misc":{"Escrito por":"Gatefy","Est. tempo de leitura":"10 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/#article","isPartOf":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/"},"author":{"name":"Gatefy","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94"},"headline":"A hist\u00f3ria da engenharia social na era dos computadores e da internet","datePublished":"2021-03-22T16:57:02+00:00","dateModified":"2021-03-22T20:57:09+00:00","mainEntityOfPage":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/"},"wordCount":1153,"publisher":{"@id":"https:\/\/gatefy.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/A_historia_da_engenharia_social_na_era_dos_computadores_e_da_internet.jpg","articleSection":["Blog","Educa\u00e7\u00e3o"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/","url":"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/","name":"A hist\u00f3ria da engenharia social na era dos computadores e da internet - Gatefy","isPartOf":{"@id":"https:\/\/gatefy.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/#primaryimage"},"image":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/A_historia_da_engenharia_social_na_era_dos_computadores_e_da_internet.jpg","datePublished":"2021-03-22T16:57:02+00:00","dateModified":"2021-03-22T20:57:09+00:00","description":"A engenharia social tem causado problemas de neg\u00f3cios desde a d\u00e9cada de 1980. Confira a hist\u00f3ria desse perigoso ataque cibern\u00e9tico.","breadcrumb":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/#primaryimage","url":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/A_historia_da_engenharia_social_na_era_dos_computadores_e_da_internet.jpg","contentUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/A_historia_da_engenharia_social_na_era_dos_computadores_e_da_internet.jpg","width":800,"height":400,"caption":"Rec\u00e9m-nascido chegando de bal\u00e3o na tela de homem que l\u00ea sobre a hist\u00f3ria da engenharia social"},{"@type":"BreadcrumbList","@id":"https:\/\/gatefy.com\/pt-br\/blog\/historia-da-engenharia-social-computador-internet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gatefy.com\/pt-br\/"},{"@type":"ListItem","position":2,"name":"A hist\u00f3ria da engenharia social na era dos computadores e da internet"}]},{"@type":"WebSite","@id":"https:\/\/gatefy.com\/pt-br\/#website","url":"https:\/\/gatefy.com\/pt-br\/","name":"Gatefy","description":"We use artificial intelligence and machine learning to improve businesses&#039; inbound and outbound email security. Integrates with O365, Exchange and G Suite.","publisher":{"@id":"https:\/\/gatefy.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gatefy.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/gatefy.com\/pt-br\/#organization","name":"Gatefy Email Security","url":"https:\/\/gatefy.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png","contentUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png","width":1500,"height":500,"caption":"Gatefy Email Security"},"image":{"@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gatefy","https:\/\/x.com\/gatefy_security","https:\/\/www.linkedin.com\/company\/gatefy","https:\/\/www.youtube.com\/channel\/UCFSZUkcvfwYSrGopaRtUSog"]},{"@type":"Person","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94","name":"Gatefy","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g","caption":"Gatefy"},"url":"https:\/\/gatefy.com\/pt-br\/author\/gatefy\/"}]}},"_links":{"self":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/posts\/7161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/comments?post=7161"}],"version-history":[{"count":0,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/posts\/7161\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/media\/7162"}],"wp:attachment":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/media?parent=7161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/categories?post=7161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/tags?post=7161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}