{"id":8025,"date":"2021-03-22T11:10:18","date_gmt":"2021-03-22T11:10:18","guid":{"rendered":"https:\/\/198.27.90.141\/?p=8025"},"modified":"2021-03-22T15:44:11","modified_gmt":"2021-03-22T15:44:11","slug":"o-que-e-phishing","status":"publish","type":"post","link":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/","title":{"rendered":"O que \u00e9 phishing?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8025\" class=\"elementor elementor-8025 elementor-5457\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71d4f8be elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"71d4f8be\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-79830c4f\" data-id=\"79830c4f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fa8d559 elementor-widget elementor-widget-heading\" data-id=\"fa8d559\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">O que \u00e9 phishing?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-161d464 elementor-widget elementor-widget-template\" data-id=\"161d464\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4201\" class=\"elementor elementor-4201 elementor-4192 elementor-4192\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dffd2b9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dffd2b9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb88354\" data-id=\"bb88354\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8309bfc elementor-align-left elementor-tablet-align-center elementor-widget elementor-widget-post-info\" data-id=\"8309bfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-07d5219 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-calendar-alt\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Atualizado em<\/span>\n\t\t\t\t\t\t\t\t\t\t<time>22 mar\u00e7o, 2021<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-573941e elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-user-circle\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Por<\/span>\n\t\t\t\t\t\t\t\t\t\tGatefy\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-389e7a6 elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-list\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/gatefy.com\/category\/blog\/\" class=\"elementor-post-info__terms-list-item\">Blog<\/a>, <a href=\"https:\/\/gatefy.com\/pt-br\/category\/blog\/\" class=\"elementor-post-info__terms-list-item\">Blog<\/a>, <a href=\"https:\/\/gatefy.com\/pt-br\/category\/blog\/educacao\/\" class=\"elementor-post-info__terms-list-item\">Educa\u00e7\u00e3o<\/a>, <a href=\"https:\/\/gatefy.com\/category\/blog\/education\/\" class=\"elementor-post-info__terms-list-item\">Education<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-255fe8b elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"255fe8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-phishing.jpg\" class=\"attachment-full size-full wp-image-8026\" alt=\"O que \u00e9 phishing?\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-phishing.jpg 800w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-phishing-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-phishing-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3476e9c elementor-widget elementor-widget-template\" data-id=\"3476e9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4319\" class=\"elementor elementor-4319 elementor-4237 elementor-4237\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b3a25ba elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"b3a25ba\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-baf9f65\" data-id=\"baf9f65\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ffe851 elementor-share-buttons--view-icon elementor-share-buttons--shape-rounded elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"4ffe851\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_reddit\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no reddit\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-reddit\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ec99e1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3ec99e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7767a29 elementor-widget elementor-widget-text-editor\" data-id=\"7767a29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishing \u00e9 um tipo de cibercrime que acontece quando um cibercriminoso personifica ou se passa por uma pessoa, uma empresa ou um \u00f3rg\u00e3o do governo para atrair e enganar algu\u00e9m.<\/p><p>A grande maioria dos golpes de phishing ocorre por meio de e-mails maliciosos. \u00c9 assim que os criminosos, tamb\u00e9m chamados de phishers, mais atacam. Mas eles costumam usar tamb\u00e9m mensagens de texto, telefonemas, rede sociais e sites falsos.<\/p><p>O nome phishing vem do ingl\u00eas \u201cfishing\u201d, que significa pescaria. Ou seja, o objetivo do phishing \u00e9 pescar a v\u00edtima para que ela, basicamente, forne\u00e7a dados e informa\u00e7\u00f5es pessoais.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec7a7cf elementor-widget elementor-widget-template\" data-id=\"ec7a7cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4327\" class=\"elementor elementor-4327 elementor-4215 elementor-4215\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aa2f920 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aa2f920\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4faaeec\" data-id=\"4faaeec\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c7bf09 elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"8c7bf09\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;],&quot;marker_view&quot;:&quot;bullets&quot;,&quot;icon&quot;:{&quot;value&quot;:&quot;far fa-dot-circle&quot;,&quot;library&quot;:&quot;fa-regular&quot;},&quot;no_headings_message&quot;:&quot;N\\u00e3o foram encontrados cabe\\u00e7alhos nesta p\\u00e1gina.&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h2 class=\"elementor-toc__header-title\">\n\t\t\t\tNeste artigo, voc\u00ea vai ler mais sobre:\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__8c7bf09\" aria-expanded=\"true\" aria-label=\"Abrir Tabela de Conte\u00fados\"><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__8c7bf09\" aria-expanded=\"true\" aria-label=\"Fechar Tabela de Conte\u00fados\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__8c7bf09\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c0406b elementor-widget elementor-widget-template\" data-id=\"7c0406b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4303\" class=\"elementor elementor-4303\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-13ca685 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"13ca685\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f3824af\" data-id=\"f3824af\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 1 PT BEC banner&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-26ab6fe elementor-widget elementor-widget-image\" data-id=\"26ab6fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/materiais\/bec-business-email-compromise\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/elementor\/thumbs\/bec-whitepaper-pt-p44ei873l77kv9n3u68beco60vyk1orejgjks299z2.jpg\" title=\"bec-whitepaper-pt\" alt=\"bec-whitepaper-pt\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2928299\" data-id=\"2928299\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7bbb67b elementor-widget elementor-widget-heading\" data-id=\"7bbb67b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">BEC - Business Email Compromise<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58730f6 elementor-widget elementor-widget-text-editor\" data-id=\"58730f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Fa\u00e7a o download deste ebook para entender tudo sobre BEC, das caracter\u00edsticas \u00e0s t\u00e9cnicas mais usadas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 1 PT BEC botao&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-a3d21a0 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"a3d21a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/gatefy.com\/pt-br\/materiais\/ebook\/bec-business-email-compromise\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Baixar Agora!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-802296a elementor-widget elementor-widget-heading\" data-id=\"802296a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Por que o phishing \u00e9 t\u00e3o comum?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b159dd elementor-widget elementor-widget-text-editor\" data-id=\"7b159dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O phishing \u00e9 uma das principais amea\u00e7as e um dos ataques mais utilizados por criminosos nos dias de hoje porque \u00e9 muito mais simples mentir e persuadir algu\u00e9m com um e-mail, por exemplo, do que invadir um computador.<\/p><p><strong><a href=\"https:\/\/gatefy.com\/pt-br\/blog\/bec-phishing-continuam-moda-diz-relatorio-fbi\/\" target=\"_blank\" rel=\"noopener\">De acordo com o FBI<\/a><\/strong>, o phishing \u00e9 o golpe cibern\u00e9tico mais cometido no mundo, afetando milhares de pessoas e empresas todos os dias.<\/p><p>Nos \u00faltimos anos, o FBI registrou um aumento gigantesco no n\u00famero de reclama\u00e7\u00f5es envolvendo phishing. Em 2019, foram registrados 114.702 casos. Em 2018, houve apenas 26.379 casos.<\/p><p>O valor estimado em termos de perdas financeiras chega a quase USD 58 milh\u00f5es.\u00a0<strong><a href=\"https:\/\/pdf.ic3.gov\/2019_IC3Report.pdf\" target=\"_blank\" rel=\"noopener\">Confira o relat\u00f3rio do FBI aqui<\/a><\/strong>.<\/p><p>Um\u00a0<strong><a href=\"https:\/\/gatefy.com\/pt-br\/blog\/principais-pontos-europol-relatorio-spear-phishing\/\" target=\"_blank\" rel=\"noopener\">relat\u00f3rio da Europol<\/a><\/strong>\u00a0aponta ainda que os golpes de phishing est\u00e3o envolvidos em cerca de 32% dos casos de vazamentos de dados em empresas.<\/p><p><strong><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/02\/28\/microsoft-security-intelligence-report-volume-24-is-now-available\/\" target=\"_blank\" rel=\"noopener\">Segundo dados da Microsoft<\/a><\/strong>, o n\u00famero de ataques de phishing aumentou 250% em 2018, o que coloca o phishing como uma amea\u00e7a real e presente.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba7ab2f elementor-widget elementor-widget-heading\" data-id=\"ba7ab2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Como o ataque de phishing funciona<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9ce858 elementor-widget elementor-widget-text-editor\" data-id=\"b9ce858\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Os ataques de phishing n\u00e3o t\u00eam como foco a vulnerabilidade em m\u00e1quinas, sistemas ou softwares. O foco dos golpes de phishing \u00e9 a vulnerabilidade humana. Isto \u00e9 o que chamamos de fator humano.\u00a0<\/p><p>Em outras palavras, o hacker lan\u00e7a o golpe e espera que a v\u00edtima morda a isca e acredite na fraude. A pessoa, realmente, precisa morder a isca.<\/p><p>Nos casos de ataques de phishing via e-mail, geralmente, as v\u00edtimas recebem uma mensagem com uma solicita\u00e7\u00e3o urgente, que pode conter links e anexos maliciosos.<\/p><p>Outra caracter\u00edstica dos golpes de phishing \u00e9 que estes e-mails sempre t\u00eam como remetentes pessoas ou empresas que aparentemente s\u00e3o confi\u00e1veis, como, por exemplo, o gerente do seu banco, a Apple, a Microsoft ou a Netflix.<\/p><p>Todo mundo j\u00e1 recebeu, pelo menos uma vez na vida, um e-mail suspeito que tentou persuadi-lo a clicar em um link, fazer o download de um arquivo, preencher um formul\u00e1rio ou fornecer informa\u00e7\u00f5es do seu cart\u00e3o de cr\u00e9dito.\u00a0<\/p><p>\u00c9 disso que os golpes de phishing se tratam. \u00c9 assim que os ataques de phishing funcionam.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-234aa32 elementor-widget elementor-widget-heading\" data-id=\"234aa32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Phishing com link malicioso<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15d539a elementor-widget elementor-widget-text-editor\" data-id=\"15d539a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Quando se tem uma\u00a0<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-url-maliciosa\/\" target=\"_blank\" rel=\"noopener\"><strong>URL ou um link malicioso<\/strong><\/a>\u00a0no phishing, a mensagem de e-mail vai solicitar que a pessoa clique no link e atualize as informa\u00e7\u00f5es de pagamento, por exemplo.\u00a0<\/p><p>O que a v\u00edtima n\u00e3o sabe \u00e9 que o link ir\u00e1 direcion\u00e1-la para uma p\u00e1gina falsa que se parece muito com o site real e oficial. Ao fornecer os dados, a v\u00edtima acaba enviando as suas informa\u00e7\u00f5es para o cibercriminoso.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38f7da4 elementor-widget elementor-widget-heading\" data-id=\"38f7da4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Phishing com anexo malicioso<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-241fd99 elementor-widget elementor-widget-text-editor\" data-id=\"241fd99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Se for o caso do phishing conter um\u00a0<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/4-maneiras-de-identificar-anexos-maliciosos-emails\/\" target=\"_blank\" rel=\"noopener\"><strong>anexo malicioso<\/strong><\/a>, o principal risco \u00e9 clicar no arquivo e ser infectado por um malware, como, por exemplo, trojan, v\u00edrus, spyware e ransomware.<\/p><p>O grande problema dos malwares \u00e9 que eles podem comprometer informa\u00e7\u00f5es importantes e at\u00e9 provocar danos irrepar\u00e1veis.\u00a0<\/p><p>No caso dos ransomwares, por exemplo, dados e sistemas s\u00e3o sequestrados e bloqueados, o que pode paralisar a opera\u00e7\u00e3o de toda uma empresa. Para liber\u00e1-los, os criminosos exigem o pagamento de um resgate.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e99c608 elementor-widget elementor-widget-heading\" data-id=\"e99c608\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Quais s\u00e3o os tipos de phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fd20a8 elementor-widget elementor-widget-text-editor\" data-id=\"6fd20a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Conhe\u00e7a agora as tr\u00eas principais varia\u00e7\u00f5es de phishing: vishing, smishing e pharming.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9585827 elementor-widget elementor-widget-heading\" data-id=\"9585827\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Vishing<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cd0ba3 elementor-widget elementor-widget-text-editor\" data-id=\"5cd0ba3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Vishing s\u00e3o golpes que acontecem via telefone ou voz.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48ec012 elementor-widget elementor-widget-heading\" data-id=\"48ec012\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Smishing<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82aefdf elementor-widget elementor-widget-text-editor\" data-id=\"82aefdf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Smishing s\u00e3o ataques que ocorrem via mensagens de texto ou SMS.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-368d8f0 elementor-widget elementor-widget-heading\" data-id=\"368d8f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Pharming<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2540ffc elementor-widget elementor-widget-text-editor\" data-id=\"2540ffc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pharming s\u00e3o fraudes que ocorrem quando c\u00f3digo malicioso \u00e9 instalado para redirecion\u00e1-lo para sites falsos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4575cde elementor-widget elementor-widget-heading\" data-id=\"4575cde\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Qual \u00e9 a rela\u00e7\u00e3o entre engenharia social, spoofing e phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb9d505 elementor-widget elementor-widget-heading\" data-id=\"fb9d505\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Engenharia social<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e17cd57 elementor-widget elementor-widget-text-editor\" data-id=\"e17cd57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Como estamos falando de persuas\u00e3o e mentira, uma das principais t\u00e9cnicas utilizadas em golpes de phishing \u00e9 a\u00a0<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-engenharia-social\/\" target=\"_blank\" rel=\"noopener\"><strong>engenharia social<\/strong><\/a>.\u00a0<\/p><p>A engenharia social inclui m\u00e9todos de manipula\u00e7\u00e3o para obter acesso a informa\u00e7\u00f5es confidenciais que depois ser\u00e3o usadas para fins fraudulentos.\u00a0<\/p><p>Basicamente, em seguran\u00e7a da informa\u00e7\u00e3o, engenharia social \u00e9 o ato de persuadir e manipular pessoas ap\u00f3s uma extensa pesquisa sobre elas.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d031f3f elementor-widget elementor-widget-heading\" data-id=\"d031f3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Spoofing<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f10352 elementor-widget elementor-widget-text-editor\" data-id=\"2f10352\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O\u00a0<strong><a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-spoofing-de-dominio\/\" target=\"_blank\" rel=\"noopener\">spoofing<\/a><\/strong>\u00a0tem rela\u00e7\u00e3o com a cria\u00e7\u00e3o de endere\u00e7os de e-mail e de site falsificados. Quando utiliza spoofing, o phisher est\u00e1 tentando imitar um endere\u00e7o leg\u00edtimo.\u00a0<\/p><p>O objetivo dele \u00e9 que voc\u00ea n\u00e3o perceba, por exemplo, que apenas uma letra foi adicionada em um endere\u00e7o de e-mail.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e50f48 elementor-widget elementor-widget-heading\" data-id=\"7e50f48\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caracter\u00edsticas dos golpes de phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79e4f34 elementor-widget elementor-widget-text-editor\" data-id=\"79e4f34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Como passar do tempo, os golpes de phishing t\u00eam evolu\u00eddo em grau de sofistica\u00e7\u00e3o, o que os tornam mais dif\u00edceis de serem detectados.\u00a0<\/p><p>Mas, apesar disso, a grande maioria dos ataques de phishing possui algumas caracter\u00edsticas em comum.<\/p><p>Confira a nossa lista.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6822f8a elementor-widget elementor-widget-heading\" data-id=\"6822f8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Assuntos urgentes que exigem uma resposta r\u00e1pida<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5092199 elementor-widget elementor-widget-text-editor\" data-id=\"5092199\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Se o e-mail diz respeito a uma super oferta ou exige que voc\u00ea tome uma a\u00e7\u00e3o rapidamente, fique alerta. O senso de urg\u00eancia \u00e9 uma das principais caracter\u00edsticas de phishing.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15bb37d elementor-widget elementor-widget-heading\" data-id=\"15bb37d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Produtos milagrosos que prometem resolver problemas de maneira r\u00e1pida<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f122dba elementor-widget elementor-widget-text-editor\" data-id=\"f122dba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Mensagens sobre produtos e promessas milagrosas s\u00e3o fraudes. N\u00e3o interaja com e-mails que prometem, rapidamente, queimar gordura ou resolver os seus problemas financeiros.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f38b0b5 elementor-widget elementor-widget-heading\" data-id=\"f38b0b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Remetentes suspeitos e endere\u00e7os de e-mail similares<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20b0655 elementor-widget elementor-widget-text-editor\" data-id=\"20b0655\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Voc\u00ea tem o costume de checar com aten\u00e7\u00e3o o remetente dos e-mails que recebe? Os phishers geralmente usam endere\u00e7os de e-mail similares aos leg\u00edtimos, apenas adicionando ou invertendo letras.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-494b283 elementor-widget elementor-widget-heading\" data-id=\"494b283\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. Erros de ortografia e gram\u00e1tica<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05e5d67 elementor-widget elementor-widget-text-editor\" data-id=\"05e5d67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Um dos principais sinais de phishing s\u00e3o os erros de gram\u00e1tica e ortografia no e-mail. Isto acontece porque muitas vezes o fraudador n\u00e3o conhece muito bem a sua l\u00edngua.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bee8f9a elementor-widget elementor-widget-heading\" data-id=\"bee8f9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5. Links suspeitos<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45106a0 elementor-widget elementor-widget-text-editor\" data-id=\"45106a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Os phishers utilizam muito links maliciosos. Sempre examine com aten\u00e7\u00e3o os links contidos em e-mails. Caso voc\u00ea tenha clicado em um link, analise o endere\u00e7o do site tamb\u00e9m. Em caso de d\u00favidas: feche a p\u00e1gina.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-839f64c elementor-widget elementor-widget-heading\" data-id=\"839f64c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">6. Anexos suspeitos<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f572f8a elementor-widget elementor-widget-text-editor\" data-id=\"f572f8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Anexos s\u00e3o muito perigosos porque eles envolvem malware e outras amea\u00e7as, como, por exemplo, ransomware, trojan e spyware. Por isso, n\u00e3o interaja com anexos que voc\u00ea n\u00e3o estava esperando.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-185fe2f elementor-widget elementor-widget-heading\" data-id=\"185fe2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">7. Solicita\u00e7\u00e3o de informa\u00e7\u00f5es confidenciais<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02346ff elementor-widget elementor-widget-text-editor\" data-id=\"02346ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Independentemente do remetente, suspeite de qualquer mensagem que esteja requisitando informa\u00e7\u00f5es confidenciais, como dados de cart\u00e3o de cr\u00e9dito ou a lista de contato dos funcion\u00e1rios da empresa.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2144e4a elementor-widget elementor-widget-heading\" data-id=\"2144e4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Como se proteger contra phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83a5b0a elementor-widget elementor-widget-text-editor\" data-id=\"83a5b0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Em alguns casos, \u00e9 dif\u00edcil identificar um golpe de phishing. Mas h\u00e1 algumas medidas que podem ser tomadas para se prevenir.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6628b40 elementor-widget elementor-widget-heading\" data-id=\"6628b40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Dicas de preven\u00e7\u00e3o para usu\u00e1rios<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f775480 elementor-widget elementor-widget-text-editor\" data-id=\"f775480\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>No caso de um usu\u00e1rio comum, \u00e9 preciso ler mensagens e e-mails cuidadosamente e desconfiar de qualquer tipo de solicita\u00e7\u00e3o fora do comum. Al\u00e9m disso, nunca clique em links ou abra anexos sem ter certeza do que est\u00e1 fazendo.<\/p><p>Em caso de d\u00favidas, procure confirmar a solicita\u00e7\u00e3o do e-mail de outra maneira, como, por exemplo, por meio de um telefonema.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15bf865 elementor-widget elementor-widget-heading\" data-id=\"15bf865\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Dicas de preven\u00e7\u00e3o para empresas<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93b7b27 elementor-widget elementor-widget-text-editor\" data-id=\"93b7b27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>No caso de empresas, \u00e9 preciso combater phishing atuando de 2 maneiras.\u00a0<\/p><p>\u00c9 preciso investir na educa\u00e7\u00e3o do seu time. O seu time precisa estar treinado para reconhecer diferentes tipos de amea\u00e7as, incluindo phishing.<\/p><p>\u00c9 preciso investir tamb\u00e9m em solu\u00e7\u00f5es de seguran\u00e7a de e-mail, com\u00a0<strong><a href=\"https:\/\/gatefy.com\/pt-br\/blog\/solucao-antispam-antiphishing-empresa\/\" target=\"_blank\" rel=\"noopener\">antiphishing<\/a><\/strong>. Aqui, na Gatefy, n\u00f3s temos 2 solu\u00e7\u00f5es de prote\u00e7\u00e3o de e-mail que v\u00e3o ajudar a sua empresa a se proteger der ataques de phishing e outras amea\u00e7as.<\/p><p>O\u00a0<strong><a href=\"https:\/\/gatefy.com\/pt-br\/seguranca-email-nuvem\/\" target=\"_blank\" rel=\"noopener\">Gatefy Email Security<\/a><\/strong>\u00a0\u00e9 uma solu\u00e7\u00e3o que protege a sua empresa contra diversos ataques cibern\u00e9ticos, como spam, phishing, ransomware, v\u00edrus, BEC (Business Email Compromise) e engenharia social.<\/p><p>O\u00a0<a href=\"https:\/\/gatefy.com\/pt-br\/protecao-antifraude-dmarc\/\" target=\"_blank\" rel=\"noopener\"><strong>Gatefy Anti-Fraud Protection<\/strong><\/a>\u00a0\u00e9 uma solu\u00e7\u00e3o baseada em DMARC que protege o dom\u00ednio da sua empresa, impedindo que criminosos usem a sua marca em golpes de spam, phishing e BEC, por exemplo.\u00a0<\/p><p>Al\u00e9m disso, a solu\u00e7\u00e3o ainda melhora a capacidade de entrega dos seus e-mails, como em casos de e-mail marketing, por exemplo.<\/p><p>Solicite\u00a0<a href=\"https:\/\/gatefy.com\/pt-br\/demo\/\" target=\"_blank\" rel=\"noopener\"><strong>demo<\/strong><\/a>\u00a0ou\u00a0<strong><a href=\"https:\/\/gatefy.com\/pt-br\/contato\/\" target=\"_blank\" rel=\"noopener\">mais informa\u00e7\u00f5es clicando aqui<\/a><\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e004ea3 elementor-widget elementor-widget-template\" data-id=\"e004ea3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4620\" class=\"elementor elementor-4620\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-95982b0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"95982b0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7f77959\" data-id=\"7f77959\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 3 PT Demo banner&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-f614fab elementor-widget elementor-widget-image\" data-id=\"f614fab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/demo\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security.jpg\" class=\"attachment-full size-full wp-image-97\" alt=\"Gatefy Dashboard\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security.jpg 1280w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-300x169.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-1024x576.jpg 1024w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-768x432.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-1200x675.jpg 1200w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b50450b\" data-id=\"b50450b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9416cd4 elementor-widget elementor-widget-text-editor\" data-id=\"9416cd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMelhore a seguran\u00e7a da sua empresa. Agende demo!\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b1deb1 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"3b1deb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 3 PT Demo form&quot;}\" class=\"events-tracker-for-elementor\" id=\"cta3_pt\" name=\"cta3_pt\" aria-label=\"cta3_pt\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"4620\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"3b1deb1\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"BEC continua sendo a amea\u00e7a digital que mais provoca preju\u00edzos financeiros, aponta o FBI - Gatefy\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"7494\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tNome\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Nome*\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tE-mail Corporativo\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"E-mail Corporativo*\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_e594bbf elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_e594bbf\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tTelefone\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_e594bbf]\" id=\"form-field-field_e594bbf\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Telefone*\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Apenas n\u00fameros e caracteres de telefone (#, -, *, etc.) s\u00e3o aceitos.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-select elementor-field-group elementor-column elementor-field-group-field_d2f3e82 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_d2f3e82\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCargo\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field elementor-select-wrapper remove-before \">\n\t\t\t<div class=\"select-caret-down-wrapper\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-caret-down\"><\/i>\t\t\t<\/div>\n\t\t\t<select name=\"form_fields[field_d2f3e82]\" id=\"form-field-field_d2f3e82\" class=\"elementor-field-textual elementor-size-sm\" required=\"required\">\n\t\t\t\t\t\t\t\t\t<option value=\"Cargo*\">Cargo*<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Tecnologia\">Tecnologia<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Financeiro\">Financeiro<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Recursos Humanos\">Recursos Humanos<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Comercial\">Comercial<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Marketing\">Marketing<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Outro\">Outro<\/option>\n\t\t\t\t\t\t\t<\/select>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_e5faed5 elementor-col-100\">\n\t\t\t\t\t<label> <font size=\"2\">\n<input type=\"checkbox\" data-privacy=\"true\" name=\"communications\"\u00a0 value=\"1\">\nConcordo em receber informa\u00e7\u00f5es de acordo com a <a href=\"https:\/\/gatefy.com\/pt-br\/politica-privacidade\/\"\ntarget=\"_blank\">Pol\u00edtica de Privacidade e Cookies da Gatefy<\/a>.\nVoc\u00ea pode cancelar a assinatura a qualquer momento.\n<input type=\"hidden\" data-privacy=\"true\" name=\"privacy_policy\" value=\"1\">\n\u00a0<input type=\"hidden\" data-privacy=\"true\" name=\"terms_of_use\" value=\"1\">\n<\/font>\n<\/label>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_83eebfa elementor-col-100 recaptcha_v3-bottomright\">\n\t\t\t\t\t<div class=\"elementor-field\" id=\"form-field-field_83eebfa\"><div class=\"elementor-g-recaptcha\" data-sitekey=\"6Ley0Y4aAAAAADbdMG_0j3T4a82SexhiFrcCP5JE\" data-type=\"v3\" data-action=\"Form\" data-badge=\"bottomright\" data-size=\"invisible\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Receber contato<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-41e2d34\" data-id=\"41e2d34\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5368f99 elementor-widget elementor-widget-template\" data-id=\"5368f99\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_offset&quot;:100,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;laptop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4297\" class=\"elementor elementor-4297\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ab703fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ab703fd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a46a065\" data-id=\"a46a065\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;Sidebar 1 PT banner&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-8362479 elementor-widget elementor-widget-image\" data-id=\"8362479\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/materiais\/phishing\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"370\" height=\"230\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/casos-phishing-gatefy-ebook-1.png\" class=\"attachment-full size-full wp-image-16407\" alt=\"\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/casos-phishing-gatefy-ebook-1.png 370w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/casos-phishing-gatefy-ebook-1-300x186.png 300w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-654f745 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"654f745\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2924798\" data-id=\"2924798\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b22d40 elementor-widget elementor-widget-wp-widget-recent-posts\" data-id=\"4b22d40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-recent-posts.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\n\t\t<h5>Veja tamb\u00e9m<\/h5><nav aria-label=\"Veja tamb\u00e9m\">\n\t\t<ul>\n\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\">3 maneiras que a LGPD afeta o e-mail da sua empresa<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/materiais\/ebook-lgpg\/\">LGPD<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\">Quais s\u00e3o os 3 tipos de pol\u00edticas DMARC?<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t<\/ul>\n\n\t\t<\/nav>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d229c13 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d229c13\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f9f7398\" data-id=\"f9f7398\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c2f385d elementor-widget elementor-widget-template\" data-id=\"c2f385d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4151\" class=\"elementor elementor-4151 elementor-3964 elementor-3964\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-03c5dac elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"03c5dac\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-782b239\" data-id=\"782b239\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-056265e elementor-widget elementor-widget-heading\" data-id=\"056265e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">N\u00e3o esque\u00e7a de compartilhar este post<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88cfcd1 elementor-share-buttons--view-icon elementor-share-buttons--shape-rounded elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"88cfcd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_reddit\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no reddit\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-reddit\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af288c9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"af288c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e31e090 elementor-widget elementor-widget-heading\" data-id=\"e31e090\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Not\u00edcias Relacionadas<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce216ce elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"ce216ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"hm hm-arrow-down\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4182cb elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"d4182cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-8305 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-dicas-conselhos\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa-300x150.jpg\" class=\"attachment-medium size-medium wp-image-8308\" alt=\"Checklist para LGPD assegurar prote\u00e7\u00e3o de e-mail.\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa-768x384.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\" >\n\t\t\t\t3 maneiras que a LGPD afeta o e-mail da sua empresa\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\" aria-label=\"Leia mais sobre 3 maneiras que a LGPD afeta o e-mail da sua empresa\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-7960 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-educacao\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc-300x150.jpg\" class=\"attachment-medium size-medium wp-image-7961\" alt=\"Quais s\u00e3o os 3 tipos de pol\u00edticas DMARC?\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc-768x384.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\" >\n\t\t\t\tQuais s\u00e3o os 3 tipos de pol\u00edticas DMARC?\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\" aria-label=\"Leia mais sobre Quais s\u00e3o os 3 tipos de pol\u00edticas DMARC?\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-16789 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-educacao\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/boas-praticas-de-seguranca-de-email-para-proteger-sua-empresa\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email-300x150.jpg\" class=\"attachment-medium size-medium wp-image-16791\" alt=\"cadeado, escudo (senhas fortes e mecanismos de prote\u00e7\u00e3o) e outras boas praticas de seguran\u00e7a de e-mail\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email-768x384.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/boas-praticas-de-seguranca-de-email-para-proteger-sua-empresa\/\" >\n\t\t\t\t6 boas pr\u00e1ticas de seguran\u00e7a de e-mail para proteger sua empresa\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/boas-praticas-de-seguranca-de-email-para-proteger-sua-empresa\/\" aria-label=\"Leia mais sobre 6 boas pr\u00e1ticas de seguran\u00e7a de e-mail para proteger sua empresa\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":8026,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,2,37,35],"tags":[],"class_list":{"0":"post-8025","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","6":"hentry","7":"category-blog","9":"category-educacao","10":"category-education"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tudo sobre Phishing: o que \u00e9, como funciona, tipo e muito mais - Gatefy<\/title>\n<meta name=\"description\" content=\"Phishing \u00e9 um crime cibern\u00e9tico que ocorre quando um criminoso se faz passar por uma pessoa, f\u00edsica ou jur\u00eddica, para enganar algu\u00e9m.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tudo sobre Phishing: o que \u00e9, como funciona, tipo e muito mais - Gatefy\" \/>\n<meta property=\"og:description\" content=\"Phishing \u00e9 um crime cibern\u00e9tico que ocorre quando um criminoso se faz passar por uma pessoa, f\u00edsica ou jur\u00eddica, para enganar algu\u00e9m.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Gatefy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gatefy\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-22T11:10:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-22T15:44:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-phishing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gatefy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@gatefy_security\" \/>\n<meta name=\"twitter:site\" content=\"@gatefy_security\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gatefy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/\"},\"author\":{\"name\":\"Gatefy\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94\"},\"headline\":\"O que \u00e9 phishing?\",\"datePublished\":\"2021-03-22T11:10:18+00:00\",\"dateModified\":\"2021-03-22T15:44:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/\"},\"wordCount\":1431,\"publisher\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#organization\"},\"image\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-phishing.jpg\",\"articleSection\":[\"Blog\",\"Blog\",\"Educa\u00e7\u00e3o\",\"Education\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/\",\"url\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/\",\"name\":\"Tudo sobre Phishing: o que \u00e9, como funciona, tipo e muito mais - Gatefy\",\"isPartOf\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-phishing.jpg\",\"datePublished\":\"2021-03-22T11:10:18+00:00\",\"dateModified\":\"2021-03-22T15:44:11+00:00\",\"description\":\"Phishing \u00e9 um crime cibern\u00e9tico que ocorre quando um criminoso se faz passar por uma pessoa, f\u00edsica ou jur\u00eddica, para enganar algu\u00e9m.\",\"breadcrumb\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/#primaryimage\",\"url\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-phishing.jpg\",\"contentUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-phishing.jpg\",\"width\":800,\"height\":400,\"caption\":\"O que \u00e9 phishing?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gatefy.com\/pt-br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"O que \u00e9 phishing?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#website\",\"url\":\"https:\/\/gatefy.com\/pt-br\/\",\"name\":\"Gatefy\",\"description\":\"We use artificial intelligence and machine learning to improve businesses&#039; inbound and outbound email security. Integrates with O365, Exchange and G Suite.\",\"publisher\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gatefy.com\/pt-br\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#organization\",\"name\":\"Gatefy Email Security\",\"url\":\"https:\/\/gatefy.com\/pt-br\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png\",\"contentUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png\",\"width\":1500,\"height\":500,\"caption\":\"Gatefy Email Security\"},\"image\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/gatefy\",\"https:\/\/x.com\/gatefy_security\",\"https:\/\/www.linkedin.com\/company\/gatefy\",\"https:\/\/www.youtube.com\/channel\/UCFSZUkcvfwYSrGopaRtUSog\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94\",\"name\":\"Gatefy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g\",\"caption\":\"Gatefy\"},\"url\":\"https:\/\/gatefy.com\/pt-br\/author\/gatefy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tudo sobre Phishing: o que \u00e9, como funciona, tipo e muito mais - Gatefy","description":"Phishing \u00e9 um crime cibern\u00e9tico que ocorre quando um criminoso se faz passar por uma pessoa, f\u00edsica ou jur\u00eddica, para enganar algu\u00e9m.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/","og_locale":"pt_BR","og_type":"article","og_title":"Tudo sobre Phishing: o que \u00e9, como funciona, tipo e muito mais - Gatefy","og_description":"Phishing \u00e9 um crime cibern\u00e9tico que ocorre quando um criminoso se faz passar por uma pessoa, f\u00edsica ou jur\u00eddica, para enganar algu\u00e9m.","og_url":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/","og_site_name":"Gatefy","article_publisher":"https:\/\/www.facebook.com\/gatefy","article_published_time":"2021-03-22T11:10:18+00:00","article_modified_time":"2021-03-22T15:44:11+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-phishing.jpg","type":"image\/jpeg"}],"author":"Gatefy","twitter_card":"summary_large_image","twitter_creator":"@gatefy_security","twitter_site":"@gatefy_security","twitter_misc":{"Escrito por":"Gatefy","Est. tempo de leitura":"11 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/#article","isPartOf":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/"},"author":{"name":"Gatefy","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94"},"headline":"O que \u00e9 phishing?","datePublished":"2021-03-22T11:10:18+00:00","dateModified":"2021-03-22T15:44:11+00:00","mainEntityOfPage":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/"},"wordCount":1431,"publisher":{"@id":"https:\/\/gatefy.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-phishing.jpg","articleSection":["Blog","Blog","Educa\u00e7\u00e3o","Education"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/","url":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/","name":"Tudo sobre Phishing: o que \u00e9, como funciona, tipo e muito mais - Gatefy","isPartOf":{"@id":"https:\/\/gatefy.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/#primaryimage"},"image":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-phishing.jpg","datePublished":"2021-03-22T11:10:18+00:00","dateModified":"2021-03-22T15:44:11+00:00","description":"Phishing \u00e9 um crime cibern\u00e9tico que ocorre quando um criminoso se faz passar por uma pessoa, f\u00edsica ou jur\u00eddica, para enganar algu\u00e9m.","breadcrumb":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/#primaryimage","url":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-phishing.jpg","contentUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-phishing.jpg","width":800,"height":400,"caption":"O que \u00e9 phishing?"},{"@type":"BreadcrumbList","@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gatefy.com\/pt-br\/"},{"@type":"ListItem","position":2,"name":"O que \u00e9 phishing?"}]},{"@type":"WebSite","@id":"https:\/\/gatefy.com\/pt-br\/#website","url":"https:\/\/gatefy.com\/pt-br\/","name":"Gatefy","description":"We use artificial intelligence and machine learning to improve businesses&#039; inbound and outbound email security. Integrates with O365, Exchange and G Suite.","publisher":{"@id":"https:\/\/gatefy.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gatefy.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/gatefy.com\/pt-br\/#organization","name":"Gatefy Email Security","url":"https:\/\/gatefy.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png","contentUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png","width":1500,"height":500,"caption":"Gatefy Email Security"},"image":{"@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gatefy","https:\/\/x.com\/gatefy_security","https:\/\/www.linkedin.com\/company\/gatefy","https:\/\/www.youtube.com\/channel\/UCFSZUkcvfwYSrGopaRtUSog"]},{"@type":"Person","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94","name":"Gatefy","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g","caption":"Gatefy"},"url":"https:\/\/gatefy.com\/pt-br\/author\/gatefy\/"}]}},"_links":{"self":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/posts\/8025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/comments?post=8025"}],"version-history":[{"count":0,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/posts\/8025\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/media\/8026"}],"wp:attachment":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/media?parent=8025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/categories?post=8025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/tags?post=8025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}