{"id":4975,"date":"2024-02-09T13:57:05","date_gmt":"2024-02-09T16:57:05","guid":{"rendered":"https:\/\/aprovacao.website\/blocktime\/?page_id=4975"},"modified":"2024-02-09T19:23:26","modified_gmt":"2024-02-09T22:23:26","slug":"protecao-de-dados","status":"publish","type":"page","link":"https:\/\/aprovacao.website\/blocktime\/protecao-de-dados\/","title":{"rendered":"Prote\u00e7\u00e3o de Dados"},"content":{"rendered":"\n\n  <div class=\"banner has-hover\" id=\"banner-494716136\">\n          <div class=\"banner-inner fill\">\n        <div class=\"banner-bg fill\" >\n            <div class=\"bg fill bg-fill \"><\/div>\n                                    \n\t<div class=\"is-border\"\n\t\tstyle=\"border-color:rgb(106, 114, 141);border-width:0px 0px 7px 0px;\">\n\t<\/div>\n                    <\/div>\n\t\t\n        <div class=\"banner-layers container\">\n            <div class=\"fill banner-link\"><\/div>            \n\n   <div id=\"text-box-276403849\" class=\"text-box banner-layer x50 md-x50 lg-x50 y50 md-y30 lg-y30 res-text\">\n                                <div class=\"text-box-content text dark\">\n              \n              <div class=\"text-inner text-center\">\n                  \n\n\t<div id=\"text-4293548679\" class=\"text\">\n\t\t\n\n<h1 class=\"thin-font\"><span style=\"font-size: 140%;\">Prote\u00e7\u00e3o de Dados<br \/>\n<\/span><\/h1>\n\t\t\n<style>\n#text-4293548679 {\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n\n              <\/div>\n           <\/div>\n                            \n<style>\n#text-box-276403849 {\n  width: 100%;\n}\n#text-box-276403849 .text-box-content {\n  font-size: 53%;\n}\n@media (min-width:550px) {\n  #text-box-276403849 {\n    width: 60%;\n  }\n  #text-box-276403849 .text-box-content {\n    font-size: 84%;\n  }\n}\n<\/style>\n    <\/div>\n \n   <div id=\"text-box-1391519428\" class=\"text-box banner-layer page-header-txtbox x50 md-x50 lg-x50 y100 md-y100 lg-y100 res-text\">\n                                <div class=\"text-box-content text dark\">\n              \n              <div class=\"text-inner text-center\">\n                  \n\n<div class=\"row row-collapse align-middle align-center\"  id=\"row-1258394889\">\n\n\n\t<div id=\"col-404306208\" class=\"col medium-3 small-4 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n<a href=\"https:\/\/aprovacao.website\/blocktime\" class=\"button white is-outline is-large lowercase botao-1-header\"  >\n    <span>Home<\/span>\n  <\/a>\n\n\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-404306208 > .col-inner {\n  padding: 0px 0px 0px 0px;\n}\n@media (min-width:550px) {\n  #col-404306208 > .col-inner {\n    padding: 10px 0px 0px 0px;\n  }\n}\n<\/style>\n\t<\/div>\n\n\t\n\n\t<div id=\"col-1639206017\" class=\"col medium-1 small-2 large-1\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1987839811\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"212\" height=\"182\" src=\"https:\/\/aprovacao.website\/blocktime\/wp-content\/uploads\/2024\/02\/icone-.png\" class=\"attachment-original size-original\" alt=\"\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1987839811 {\n  width: 32%;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1639206017 > .col-inner {\n  padding: 0px 0px 0px 0px;\n  margin: 0px 0px 0px 0px;\n}\n@media (min-width:550px) {\n  #col-1639206017 > .col-inner {\n    margin: 10px 0px 0px 0px;\n  }\n}\n<\/style>\n\t<\/div>\n\n\t\n\n\t<div id=\"col-1268249516\" class=\"col hide-for-medium medium-4 small-5 large-4\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t<div class=\"is-border\"\n\t\tstyle=\"border-color:rgb(0, 242, 125);border-width:0px 0px 7px 0px;margin:0px 0px 0px 0px;\">\n\t<\/div>\n\t\t\t\n\n  <div id=\"page-header-1587426356\" class=\"page-header-wrapper\">\n  <div class=\"page-title page-header-titulo dark featured-title\">\n\n        <div class=\"page-title-bg\">\n      <div class=\"title-bg fill bg-fill\"\n        data-parallax-container=\".page-title\"\n        data-parallax-background\n        data-parallax=\"-\">\n      <\/div>\n      <div class=\"title-overlay fill\"><\/div>\n    <\/div>\n    \n    <div class=\"page-title-inner container align-center flex-row medium-flex-wrap\" >\n              <div class=\"title-wrapper is-small flex-col text-left medium-text-center\">\n          <h1 class=\"entry-title mb-0\">\n            Prote\u00e7\u00e3o de Dados          <\/h1>\n        <\/div>\n                    <div class=\"title-content flex-col flex-right text-right medium-text-center\">\n        <div class=\"title-breadcrumbs pb-half pt-half\"><\/div>      <\/div>\n    <\/div>\n\n     \n<style>\n#page-header-1587426356 .title-overlay {\n  background-color: rgba(0, 0, 0, 0);\n}\n#page-header-1587426356 .featured-title {\n  background-color: rgba(0, 0, 0, 0);\n}\n<\/style>\n  <\/div>\n    <\/div>\n  \n\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1268249516 > .col-inner {\n  margin: 0px 0px 0px 0px;\n}\n@media (min-width:550px) {\n  #col-1268249516 > .col-inner {\n    margin: 0px 0px -5px 0px;\n  }\n}\n<\/style>\n\t<\/div>\n\n\t\n\n\t<div id=\"col-868378214\" class=\"col show-for-small medium-4 small-5 large-4\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t<div class=\"is-border\"\n\t\tstyle=\"border-color:rgb(0, 242, 125);border-width:0px 0px 7px 0px;margin:0px 0px 40px 0px;\">\n\t<\/div>\n\t\t\t\n\n  <div id=\"page-header-690142740\" class=\"page-header-wrapper\">\n  <div class=\"page-title page-header-titulo dark featured-title\">\n\n        <div class=\"page-title-bg\">\n      <div class=\"title-bg fill bg-fill\"\n        data-parallax-container=\".page-title\"\n        data-parallax-background\n        data-parallax=\"-\">\n      <\/div>\n      <div class=\"title-overlay fill\"><\/div>\n    <\/div>\n    \n    <div class=\"page-title-inner container align-center flex-row medium-flex-wrap\" >\n              <div class=\"title-wrapper is-small flex-col text-left medium-text-center\">\n          <h1 class=\"entry-title mb-0\">\n            Prote\u00e7\u00e3o de Dados          <\/h1>\n        <\/div>\n                    <div class=\"title-content flex-col flex-right text-right medium-text-center\">\n        <div class=\"title-breadcrumbs pb-half pt-half\"><\/div>      <\/div>\n    <\/div>\n\n     \n<style>\n#page-header-690142740 .title-overlay {\n  background-color: rgba(0, 0, 0, 0);\n}\n#page-header-690142740 .featured-title {\n  background-color: rgba(0, 0, 0, 0);\n}\n<\/style>\n  <\/div>\n    <\/div>\n  \n\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-868378214 > .col-inner {\n  margin: 0px 0px 0px 0px;\n}\n@media (min-width:550px) {\n  #col-868378214 > .col-inner {\n    margin: 0px 0px -5px 0px;\n  }\n}\n<\/style>\n\t<\/div>\n\n\t\n\n<\/div>\n\n              <\/div>\n           <\/div>\n                            \n<style>\n#text-box-1391519428 {\n  width: 100%;\n}\n#text-box-1391519428 .text-box-content {\n  font-size: 121%;\n}\n@media (min-width:550px) {\n  #text-box-1391519428 {\n    width: 45%;\n  }\n  #text-box-1391519428 .text-box-content {\n    font-size: 100%;\n  }\n}\n<\/style>\n    <\/div>\n \n\n        <\/div>\n      <\/div>\n\n            \n<style>\n#banner-494716136 {\n  padding-top: 250px;\n  background-color: rgb(43, 51, 82);\n}\n<\/style>\n  <\/div>\n\n\n\t<section class=\"section\" id=\"section_732233524\">\n\t\t<div class=\"bg section-bg fill bg-fill  bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row align-center\"  id=\"row-1874777216\">\n\n\n\t<div id=\"col-298459497\" class=\"col small-11 large-12\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n<div class=\"container section-title-container page-title\" ><h2 class=\"section-title section-title-center\"><b><\/b><span class=\"section-title-main\" style=\"font-size:133%;\">Proteja os dados da sua empresa<\/span><b><\/b><\/h2><\/div>\n\n\t<div id=\"text-362967663\" class=\"text\">\n\t\t\n\n<p>Cuide da privacidade, seguran\u00e7a e integridade das informa\u00e7\u00f5es das pessoas f\u00edsicas<br \/>no desenvolvimento dos seus neg\u00f3cios<\/p>\n\t\t\n<style>\n#text-362967663 {\n  font-size: 0.9rem;\n  text-align: center;\n  color: rgb(66, 66, 66);\n}\n#text-362967663 > * {\n  color: rgb(66, 66, 66);\n}\n@media (min-width:550px) {\n  #text-362967663 {\n    font-size: 1.55rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-298459497 > .col-inner {\n  padding: 50px 0px 0px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n<\/div>\n<div class=\"row align-center\"  id=\"row-468759188\">\n\n\n\t<div id=\"col-1262470872\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\n  <div class=\"banner has-hover background-gradient\" id=\"banner-346110618\">\n          <div class=\"banner-inner fill\">\n        <div class=\"banner-bg fill\" >\n            <div class=\"bg fill bg-fill \"><\/div>\n                                    \n                    <\/div>\n\t\t\n        <div class=\"banner-layers container\">\n            <div class=\"fill banner-link\"><\/div>            \n\n   <div id=\"text-box-340933165\" class=\"text-box banner-layer x50 md-x50 lg-x50 y50 md-y50 lg-y50 res-text\">\n                                <div class=\"text-box-content text dark\">\n              \n              <div class=\"text-inner text-center\">\n                  \n\n<div class=\"row row-small align-middle align-center\"  id=\"row-2001317117\">\n\n\n\t<div id=\"col-1060891506\" class=\"col medium-1 small-4 large-1\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_878399542\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"93\" height=\"87\" src=\"https:\/\/aprovacao.website\/blocktime\/wp-content\/uploads\/2024\/02\/download-removebg-preview.png\" class=\"attachment-original size-original\" alt=\"\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_878399542 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1224793241\" class=\"col medium-8 small-10 large-8\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-2320803214\" class=\"text\">\n\t\t\n\n<p>Para identificar as necessidades de adequa\u00e7\u00e3o das empresas \u00e0 legisla\u00e7\u00e3o, a Blocktime Tecnologia desenvolveu o Diagn\u00f3stico de Vulnerabilidades Digitais. Um question\u00e1rio que auxilia a sua empresa a identificar e classificar seus pontos vulner\u00e1veis perante a legisla\u00e7\u00e3o e assim, estabelecer um plano de a\u00e7\u00e3o para mitigar os riscos. Tomamos como base tr\u00eas aspectos: tecnol\u00f3gicos, jur\u00eddicos e de neg\u00f3cios. Eles podem estabelecer prioridades e investimentos necess\u00e1rios em cada etapa do processo.<\/p>\n\t\t\n<style>\n#text-2320803214 {\n  font-size: 0.8rem;\n  text-align: left;\n}\n@media (min-width:550px) {\n  #text-2320803214 {\n    font-size: 0.9rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-22077189\" class=\"col medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n<a class=\"button secondary is-small lowercase\"  style=\"border-radius:10px;\">\n    <span>Solicite seu Diagn\u00f3stico<\/span>\n  <\/a>\n\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n              <\/div>\n           <\/div>\n                            \n<style>\n#text-box-340933165 {\n  width: 89%;\n}\n#text-box-340933165 .text-box-content {\n  font-size: 100%;\n}\n@media (min-width:550px) {\n  #text-box-340933165 {\n    width: 94%;\n  }\n}\n<\/style>\n    <\/div>\n \n\n        <\/div>\n      <\/div>\n\n            \n<style>\n#banner-346110618 {\n  padding-top: 540px;\n}\n@media (min-width:550px) {\n  #banner-346110618 {\n    padding-top: 250px;\n  }\n}\n<\/style>\n  <\/div>\n\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_732233524 {\n  padding-top: 60px;\n  padding-bottom: 60px;\n  min-height: 300px;\n}\n<\/style>\n\t<\/section>\n\t\n\t<section class=\"section\" id=\"section_1037910742\">\n\t\t<div class=\"bg section-bg fill bg-fill  bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row align-center\"  id=\"row-756842245\">\n\n\n\t<div id=\"col-916730714\" class=\"col small-11 large-12\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n<div class=\"container section-title-container page-title\" ><h2 class=\"section-title section-title-center\"><b><\/b><span class=\"section-title-main\" style=\"font-size:133%;\">Entenda a LGPD<\/span><b><\/b><\/h2><\/div>\n\n\t<div id=\"text-695762614\" class=\"text\">\n\t\t\n\n<p>A lei geral de prote\u00e7\u00e3o de dados ou LGPD foi institu\u00edda para regulamentar a coleta, o uso, o processamento, armazenamento e a prote\u00e7\u00e3o de dados de pessoas naturais. Desse modo, voc\u00ea sabia que qualquer pessoa f\u00edsica ou jur\u00eddica, que em suas atividades profissionais venham a trabalhar com estes dados, est\u00e3o sujeitas a aplica\u00e7\u00e3o da lei e de suas penalidades?<\/p>\n<p>Para identificar as necessidades de adequa\u00e7\u00e3o das empresas \u00e0 legisla\u00e7\u00e3o, a Blocktime Tecnologia desenvolveu o Diagn\u00f3stico de Vulnerabilidades Digitais. Um question\u00e1rio que auxilia a sua empresa a identificar e classificar seus pontos vulner\u00e1veis perante a legisla\u00e7\u00e3o e assim, estabelecer um plano de a\u00e7\u00e3o para mitigar os riscos. Tomamos como base tr\u00eas aspectos: tecnol\u00f3gicos, jur\u00eddicos e de neg\u00f3cios. Eles podem estabelecer prioridades e investimentos necess\u00e1rios em cada etapa do processo.<\/p>\n<p>Outro ponto importante \u00e9 que nosso m\u00e9todo de trabalho segue padr\u00f5es internacionais, baseados no modelo do NIST (EUA) de ciberseguran\u00e7a, especialmente adaptado para o uso em pequenas e m\u00e9dias empresas.<\/p>\n\t\t\n<style>\n#text-695762614 {\n  font-size: 0.9rem;\n  text-align: left;\n  color: rgb(11, 11, 11);\n}\n#text-695762614 > * {\n  color: rgb(11, 11, 11);\n}\n@media (min-width:550px) {\n  #text-695762614 {\n    font-size: 1.15rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"gap-397669652\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-397669652 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_1037910742 {\n  padding-top: 0px;\n  padding-bottom: 0px;\n  min-height: 300px;\n}\n@media (min-width:550px) {\n  #section_1037910742 {\n    padding-top: 0px;\n    padding-bottom: 0px;\n  }\n}\n<\/style>\n\t<\/section>\n\t\n\t<section class=\"section\" id=\"section_1105538210\">\n\t\t<div class=\"bg section-bg fill bg-fill  \" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row align-center\"  id=\"row-1119174140\">\n\n\n\t<div id=\"col-1490799368\" class=\"col small-11 large-12\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-461463429\" class=\"text\">\n\t\t\n\n<h3><span style=\"font-size: 160%;\">Confira as etapas do Diagn\u00f3stico de Vulnerabilidade<\/span><\/h3>\n\t\t\n<style>\n#text-461463429 {\n  font-size: 0.9rem;\n  text-align: left;\n  color: rgb(43, 51, 82);\n}\n#text-461463429 > * {\n  color: rgb(43, 51, 82);\n}\n@media (min-width:550px) {\n  #text-461463429 {\n    font-size: 1.15rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"gap-70186355\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-70186355 {\n  padding-top: 15px;\n}\n@media (min-width:550px) {\n  #gap-70186355 {\n    padding-top: 30px;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"row align-center show-for-small\"  id=\"row-975081979\">\n\n\n\t<div id=\"col-25277823\" class=\"col small-11 large-12\"  >\n\t\t\t\t<div class=\"col-inner dark\"  >\n\t\t\t\n\t\t\t\n\n<div class=\"accordion\">\n\n\t<div id=\"accordion-4205780761\" class=\"accordion-item tab-painel\">\n\t\t<a id=\"accordion-4205780761-label\" class=\"accordion-title plain\" href=\"#accordion-item-identificar-id\" aria-expanded=\"false\" aria-controls=\"accordion-4205780761-content\" >\n\t\t\t<button class=\"toggle\" aria-label=\"Toggle\"><i class=\"icon-angle-down\"><\/i><\/button>\n\t\t\t<span>Identificar ID<\/span>\n\t\t<\/a>\n\t\t<div id=\"accordion-4205780761-content\" class=\"accordion-inner\" aria-labelledby=\"accordion-4205780761-label\" >\n\t\t\t\n\n\t<div id=\"text-1484939496\" class=\"text\">\n\t\t\n\n<p><strong>Esse \u00e9 o primeiro ponto: aqui desenvolvemos uma compreens\u00e3o organizacional para gerenciar o risco de seguran\u00e7a cibern\u00e9tica no que diz respeito a sistemas, pessoas, ativos, dados e recursos.<\/strong><\/p>\n<p><br \/><strong>As atividades na Fun\u00e7\u00e3o Identificar s\u00e3o fundamentais para o uso eficiente do Guia. Uma organiza\u00e7\u00e3o \u00e9 capaz de focar e priorizar seus esfor\u00e7os de forma consistente, com sua estrat\u00e9gia de gerenciamento de riscos e demandas empresariais, a partir da compreens\u00e3o do contexto de seu nicho, dos recursos que suportam fun\u00e7\u00f5es cr\u00edticas e dos riscos de seguran\u00e7a cibern\u00e9tica envolvidos. Os exemplos de Categorias de Resultados dentro desta Fun\u00e7\u00e3o incluem: Gerenciamento de Ativos; Ambiente Empresarial; Governan\u00e7a; Avalia\u00e7\u00e3o de Risco; Estrat\u00e9gia de Gerenciamento de Risco.<\/strong><\/p>\n\t\t\n<style>\n#text-1484939496 {\n  font-size: 0.9rem;\n  text-align: left;\n  color: rgb(134, 134, 134);\n}\n#text-1484939496 > * {\n  color: rgb(134, 134, 134);\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t<div id=\"accordion-1859411969\" class=\"accordion-item tab-painel\">\n\t\t<a id=\"accordion-1859411969-label\" class=\"accordion-title plain\" href=\"#accordion-item-proteger-pr\" aria-expanded=\"false\" aria-controls=\"accordion-1859411969-content\" >\n\t\t\t<button class=\"toggle\" aria-label=\"Toggle\"><i class=\"icon-angle-down\"><\/i><\/button>\n\t\t\t<span>Proteger PR<\/span>\n\t\t<\/a>\n\t\t<div id=\"accordion-1859411969-content\" class=\"accordion-inner\" aria-labelledby=\"accordion-1859411969-label\" >\n\t\t\t\n\n\t<div id=\"text-2214276375\" class=\"text\">\n\t\t\n\n<p><strong>Essa etapa foca no desenvolvimento e implementa\u00e7\u00e3o de prote\u00e7\u00f5es necess\u00e1rias para garantir a presta\u00e7\u00e3o de servi\u00e7os cr\u00edticos.<\/strong><\/p>\n<p><strong>A Fun\u00e7\u00e3o Proteger fornece apoio \u00e0 capacidade de limitar ou conter o impacto de uma poss\u00edvel ocorr\u00eancia de seguran\u00e7a cibern\u00e9tica. Os exemplos de Categorias de Resultados dentro desta Fun\u00e7\u00e3o incluem: Gerenciamento de Identidade e Controle de Acesso; Conscientiza\u00e7\u00e3o e Treinamento; Seguran\u00e7a de dados; Processos e Procedimentos de Prote\u00e7\u00e3o da Informa\u00e7\u00e3o; Manuten\u00e7\u00e3o; Tecnologia de Prote\u00e7\u00e3o.<\/strong><\/p>\n\t\t\n<style>\n#text-2214276375 {\n  font-size: 0.9rem;\n  text-align: left;\n  color: rgb(134, 134, 134);\n}\n#text-2214276375 > * {\n  color: rgb(134, 134, 134);\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t<div id=\"accordion-1606183858\" class=\"accordion-item tab-painel\">\n\t\t<a id=\"accordion-1606183858-label\" class=\"accordion-title plain\" href=\"#accordion-item-detectar-de\" aria-expanded=\"false\" aria-controls=\"accordion-1606183858-content\" >\n\t\t\t<button class=\"toggle\" aria-label=\"Toggle\"><i class=\"icon-angle-down\"><\/i><\/button>\n\t\t\t<span>Detectar DE<\/span>\n\t\t<\/a>\n\t\t<div id=\"accordion-1606183858-content\" class=\"accordion-inner\" aria-labelledby=\"accordion-1606183858-label\" >\n\t\t\t\n\n\t<div id=\"text-3998910727\" class=\"text\">\n\t\t\n\n<p><strong>Aqui, desenvolvemos e implementamos atividades necess\u00e1rias para identificar a ocorr\u00eancia de um evento de seguran\u00e7a cibern\u00e9tica.<\/strong><\/p>\n<p><strong>A Fun\u00e7\u00e3o Detectar permite a descoberta oportuna de ocorr\u00eancias de seguran\u00e7a cibern\u00e9tica. Os exemplos de Categorias de Resultados dentro desta Fun\u00e7\u00e3o incluem: Anomalias e Ocorr\u00eancias; Monitoramento Cont\u00ednuo de Seguran\u00e7a; Processos de Detec\u00e7\u00e3o.<\/strong><\/p>\n\t\t\n<style>\n#text-3998910727 {\n  font-size: 0.9rem;\n  text-align: left;\n  color: rgb(134, 134, 134);\n}\n#text-3998910727 > * {\n  color: rgb(134, 134, 134);\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t<div id=\"accordion-267402624\" class=\"accordion-item tab-painel\">\n\t\t<a id=\"accordion-267402624-label\" class=\"accordion-title plain\" href=\"#accordion-item-responder-rs\" aria-expanded=\"false\" aria-controls=\"accordion-267402624-content\" >\n\t\t\t<button class=\"toggle\" aria-label=\"Toggle\"><i class=\"icon-angle-down\"><\/i><\/button>\n\t\t\t<span>Responder RS<\/span>\n\t\t<\/a>\n\t\t<div id=\"accordion-267402624-content\" class=\"accordion-inner\" aria-labelledby=\"accordion-267402624-label\" >\n\t\t\t\n\n\t<div id=\"text-727577202\" class=\"text\">\n\t\t\n\n<p><strong>Nesta etapa desenvolvemos e implementamos atividades apropriadas para agir contra um incidente de seguran\u00e7a cibern\u00e9tica detectado.<\/strong><\/p>\n<p><strong>A Fun\u00e7\u00e3o Responder suporta a capacidade de conter o impacto de um poss\u00edvel incidente de seguran\u00e7a cibern\u00e9tica. Exemplos de Categorias de Resultados dentro desta Fun\u00e7\u00e3o incluem: Planejamento de Resposta; Notifica\u00e7\u00f5es; An\u00e1lise; Mitiga\u00e7\u00e3o; Aperfei\u00e7oamentos.<\/strong><\/p>\n\t\t\n<style>\n#text-727577202 {\n  font-size: 0.9rem;\n  text-align: left;\n  color: rgb(134, 134, 134);\n}\n#text-727577202 > * {\n  color: rgb(134, 134, 134);\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t<div id=\"accordion-3537759815\" class=\"accordion-item tab-painel\">\n\t\t<a id=\"accordion-3537759815-label\" class=\"accordion-title plain\" href=\"#accordion-item-recuperar-rc\" aria-expanded=\"false\" aria-controls=\"accordion-3537759815-content\" >\n\t\t\t<button class=\"toggle\" aria-label=\"Toggle\"><i class=\"icon-angle-down\"><\/i><\/button>\n\t\t\t<span>Recuperar RC<\/span>\n\t\t<\/a>\n\t\t<div id=\"accordion-3537759815-content\" class=\"accordion-inner\" aria-labelledby=\"accordion-3537759815-label\" >\n\t\t\t\n\n\t<div id=\"text-1979255974\" class=\"text\">\n\t\t\n\n<p><strong>Essa etapa consiste em desenvolver e implementar atividades apropriadas para manter planos de resili\u00eancia e, tamb\u00e9m, para restaurar quaisquer recursos ou servi\u00e7os que foram prejudicados devido a um incidente de seguran\u00e7a cibern\u00e9tica.<\/strong><\/p>\n<p><strong>A Fun\u00e7\u00e3o Recuperar oferece apoio ao restabelecimento pontual para as opera\u00e7\u00f5es normais de modo a reduzir o impacto de determinado incidente de seguran\u00e7a cibern\u00e9tica. Os exemplos de Categorias de Resultados dentro desta Fun\u00e7\u00e3o incluem: Planejamento de Restabelecimento; Aperfei\u00e7oamentos; Notifica\u00e7\u00f5es.<\/strong><\/p>\n\t\t\n<style>\n#text-1979255974 {\n  font-size: 0.9rem;\n  text-align: left;\n  color: rgb(134, 134, 134);\n}\n#text-1979255974 > * {\n  color: rgb(134, 134, 134);\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t<\/div>\n\t\n\n<\/div>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<div class=\"tabbed-content tabss-personalizadas hide-for-medium\">\n\t\t\t\n\t\t\t<ul class=\"nav nav-simple nav-normal nav-size-normal nav-left\" role=\"tablist\"><li id=\"tab-identificar-id\" class=\"tab active has-icon\" role=\"presentation\"><a href=\"#tab_identificar-id\" role=\"tab\" aria-selected=\"true\" aria-controls=\"tab_identificar-id\"><span>Identificar ID<\/span><\/a><\/li>\n<li id=\"tab-proteger-pr\" class=\"tab has-icon\" role=\"presentation\"><a href=\"#tab_proteger-pr\" tabindex=\"-1\" role=\"tab\" aria-selected=\"false\" aria-controls=\"tab_proteger-pr\"><span>Proteger PR<\/span><\/a><\/li>\n<li id=\"tab-detectar-de\" class=\"tab has-icon\" role=\"presentation\"><a href=\"#tab_detectar-de\" tabindex=\"-1\" role=\"tab\" aria-selected=\"false\" aria-controls=\"tab_detectar-de\"><span>Detectar DE<\/span><\/a><\/li>\n<li id=\"tab-responder-rs\" class=\"tab has-icon\" role=\"presentation\"><a href=\"#tab_responder-rs\" tabindex=\"-1\" role=\"tab\" aria-selected=\"false\" aria-controls=\"tab_responder-rs\"><span>Responder RS<\/span><\/a><\/li>\n<li id=\"tab-recuperar-rc\" class=\"tab has-icon\" role=\"presentation\"><a href=\"#tab_recuperar-rc\" tabindex=\"-1\" role=\"tab\" aria-selected=\"false\" aria-controls=\"tab_recuperar-rc\"><span>Recuperar RC<\/span><\/a><\/li><\/ul><div class=\"tab-panels\"><div id=\"tab_identificar-id\" class=\"panel active entry-content\" role=\"tabpanel\" aria-labelledby=\"tab-identificar-id\">\n\n\t<div id=\"text-2561350702\" class=\"text\">\n\t\t\n\n<p><strong>Esse \u00e9 o primeiro ponto: aqui desenvolvemos uma compreens\u00e3o organizacional para gerenciar o risco de seguran\u00e7a cibern\u00e9tica no que diz respeito a sistemas, pessoas, ativos, dados e recursos.<\/strong><\/p>\n<p><br \/><strong>As atividades na Fun\u00e7\u00e3o Identificar s\u00e3o fundamentais para o uso eficiente do Guia. Uma organiza\u00e7\u00e3o \u00e9 capaz de focar e priorizar seus esfor\u00e7os de forma consistente, com sua estrat\u00e9gia de gerenciamento de riscos e demandas empresariais, a partir da compreens\u00e3o do contexto de seu nicho, dos recursos que suportam fun\u00e7\u00f5es cr\u00edticas e dos riscos de seguran\u00e7a cibern\u00e9tica envolvidos. Os exemplos de Categorias de Resultados dentro desta Fun\u00e7\u00e3o incluem: Gerenciamento de Ativos; Ambiente Empresarial; Governan\u00e7a; Avalia\u00e7\u00e3o de Risco; Estrat\u00e9gia de Gerenciamento de Risco.<\/strong><\/p>\n\t\t\n<style>\n#text-2561350702 {\n  font-size: 0.9rem;\n  text-align: left;\n  color: rgb(134, 134, 134);\n}\n#text-2561350702 > * {\n  color: rgb(134, 134, 134);\n}\n<\/style>\n\t<\/div>\n\t\n\n<\/div>\n<div id=\"tab_proteger-pr\" class=\"panel entry-content\" role=\"tabpanel\" aria-labelledby=\"tab-proteger-pr\">\n\n\t<div id=\"text-1876944416\" class=\"text\">\n\t\t\n\n<p><strong>Essa etapa foca no desenvolvimento e implementa\u00e7\u00e3o de prote\u00e7\u00f5es necess\u00e1rias para garantir a presta\u00e7\u00e3o de servi\u00e7os cr\u00edticos.<\/strong><\/p>\n<p><strong>A Fun\u00e7\u00e3o Proteger fornece apoio \u00e0 capacidade de limitar ou conter o impacto de uma poss\u00edvel ocorr\u00eancia de seguran\u00e7a cibern\u00e9tica. Os exemplos de Categorias de Resultados dentro desta Fun\u00e7\u00e3o incluem: Gerenciamento de Identidade e Controle de Acesso; Conscientiza\u00e7\u00e3o e Treinamento; Seguran\u00e7a de dados; Processos e Procedimentos de Prote\u00e7\u00e3o da Informa\u00e7\u00e3o; Manuten\u00e7\u00e3o; Tecnologia de Prote\u00e7\u00e3o.<\/strong><\/p>\n\t\t\n<style>\n#text-1876944416 {\n  font-size: 0.9rem;\n  text-align: left;\n  color: rgb(134, 134, 134);\n}\n#text-1876944416 > * {\n  color: rgb(134, 134, 134);\n}\n<\/style>\n\t<\/div>\n\t\n\n<\/div>\n<div id=\"tab_detectar-de\" class=\"panel entry-content\" role=\"tabpanel\" aria-labelledby=\"tab-detectar-de\">\n\n\t<div id=\"text-2901727146\" class=\"text\">\n\t\t\n\n<p><strong>Aqui, desenvolvemos e implementamos atividades necess\u00e1rias para identificar a ocorr\u00eancia de um evento de seguran\u00e7a cibern\u00e9tica.<\/strong><\/p>\n<p><strong>A Fun\u00e7\u00e3o Detectar permite a descoberta oportuna de ocorr\u00eancias de seguran\u00e7a cibern\u00e9tica. Os exemplos de Categorias de Resultados dentro desta Fun\u00e7\u00e3o incluem: Anomalias e Ocorr\u00eancias; Monitoramento Cont\u00ednuo de Seguran\u00e7a; Processos de Detec\u00e7\u00e3o.<\/strong><\/p>\n\t\t\n<style>\n#text-2901727146 {\n  font-size: 0.9rem;\n  text-align: left;\n  color: rgb(134, 134, 134);\n}\n#text-2901727146 > * {\n  color: rgb(134, 134, 134);\n}\n<\/style>\n\t<\/div>\n\t\n\n<\/div>\n<div id=\"tab_responder-rs\" class=\"panel entry-content\" role=\"tabpanel\" aria-labelledby=\"tab-responder-rs\">\n\n\t<div id=\"text-2894613915\" class=\"text\">\n\t\t\n\n<p><strong>Nesta etapa desenvolvemos e implementamos atividades apropriadas para agir contra um incidente de seguran\u00e7a cibern\u00e9tica detectado.<\/strong><\/p>\n<p><strong>A Fun\u00e7\u00e3o Responder suporta a capacidade de conter o impacto de um poss\u00edvel incidente de seguran\u00e7a cibern\u00e9tica. Exemplos de Categorias de Resultados dentro desta Fun\u00e7\u00e3o incluem: Planejamento de Resposta; Notifica\u00e7\u00f5es; An\u00e1lise; Mitiga\u00e7\u00e3o; Aperfei\u00e7oamentos.<\/strong><\/p>\n\t\t\n<style>\n#text-2894613915 {\n  font-size: 0.9rem;\n  text-align: left;\n  color: rgb(134, 134, 134);\n}\n#text-2894613915 > * {\n  color: rgb(134, 134, 134);\n}\n<\/style>\n\t<\/div>\n\t\n\n<\/div>\n<div id=\"tab_recuperar-rc\" class=\"panel entry-content\" role=\"tabpanel\" aria-labelledby=\"tab-recuperar-rc\">\n\n\t<div id=\"text-3404795516\" class=\"text\">\n\t\t\n\n<p><strong>Essa etapa consiste em desenvolver e implementar atividades apropriadas para manter planos de resili\u00eancia e, tamb\u00e9m, para restaurar quaisquer recursos ou servi\u00e7os que foram prejudicados devido a um incidente de seguran\u00e7a cibern\u00e9tica.<\/strong><\/p>\n<p><strong>A Fun\u00e7\u00e3o Recuperar oferece apoio ao restabelecimento pontual para as opera\u00e7\u00f5es normais de modo a reduzir o impacto de determinado incidente de seguran\u00e7a cibern\u00e9tica. Os exemplos de Categorias de Resultados dentro desta Fun\u00e7\u00e3o incluem: Planejamento de Restabelecimento; Aperfei\u00e7oamentos; Notifica\u00e7\u00f5es.<\/strong><\/p>\n\t\t\n<style>\n#text-3404795516 {\n  font-size: 0.9rem;\n  text-align: left;\n  color: rgb(134, 134, 134);\n}\n#text-3404795516 > * {\n  color: rgb(134, 134, 134);\n}\n<\/style>\n\t<\/div>\n\t\n\n<\/div><\/div><\/div>\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1490799368 > .col-inner {\n  padding: 30px 0px 30px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_1105538210 {\n  padding-top: 0px;\n  padding-bottom: 0px;\n  min-height: 300px;\n}\n#section_1105538210 .section-bg.bg-loaded {\n  background-image: url(https:\/\/aprovacao.website\/blocktime\/wp-content\/uploads\/2024\/02\/background-imagem.png);\n}\n#section_1105538210 .section-bg {\n  background-position: 0% 0%;\n}\n@media (min-width:550px) {\n  #section_1105538210 {\n    padding-top: 90px;\n    padding-bottom: 90px;\n  }\n}\n<\/style>\n\t<\/section>\n\t\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-blank.php","meta":{"footnotes":""},"class_list":["post-4975","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Prote\u00e7\u00e3o de Dados - Blocktime Tecnologia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aprovacao.website\/blocktime\/protecao-de-dados\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prote\u00e7\u00e3o de Dados - Blocktime Tecnologia\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aprovacao.website\/blocktime\/protecao-de-dados\/\" \/>\n<meta property=\"og:site_name\" content=\"Blocktime Tecnologia\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-09T22:23:26+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/aprovacao.website\/blocktime\/protecao-de-dados\/\",\"url\":\"https:\/\/aprovacao.website\/blocktime\/protecao-de-dados\/\",\"name\":\"Prote\u00e7\u00e3o de Dados - Blocktime Tecnologia\",\"isPartOf\":{\"@id\":\"https:\/\/aprovacao.website\/blocktime\/#website\"},\"datePublished\":\"2024-02-09T16:57:05+00:00\",\"dateModified\":\"2024-02-09T22:23:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/aprovacao.website\/blocktime\/protecao-de-dados\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/aprovacao.website\/blocktime\/protecao-de-dados\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/aprovacao.website\/blocktime\/protecao-de-dados\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/aprovacao.website\/blocktime\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prote\u00e7\u00e3o de Dados\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/aprovacao.website\/blocktime\/#website\",\"url\":\"https:\/\/aprovacao.website\/blocktime\/\",\"name\":\"Blocktime Tecnologia\",\"description\":\"Servi\u00e7os Centralizados e Virtual CIO\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/aprovacao.website\/blocktime\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Prote\u00e7\u00e3o de Dados - Blocktime Tecnologia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aprovacao.website\/blocktime\/protecao-de-dados\/","og_locale":"pt_BR","og_type":"article","og_title":"Prote\u00e7\u00e3o de Dados - Blocktime Tecnologia","og_url":"https:\/\/aprovacao.website\/blocktime\/protecao-de-dados\/","og_site_name":"Blocktime Tecnologia","article_modified_time":"2024-02-09T22:23:26+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/aprovacao.website\/blocktime\/protecao-de-dados\/","url":"https:\/\/aprovacao.website\/blocktime\/protecao-de-dados\/","name":"Prote\u00e7\u00e3o de Dados - Blocktime Tecnologia","isPartOf":{"@id":"https:\/\/aprovacao.website\/blocktime\/#website"},"datePublished":"2024-02-09T16:57:05+00:00","dateModified":"2024-02-09T22:23:26+00:00","breadcrumb":{"@id":"https:\/\/aprovacao.website\/blocktime\/protecao-de-dados\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aprovacao.website\/blocktime\/protecao-de-dados\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/aprovacao.website\/blocktime\/protecao-de-dados\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/aprovacao.website\/blocktime\/"},{"@type":"ListItem","position":2,"name":"Prote\u00e7\u00e3o de Dados"}]},{"@type":"WebSite","@id":"https:\/\/aprovacao.website\/blocktime\/#website","url":"https:\/\/aprovacao.website\/blocktime\/","name":"Blocktime Tecnologia","description":"Servi\u00e7os Centralizados e Virtual CIO","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aprovacao.website\/blocktime\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"}]}},"_links":{"self":[{"href":"https:\/\/aprovacao.website\/blocktime\/wp-json\/wp\/v2\/pages\/4975","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aprovacao.website\/blocktime\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/aprovacao.website\/blocktime\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/aprovacao.website\/blocktime\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/aprovacao.website\/blocktime\/wp-json\/wp\/v2\/comments?post=4975"}],"version-history":[{"count":55,"href":"https:\/\/aprovacao.website\/blocktime\/wp-json\/wp\/v2\/pages\/4975\/revisions"}],"predecessor-version":[{"id":5284,"href":"https:\/\/aprovacao.website\/blocktime\/wp-json\/wp\/v2\/pages\/4975\/revisions\/5284"}],"wp:attachment":[{"href":"https:\/\/aprovacao.website\/blocktime\/wp-json\/wp\/v2\/media?parent=4975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}