{"id":582,"date":"2019-10-21T09:08:11","date_gmt":"2019-10-21T09:08:11","guid":{"rendered":"https:\/\/os-br.com\/?page_id=582"},"modified":"2023-05-30T15:20:31","modified_gmt":"2023-05-30T15:20:31","slug":"cyber-security","status":"publish","type":"page","link":"http:\/\/os-br.com\/pt\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#ededed&#8221; background_image=&#8221;https:\/\/os-br.com\/wp-content\/uploads\/2019\/11\/Cyber-Security.jpg&#8221; inner_width_tablet=&#8221;50px&#8221; inner_max_width_tablet=&#8221;50px&#8221; custom_padding=&#8221;120px||120px|&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; module_alignment=&#8221;center&#8221; z_index_tablet=&#8221;500&#8243; use_border_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; inner_width_tablet=&#8221;50px&#8221; inner_max_width_tablet=&#8221;50px&#8221; custom_padding=&#8221;20px||20px|&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;15px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; z_index_tablet=&#8221;500&#8243; use_border_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Your network and the cloud are under continuous attack.<\/h1>\n<p>The network and the cloud are under continuous attack from extreme threats.<\/p>\n<p>It seems that every day there is another major data breach that adversely affects customers and negatively impacts another company\u2019s reputation. There surely is nothing more important to businesses, educational institutions and government than data security.<\/p>\n<p>And there is nothing more important to Optimus than ensuring that our client\u2019s data is protected by identifying threats and systemic vulnerabilities and then developing the solutions necessary to protect this data as well as the rapid deployment of these solutions.<\/p>\n<p>Optimus works closely with Palo Alto\u00a0 Networks, the world\u2019s cybersecurity leader utilizing their best-in-breed solutions to secure the cloud and stop the most sophisticated\u00a0 threats.<\/p>\n<p>Palo Alto\u2019s cybersecurity tools and technologies incorporate\u00a0automation, machine learning and shared threat intelligence<strong>\u00a0<\/strong>to help organizations get ahead and stay on the cutting edge to combat advanced threats, such as:<\/p>\n<ul>\n<li><strong>DNS tunneling<\/strong>: Domain Name System is a protocol that translates human-friendly URLs into machine-friendly IP addresses. Cybercriminals know that DNS is widely used, trusted and often unmonitored. DNS tunneling exploits the protocol to transfer malware and other data through a client-server model.<\/li>\n<li><strong>Malicious CryptoMining<\/strong>: Browser-based cryptomining attacks are possible when an attacker has found a way to inject JavaScript into a website that allows them to hijack the processing power of site visitors\u2019 devices to mine cryptocurrency, such as bitcoin. In the case of malware-based cryptomining, a user\u2019s entire device is taken over and its CPU used at a higher level to mine currency.<\/li>\n<li><strong>Ransomware:<\/strong>\u00a0Ransomware is the focus of a criminal business model that installs malicious software on a device and holds valuable files, data, or information ransom. With its low barrier to entry and high revenue potential, ransomware is the largest threat facing organizations today.<\/li>\n<\/ul>\n<p>Find out more about the Optimus NOC and SOC services available to our clients.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; background_image=&#8221;https:\/\/os-br.com\/wp-content\/uploads\/2019\/11\/bg.jpg&#8221; parallax=&#8221;on&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Network Operations Center&#8221; url=&#8221;https:\/\/os-br.com\/networking-hardware\/&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe02f;||divi||400&#8243; icon_color=&#8221;#ffffff&#8221; image_icon_width=&#8221;36px&#8221; _builder_version=&#8221;4.16&#8243; header_level=&#8221;h3&#8243; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#ffffff&#8221; header_font_size=&#8221;22&#8243; background_color=&#8221;#808080&#8243; text_orientation=&#8221;justified&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;40px|20px|40px|20px&#8221; link_option_url=&#8221;https:\/\/os-br.com\/networking-hardware\/&#8221; z_index_tablet=&#8221;500&#8243; icon_font_size=&#8221;36px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><a class=\"et_pb_button\" style=\"color: #ffffff;\" href=\"https:\/\/os-br.com\/network-operations-center\/\" target=\"_blank\" rel=\"noopener noreferrer\">Learn More<\/a><\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Security Operations Center &#8221; url=&#8221;https:\/\/os-br.com\/networking-software\/&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe00d;||divi||400&#8243; icon_color=&#8221;#ffffff&#8221; image_icon_width=&#8221;36px&#8221; _builder_version=&#8221;4.16&#8243; header_level=&#8221;h3&#8243; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#ffffff&#8221; header_font_size=&#8221;22&#8243; background_color=&#8221;#808080&#8243; text_orientation=&#8221;justified&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;40px|20px|40px|20px&#8221; link_option_url=&#8221;https:\/\/os-br.com\/networking-software\/&#8221; z_index_tablet=&#8221;500&#8243; icon_font_size=&#8221;36px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><a class=\"et_pb_button\" style=\"color: #ffffff;\" href=\"https:\/\/os-br.com\/security-operations-center\/\" target=\"_blank\" rel=\"noopener noreferrer\">Learn More<\/a><\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; inner_width_tablet=&#8221;50px&#8221; inner_max_width_tablet=&#8221;50px&#8221; custom_padding=&#8221;20px||20px|&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">We love what we do.<\/h2>\n<p style=\"text-align: center;\">Find out what Optimus can do to give you peace of mind that your data is secured<br \/>Please contact us today.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;mailto:sam@sas-us.com&#8221; button_text=&#8221;Contact Us&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.0.9&#8243; custom_margin=&#8221;||20px|&#8221; z_index_tablet=&#8221;500&#8243; global_module=&#8221;1017&#8243; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Your network and the cloud are under continuous attack. The network and the cloud are under continuous attack from extreme threats. It seems that every day there is another major data breach that adversely affects customers and negatively impacts another company\u2019s reputation. There surely is nothing more important to businesses, educational institutions and government than [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-582","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/pages\/582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/comments?post=582"}],"version-history":[{"count":16,"href":"http:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/pages\/582\/revisions"}],"predecessor-version":[{"id":2187,"href":"http:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/pages\/582\/revisions\/2187"}],"wp:attachment":[{"href":"http:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/media?parent=582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}