{"id":47769,"date":"2025-09-17T17:54:59","date_gmt":"2025-09-17T17:54:59","guid":{"rendered":"https:\/\/becolve.com\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/"},"modified":"2025-09-17T17:54:59","modified_gmt":"2025-09-17T17:54:59","slug":"a-protecao-do-perimetro-ja-nao-e-suficiente","status":"publish","type":"blog","link":"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/","title":{"rendered":"A prote\u00e7\u00e3o do per\u00edmetro j\u00e1 n\u00e3o \u00e9 suficiente."},"content":{"rendered":"<p class=\"p2\">O n\u00famero de <strong>ataques e incidentes de ciberseguran\u00e7a<\/strong> ocorridos nos \u00faltimos meses continua a crescer vertiginosamente. O ser humano tem a tend\u00eancia de, quando um evento ocorre habitualmente, o normalizar e desvalorizar, especialmente quando n\u00e3o o afeta diretamente. Se olharmos apenas <strong>2 meses atr\u00e1s, em abril e maio de 2021<\/strong>:  <\/p>\n<p>&nbsp;<\/p>\n<ul class=\"ul1\">\n<li class=\"li2\">Utiliza\u00e7\u00e3o de BITS do Windows para evitar as Firewalls (<a href=\"https:\/\/thehackernews.com\/2021\/04\/hackers-using-windows-os-feature-to.html\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Um jovem de 22 anos acusado de hackear a rede de abastecimento de \u00e1gua (<a href=\"https:\/\/www.jioforme.com\/22-year-old-charged-with-hacking-water-supply-system-and-endangering-life\/302535\/\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Falhas no hypervisor da Citrix podem permitir a execu\u00e7\u00e3o de c\u00f3digo em m\u00e1quinas virtuais (<a href=\"https:\/\/securityaffairs.co\/wordpress\/116190\/security\/citrix-hypervisor-dos-flaws.html\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">O parlamento alem\u00e3o sob ataque (<a href=\"https:\/\/unaaldia.hispasec.com\/2021\/04\/el-parlamento-aleman-bajo-ataque.html\/\" target=\"_blank\" rel=\"noopener\">link<\/a>) com spear phishing<\/li>\n<li class=\"li2\">V\u00e1rios grupos APT atacam servidores Fortinet com FortiOS para se aproveitarem de vulnerabilidades n\u00e3o corrigidas de 2018 (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-and-cisa-warn-of-state-hackers-attacking-fortinet-fortios-servers\/\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">533 milh\u00f5es de n\u00fameros de telefone do Facebook filtrados (<a href=\"https:\/\/therecord.media\/phone-numbers-for-533-million-facebook-users-leaked-on-hacking-forum\/\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Applus+ det\u00e9m um ciberataque que interrompeu a sua atividade (<a href=\"https:\/\/www.expansion.com\/empresas\/2021\/04\/01\/6065f4a4e5fdea32768b4641.html\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Roubam a identidade de um site oficial do Governo para vender sapatilhas (<a href=\"https:\/\/www.ciberseguridadlogitek.com\/octubre-el-mes-de-concienciacion-de-ciberseguridad\/\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Campanha de phishing a fazer-se passar pela Ag\u00eancia Tribut\u00e1ria (<a href=\"https:\/\/www.osi.es\/es\/actualidad\/avisos\/2021\/04\/correo-suplantando-la-agencia-tributaria-que-busca-descargar-malware-en-tu\" target=\"_blank\" rel=\"noopener\">link<\/a>) para instalar malware<\/li>\n<li class=\"li2\">Campanha de malware via LinkedIn (<a href=\"https:\/\/thehackernews.com\/2021\/04\/hackers-targeting-professionals-with.html?m=1#click=https:\/\/t.co\/03IFBZeA9I\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Dados de 500 milh\u00f5es de utilizadores do LinkedIn filtrados (<a href=\"https:\/\/www.adslzone.net\/noticias\/seguridad\/500-millones-cuentas-linkedin-filtracion-2021\/\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">BleedingTouch \u2013 Bug de Bluetooth no Linux que permitia a execu\u00e7\u00e3o de c\u00f3digo remoto com privil\u00e9gios de kernel (<a href=\"https:\/\/google.github.io\/security-research\/pocs\/linux\/bleedingtooth\/writeup\">link<\/a>).<\/li>\n<li class=\"li2\">Malware que se propaga pelo Whatsapp (<a href=\"https:\/\/t.co\/BSuXQi8coA?amp=1\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">A explorar o Windows RPC (<a href=\"https:\/\/iamelli0t.github.io\/2021\/04\/10\/RPC-Bypass-CFG.html\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Nega\u00e7\u00e3o de servi\u00e7o em IPv6 no Windows (<a href=\"https:\/\/blog.quarkslab.com\/analysis-of-a-windows-ipv6-fragmentation-vulnerability-cve-2021-24086.html\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">O servidor de atualiza\u00e7\u00f5es da Gigaset de Android<span class=\"Apple-converted-space\">  <\/span>foi hackeado para instalar malware em dispositivos (<a href=\"https:\/\/thehackernews.com\/2021\/04\/gigaset-android-update-server-hacked-to.html\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">0-day para Chrome e Microsoft Edge (<a href=\"https:\/\/thehackernews.com\/2021\/04\/gigaset-android-update-server-hacked-to.html\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">9 vulnerabilidades em TCP\/IP afetam 100 milh\u00f5es de dispositivos IoT (<a href=\"https:\/\/thehackernews.com\/2021\/04\/new-namewreck-vulnerabilities-impact.html\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">0-day do gestor de janelas do Windows (<a href=\"https:\/\/securelist.com\/zero-day-vulnerability-in-desktop-window-manager-cve-2021-28310-used-in-the-wild\/101898\/\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">The Phone House afetada por Ransomware (<a href=\"https:\/\/twitter.com\/Placi__\/status\/1383415349857583106\" target=\"_blank\" rel=\"noopener\">link<\/a> <a href=\"https:\/\/elandroidelibre.elespanol.com\/2021\/04\/ciberataque-a-phone-house-3-millones-de-clientes-afectados.html\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Airstrike Attack \u2013 Bypass de encripta\u00e7\u00e3o em equipamentos de dom\u00ednio Windows (<a href=\"https:\/\/shenaniganslabs.io\/2021\/04\/13\/Airstrike.html\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Hacks no Microsoft Exchange (<a href=\"https:\/\/www.muycomputerpro.com\/2021\/04\/15\/fbi-microsoft-exchange\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Ciberataque \u00e0 Avalia consegue extrair 7GB de informa\u00e7\u00e3o confidencial (<a href=\"https:\/\/www.elperiodicodearagon.com\/noticias\/aragon\/ciberataque-avalia-robo-datos-sensibles-cientos-empresas_1465124.html\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Vincle, outra empresa atacada por Ransomware (Babuk) \u2013 <a href=\"https:\/\/twitter.com\/elhackernet\/status\/1383833339023355912\" target=\"_blank\" rel=\"noopener\">link<\/a>.<\/li>\n<li class=\"li2\">Ataque Ransomware \u00e0 Universidade de Castilla la Mancha (<a href=\"https:\/\/twitter.com\/elhackernet\/status\/1383833339023355912\" target=\"_blank\" rel=\"noopener\">link<\/a>)<\/li>\n<li class=\"li2\">Vulnerabilidade 0-day da Pulse Secure VPN (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/pulse-secure-vpn-zero-day-used-to-hack-defense-firms-govt-orgs\/\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Revil amea\u00e7a a Apple de filtrar designs ap\u00f3s comprometer a Quanta (<a href=\"https:\/\/diarioti.com\/revil-habria-hackeado-quanta-computer-y-sustraido-disenos-de-apple\/116352\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Ataque massivo a dispositivos QNAP (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/massive-qlocker-ransomware-attack-uses-7zip-to-encrypt-qnap-devices\/\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Bypass de valida\u00e7\u00e3o da assinatura digital em pacotes MSI pode permitir a instala\u00e7\u00e3o de pacotes (<a href=\"https:\/\/sec.okta.com\/articles\/2021\/04\/uncovering-and-disclosing-signature-spoofing-vulnerability-windows\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Escalada de privil\u00e9gios no MySQL no Windows (<a href=\"https:\/\/kb.cert.org\/vuls\/id\/567764\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Ataque ao INE e a outros minist\u00e9rios (<a href=\"https:\/\/www.xataka.com\/seguridad\/ciberataque-sincronizado-afecta-al-ine-a-ministerios-como-justicia-economia-educacion\/\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Mapeamentos de grupos APT na Coreia do Norte, EUA, China e R\u00fassia (<a href=\"https:\/\/xorl.wordpress.com\/2021\/04\/24\/north-korea-dprk-cyber-operations-groups\/\" target=\"_blank\" rel=\"noopener\">link<\/a>, <a href=\"https:\/\/xorl.wordpress.com\/2021\/04\/18\/us-cyber-operations-groups\/\" target=\"_blank\" rel=\"noopener\">link<\/a> <a href=\"https:\/\/xorl.wordpress.com\/2021\/04\/20\/chinese-cyber-operations-groups\/\" target=\"_blank\" rel=\"noopener\">link<\/a> <a href=\"https:\/\/xorl.wordpress.com\/2021\/04\/16\/russias-cyber-operations-groups\/\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Escalada de privil\u00e9gios no Windows RPC (<a href=\"https:\/\/labs.sentinelone.com\/relaying-potatoes-dce-rpc-ntlm-relay-eop\/\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Babuk (RansomWare) afeta a pol\u00edcia de Washington DC (<a href=\"https:\/\/heimdalsecurity.com\/blog\/dc-police-confirms-cyberattack\/\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Filtragem de dados do Real Madrid (<a href=\"https:\/\/www.elconfidencialdigital.com\/articulo\/seguridad\/pirata-informatico-colo-sistema-real-madrid-robo-datos-jugadores-contratos-presupuestos\/20210420174534233658.amp.html#click=https:\/\/t.co\/p5UKe3hxhm\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">2 0-day para iOS e iPadOS (<a href=\"https:\/\/support.apple.com\/en-us\/HT212336\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Aplica\u00e7\u00f5es m\u00f3veis exp\u00f5em dados das chaves da AWS (<a href=\"https:\/\/bevigil.com\/blog\/mobile-apps-exposing-aws-keys-affect-100m-users-data\/\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Hackeiam um carro Tesla remotamente a partir de um drone (<a href=\"https:\/\/www.securityweek.com\/tesla-car-hacked-remotely-drone-zero-click-exploit\">link<\/a>)<\/li>\n<li class=\"li2\">Um driver da Dell vulner\u00e1vel p\u00f5e em risco milh\u00f5es de sistemas (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/vulnerable-dell-driver-puts-hundreds-of-millions-of-systems-at-risk\/\" target=\"_blank\" rel=\"noopener\">link<\/a> <a href=\"https:\/\/www.dell.com\/support\/kbdoc\/es-es\/000186019\/dsa-2021-088-dell-client-platform-security-update-for-dell-driver-insufficient-access-control-vulnerability\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Erro cr\u00edtico no VMWare vRealize Business (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/vmware-fixes-critical-rce-bug-in-vrealize-business-for-cloud\/amp\/#click=https:\/\/t.co\/SMBG2L03GW\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Uma vulnerabilidade da Qualcomm teve impacto sobre 40% dos telem\u00f3veis (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/qualcomm-vulnerability-impacts-nearly-40-percent-of-all-mobile-phones\/amp\/\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Uma falha no Foxit Reader permite executar c\u00f3digo malicioso atrav\u00e9s de PDF (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/foxit-reader-bug-lets-attackers-run-malicious-code-via-pdfs\/amp\/\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Um ataque de Ransomware det\u00e9m o oleoduto de combust\u00edvel mais grande dos EUA (<a href=\"https:\/\/thehackernews.com\/2021\/05\/ransomware-cyber-attack-forced-largest.html?m=1#click=https:\/\/t.co\/hEmfIQjmi5\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Quase todos os dispositivos WiFi s\u00e3o vulner\u00e1veis a FragAttacks (<a href=\"https:\/\/thehackernews.com\/2021\/05\/nearly-all-wifi-devices-are-vulnerable.html?m=1#click=https:\/\/t.co\/n9bipl1jsX\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">0-day para Adobe Acrobat (<a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb21-29.html\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Um ciberataque obriga o sistema de sa\u00fade da Irlanda a fechar o seu sistema inform\u00e1tico (<a href=\"https:\/\/www.abc.es\/internacional\/abci-ciberataque-obliga-sistema-salud-irlanda-cerrar-sistema-informatico-y-suspender-consultas-202105141055_noticia_amp.html\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Toshiba afetada por DarkSide (RansomWare) (<a href=\"https:\/\/finance.yahoo.com\/news\/toshibas-european-business-hit-cyberattack-043922936.html?guce_referrer=aHR0cHM6Ly90LmNvLw&amp;guce_referrer_sig=AQAAALzomXlS3gjearHlCj19m1IBefw6abzm5J4DLlMDt94qNLKQ2Gl1fXpkODGkgla8q16L1tv-x7g8r3I0jfvQ_MJ7UK0Ll_m2CsLapoJqWN1DNUrTsS0TwpSA0TPTZR1vSz8E5X_Uy_dg4UrZCwAhh2bbltaUiAKt2El4xgnXHEbY#click=https:\/\/t.co\/1qJBAPyewt\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Vulnerabilidade no IIS que permite executar c\u00f3digo malicioso no kernel do Windows (<a href=\"https:\/\/therecord.media\/poc-released-for-wormable-windows-iis-bug\/amp\/\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Axa afetada por ransomware (<a href=\"https:\/\/amp.expansion.com\/empresas\/banca\/2021\/05\/16\/60a15948468aeb200b8b4583.html\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<li class=\"li2\">Hackeiam as redes de ag\u00eancias federais russas (<a href=\"https:\/\/securityaffairs.co\/wordpress\/118169\/intelligence\/fsb-says-russian-agencies-hacked.html\" target=\"_blank\" rel=\"noopener\">link<\/a>).<\/li>\n<\/ul>\n<div class=\"page\" title=\"P\u00e1gina 2\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Ou yeah! E isto s\u00f3 em 2 meses&#8230; ao que \u00e9 preciso somar todas aquelas <strong>vulnerabilidades anteriores que ainda n\u00e3o foram<\/strong> corrigidas&#8230; <\/p>\n<p>Isto representa um inferno para qualquer pessoa que tenha o <strong>objetivo de manter os sistemas mais ou menos seguros:<\/strong> embora as t\u00e9cnicas utilizadas sejam poucas: <strong>malware, explora\u00e7\u00e3o de vulnerabilidades e engenharia social<\/strong>, os <strong>vetores de ataque<\/strong> s\u00e3o muitos e, em alguns casos, muito dif\u00edceis de evitar (usa wi-fi? usa PDF? usa dispositivos Android ou iOS? usa NAS? usa os \u00faltimos firmwares corrigidos de v\u00e1rios dispositivos? Usa Windows? Usa Linux? Usa bases de dados? usa interfaces web? usa virtualiza\u00e7\u00e3o? usa drivers? confia na sua cadeia de fornecimento?&#8230;)<\/p>\n<p>A <strong>prote\u00e7\u00e3o de uma infraestrutura de rede cr\u00edtica<\/strong> n\u00e3o pode basear-se apenas no controlo de acesso \u00e0 mesma. Evidentemente, a prote\u00e7\u00e3o perimetral \u00e9 e continuar\u00e1 a ser muito importante, mas devem ser consideradas contramedidas adicionais para quando esta prote\u00e7\u00e3o, por uma raz\u00e3o ou outra, falhar. <\/p>\n<p>Para abordar com sucesso o problema da ciberseguran\u00e7a, n\u00e3o temos outra alternativa sen\u00e3o <strong>implementar estrat\u00e9gias de defesa e monitoriza\u00e7\u00e3o em profundidade<\/strong> que nos permitam proteger e detetar problemas em diferentes pontos da nossa rede. Primeiro, para limitar o impacto deste tipo de incidentes e, segundo, para evitar que se propaguem a outras zonas ou \u00e1reas da nossa atividade. <\/p>\n<p>Para come\u00e7ar, podemos analisar os <strong>padr\u00f5es internacionais<\/strong> e que ideias b\u00e1sicas nos transmitem. Por exemplo, o NIST CSF 1.1 cont\u00e9m uma s\u00e9rie de recomenda\u00e7\u00f5es e refer\u00eancias a outros padr\u00f5es para implementar uma defesa em profundidade: <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-29014 aligncenter\" src=\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/cibersecurity-framework.jpg\" alt=\"cibersecurity framework version 1.1\" width=\"800\" height=\"400\"><\/p>\n<div class=\"page\" title=\"P\u00e1gina 2\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>&nbsp;<\/p>\n<p>As <strong>tecnologias dispon\u00edveis<\/strong> para satisfazer as necessidades de prote\u00e7\u00e3o de cada um destes pontos s\u00e3o muitas e variadas.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>A Logitek explica-lhe <strong>como abord\u00e1mos uma prote\u00e7\u00e3o de ciberseguran\u00e7a multicamada<\/strong> para minimizar os diferentes riscos que amea\u00e7am os sistemas, desde o per\u00edmetro da rede at\u00e9 aos dados do PLC:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>\n<h5><span style=\"color: #3fa632;\"><a style=\"color: #3fa632;\" href=\"https:\/\/www.ciberseguridadlogitek.com\/estrategia-de-defensa-en-profundidad-en-ciberseguridad-industrial\/\" target=\"_blank\" rel=\"noopener\">Estrat\u00e9gia de Defesa em profundidade em ciberseguran\u00e7a industrial.<\/a><\/span><\/h5>\n<\/li>\n<li class=\"entry-title\">\n<h5><span style=\"color: #3fa632;\"><a style=\"color: #3fa632;\" href=\"https:\/\/www.ciberseguridadlogitek.com\/como-logitek-implementa-la-defensa-perimetral\/\" target=\"_blank\" rel=\"noopener\">Como a Logitek implementa a defesa perimetral.<\/a><\/span><\/h5>\n<\/li>\n<li>\n<h5><span style=\"color: #3fa632;\"><a style=\"color: #3fa632;\" href=\"https:\/\/www.ciberseguridadlogitek.com\/como-logitek-implementa-la-defensa-de-la-red-interna\/\" target=\"_blank\" rel=\"noopener\">Como a Logitek implementa a defesa da rede interna.<\/a><\/span><\/h5>\n<\/li>\n<li class=\"entry-title\">\n<h5><span style=\"color: #3fa632;\"><a style=\"color: #3fa632;\" href=\"https:\/\/www.ciberseguridadlogitek.com\/como-logitek-implementa-la-defensa-de-los-equipos\/\" target=\"_blank\" rel=\"noopener\">Como a Logitek implementa a defesa dos equipamentos.<\/a><\/span><\/h5>\n<\/li>\n<li class=\"entry-title\">\n<h5><span style=\"color: #3fa632;\"><a style=\"color: #3fa632;\" href=\"https:\/\/www.ciberseguridadlogitek.com\/como-logitek-implementa-la-defensa-de-aplicaciones-criticas\/\" target=\"_blank\" rel=\"noopener\">Como a Logitek implementa a defesa de aplica\u00e7\u00f5es cr\u00edticas.<\/a><\/span><\/h5>\n<\/li>\n<li class=\"entry-title\">\n<h5><span style=\"color: #3fa632;\"><a style=\"color: #3fa632;\" href=\"https:\/\/www.ciberseguridadlogitek.com\/como-logitek-implementa-la-defensa-de-los-datos\/\" target=\"_blank\" rel=\"noopener\">Como a Logitek implementa a defesa dos dados.<\/a><\/span><\/h5>\n<\/li>\n<li class=\"entry-title\">\n<h5><span style=\"color: #3fa632;\"><a style=\"color: #3fa632;\" href=\"https:\/\/www.ciberseguridadlogitek.com\/monitorizacion-en-profundidad\/\" target=\"_blank\" rel=\"noopener\">Monitoriza\u00e7\u00e3o em profundidade.<\/a><\/span><\/h5>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Explicamos-lhe como abord\u00e1mos uma prote\u00e7\u00e3o de ciberseguran\u00e7a multicamada para minimizar os diferentes riscos que amea\u00e7am os sistemas, desde o per\u00edmetro da rede at\u00e9 aos dados do PLC<\/p>\n","protected":false},"author":31,"featured_media":47771,"menu_order":0,"template":"","categories":[969],"tags":[],"arquitectura":[1838],"area":[],"sector":[],"experto":[203],"weborigen":[157],"productos-tax":[],"soluciones-tax":[],"marcas-tax":[],"coauthors":[],"class_list":["post-47769","blog","type-blog","status-publish","has-post-thumbnail","hentry","category-ciberseguranca","arquitectura-ciberseguranca-industrial","experto-ciberseguranca-industrial-disponibilidade-total","weborigen-ciberseguridadlogitek-com"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A prote\u00e7\u00e3o do per\u00edmetro j\u00e1 n\u00e3o \u00e9 suficiente.<\/title>\n<meta name=\"description\" content=\"Prote\u00e7\u00e3o de ciberseguran\u00e7a multicamada para minimizar os diferentes riscos que amea\u00e7am os sistemas, desde o per\u00edmetro da rede at\u00e9 aos dados do PLC.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A prote\u00e7\u00e3o do per\u00edmetro j\u00e1 n\u00e3o \u00e9 suficiente.\" \/>\n<meta property=\"og:description\" content=\"Prote\u00e7\u00e3o de ciberseguran\u00e7a multicamada para minimizar os diferentes riscos que amea\u00e7am os sistemas, desde o per\u00edmetro da rede at\u00e9 aos dados do PLC.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/\" \/>\n<meta property=\"og:site_name\" content=\"Becolve Digital\" \/>\n<meta property=\"og:image\" content=\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/proteccion-perimetro.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Logitek_es\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Becolve Digital\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/\",\"url\":\"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/\",\"name\":\"A prote\u00e7\u00e3o do per\u00edmetro j\u00e1 n\u00e3o \u00e9 suficiente.\",\"isPartOf\":{\"@id\":\"https:\/\/becolve.com\/pt-pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/proteccion-perimetro.jpg\",\"datePublished\":\"2025-09-17T17:54:59+00:00\",\"description\":\"Prote\u00e7\u00e3o de ciberseguran\u00e7a multicamada para minimizar os diferentes riscos que amea\u00e7am os sistemas, desde o per\u00edmetro da rede at\u00e9 aos dados do PLC.\",\"breadcrumb\":{\"@id\":\"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/#primaryimage\",\"url\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/proteccion-perimetro.jpg\",\"contentUrl\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/proteccion-perimetro.jpg\",\"width\":800,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/becolve.com\/pt-pt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog Items\",\"item\":\"https:\/\/becolve.com\/pt-pt\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A prote\u00e7\u00e3o do per\u00edmetro j\u00e1 n\u00e3o \u00e9 suficiente.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/becolve.com\/pt-pt\/#website\",\"url\":\"https:\/\/becolve.com\/pt-pt\/\",\"name\":\"Becolve Digital\",\"description\":\"Impulsamos la transformaci\u00f3n digital en la industria e infraestructuras\",\"publisher\":{\"@id\":\"https:\/\/becolve.com\/pt-pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/becolve.com\/pt-pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/becolve.com\/pt-pt\/#organization\",\"name\":\"Becolve Digital\",\"url\":\"https:\/\/becolve.com\/pt-pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/becolve.com\/pt-pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/becolve-logo-h-black_200.png\",\"contentUrl\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/becolve-logo-h-black_200.png\",\"width\":200,\"height\":64,\"caption\":\"Becolve Digital\"},\"image\":{\"@id\":\"https:\/\/becolve.com\/pt-pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/Logitek_es\",\"https:\/\/www.linkedin.com\/company\/becolve-digital\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A prote\u00e7\u00e3o do per\u00edmetro j\u00e1 n\u00e3o \u00e9 suficiente.","description":"Prote\u00e7\u00e3o de ciberseguran\u00e7a multicamada para minimizar os diferentes riscos que amea\u00e7am os sistemas, desde o per\u00edmetro da rede at\u00e9 aos dados do PLC.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/","og_locale":"pt_PT","og_type":"article","og_title":"A prote\u00e7\u00e3o do per\u00edmetro j\u00e1 n\u00e3o \u00e9 suficiente.","og_description":"Prote\u00e7\u00e3o de ciberseguran\u00e7a multicamada para minimizar os diferentes riscos que amea\u00e7am os sistemas, desde o per\u00edmetro da rede at\u00e9 aos dados do PLC.","og_url":"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/","og_site_name":"Becolve Digital","og_image":[{"width":800,"height":400,"url":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/proteccion-perimetro.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Logitek_es","twitter_misc":{"Tempo estimado de leitura":"5 minutos","Written by":"Becolve Digital"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/","url":"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/","name":"A prote\u00e7\u00e3o do per\u00edmetro j\u00e1 n\u00e3o \u00e9 suficiente.","isPartOf":{"@id":"https:\/\/becolve.com\/pt-pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/#primaryimage"},"image":{"@id":"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/#primaryimage"},"thumbnailUrl":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/proteccion-perimetro.jpg","datePublished":"2025-09-17T17:54:59+00:00","description":"Prote\u00e7\u00e3o de ciberseguran\u00e7a multicamada para minimizar os diferentes riscos que amea\u00e7am os sistemas, desde o per\u00edmetro da rede at\u00e9 aos dados do PLC.","breadcrumb":{"@id":"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/#primaryimage","url":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/proteccion-perimetro.jpg","contentUrl":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/proteccion-perimetro.jpg","width":800,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/becolve.com\/pt-pt\/blog\/a-protecao-do-perimetro-ja-nao-e-suficiente\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/becolve.com\/pt-pt\/"},{"@type":"ListItem","position":2,"name":"Blog Items","item":"https:\/\/becolve.com\/pt-pt\/blog\/"},{"@type":"ListItem","position":3,"name":"A prote\u00e7\u00e3o do per\u00edmetro j\u00e1 n\u00e3o \u00e9 suficiente."}]},{"@type":"WebSite","@id":"https:\/\/becolve.com\/pt-pt\/#website","url":"https:\/\/becolve.com\/pt-pt\/","name":"Becolve Digital","description":"Impulsamos la transformaci\u00f3n digital en la industria e infraestructuras","publisher":{"@id":"https:\/\/becolve.com\/pt-pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/becolve.com\/pt-pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/becolve.com\/pt-pt\/#organization","name":"Becolve Digital","url":"https:\/\/becolve.com\/pt-pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/becolve.com\/pt-pt\/#\/schema\/logo\/image\/","url":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/becolve-logo-h-black_200.png","contentUrl":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/becolve-logo-h-black_200.png","width":200,"height":64,"caption":"Becolve Digital"},"image":{"@id":"https:\/\/becolve.com\/pt-pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Logitek_es","https:\/\/www.linkedin.com\/company\/becolve-digital\/"]}]}},"_links":{"self":[{"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/blog\/47769","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/users\/31"}],"version-history":[{"count":0,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/blog\/47769\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/media\/47771"}],"wp:attachment":[{"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/media?parent=47769"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/categories?post=47769"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/tags?post=47769"},{"taxonomy":"arquitectura","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/arquitectura?post=47769"},{"taxonomy":"area","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/area?post=47769"},{"taxonomy":"sector","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/sector?post=47769"},{"taxonomy":"experto","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/experto?post=47769"},{"taxonomy":"weborigen","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/weborigen?post=47769"},{"taxonomy":"productos-tax","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/productos-tax?post=47769"},{"taxonomy":"soluciones-tax","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/soluciones-tax?post=47769"},{"taxonomy":"marcas-tax","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/marcas-tax?post=47769"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/coauthors?post=47769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}