{"id":21823,"date":"2023-03-17T11:37:14","date_gmt":"2023-03-17T11:37:14","guid":{"rendered":"https:\/\/blog.infraspeak.com\/?p=21823"},"modified":"2023-03-17T11:37:43","modified_gmt":"2023-03-17T11:37:43","slug":"evitar-roubo-de-dados-no-facility-management","status":"publish","type":"post","link":"https:\/\/blog.infraspeak.com\/pt-br\/evitar-roubo-de-dados-no-facility-management\/","title":{"rendered":"Como evitar o roubo de dados no facility management"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div>\n<p>As amea\u00e7as de invas\u00f5es em sistemas digitais de informa\u00e7\u00e3o de facility management (FM) s\u00e3o uma preocupa\u00e7\u00e3o cada dia maior. Com a crescente necessidade de digitaliza\u00e7\u00e3o dos processos e o armazenamento de grandes volumes de informa\u00e7\u00e3o, \u00e9 mais importante do que nunca que os gestores de manuten\u00e7\u00e3o prestem especial aten\u00e7\u00e3o \u00e0 seguran\u00e7a dos dados. Neste artigo, vamos explorar <strong>o que s\u00e3o roubos de dados no FM, porque acontecem, e o que os gestores de instala\u00e7\u00f5es podem fazer para evit\u00e1-las<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">No contexto da manuten\u00e7\u00e3o e FM, o que s\u00e3o os roubos de dados?<\/h2>\n\n\n\n<p>No \u00e2mbito da <a href=\"https:\/\/blog.infraspeak.com\/pt-br\/o-que-e-o-facility-management\/\">manuten\u00e7\u00e3o e do facility management<\/a>, um roubo de dados se refere ao acesso n\u00e3o autorizado ou ao roubo de informa\u00e7\u00f5es sens\u00edveis relacionadas com o funcionamento de determinado espa\u00e7o ou equipamento. Isto pode incluir dados sobre funcion\u00e1rios, fornecedores, clientes ou mesmo sobre as pr\u00f3prias a\u00e7\u00f5es de manuten\u00e7\u00e3o. Exemplos de informa\u00e7\u00e3o confidencial que pode ser comprometida em um roubo de dados desta natureza incluem informa\u00e7\u00e3o de identifica\u00e7\u00e3o pessoal (<em>Personal Identifiable Information<\/em> \u2014 PII), dados financeiros e protocolos de seguran\u00e7a de edif\u00edcios.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Por que os dados de manuten\u00e7\u00e3o est\u00e3o sujeitos a esse tipo de exposi\u00e7\u00e3o?<\/h2>\n\n\n\n<p>Quando falamos em manuten\u00e7\u00e3o e gest\u00e3o de instala\u00e7\u00f5es, as invas\u00f5es e roubos de dados podem ocorrer por v\u00e1rias raz\u00f5es. Essas s\u00e3o algumas das causas mais comuns:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Erro humano:<\/strong> os colaboradores da empresa, ou os <a href=\"https:\/\/blog.infraspeak.com\/pt-br\/gestao-de-fornecedores-em-manutencao\/\">fornecedores externos<\/a>, exp\u00f5em acidentalmente dados sens\u00edveis ao n\u00e3o cumprirem protocolos de seguran\u00e7a adequados;<\/li>\n\n\n\n<li><strong>Ataques virtuais:<\/strong> hackers tentam obter acesso aos sistemas de informa\u00e7\u00f5es digitais de uma empresa para roubar dados confidenciais;<\/li>\n\n\n\n<li><strong>Malware: <\/strong>softwares maliciosos s\u00e3o utilizados para obter acesso n\u00e3o autorizado aos sistemas de informa\u00e7\u00f5es de uma empresa ou infraestrutura;<\/li>\n\n\n\n<li><strong>Amea\u00e7as internas: <\/strong>colaboradores ou fornecedores com acesso a informa\u00e7\u00f5es confidenciais, de forma intencional, roubam ou divulgam esses dados;<\/li>\n\n\n\n<li><strong>Roubo f\u00edsico:<\/strong> os registros f\u00edsicos ou os dispositivos eletr\u00f4nicos que cont\u00eam informa\u00e7\u00f5es sens\u00edveis desaparecem.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Consequ\u00eancias do roubo de dados no FM<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Preju\u00edzos financeiros<\/strong><\/h3>\n\n\n\n<p>Um roubo de dados pode resultar em perdas financeiras significativas para as <a href=\"https:\/\/blog.infraspeak.com\/pt-br\/empresas-de-facility-management-razoes-pelas-quais-deve-contratar-uma\/\">empresas de FM<\/a>. Al\u00e9m dos custos de repara\u00e7\u00e3o ou substitui\u00e7\u00e3o dos sistemas digitais e de reposi\u00e7\u00e3o da seguran\u00e7a, podem tamb\u00e9m existir encargos legais, multas e pedidos de indemniza\u00e7\u00e3o por parte dos lesados.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Risco de reputa\u00e7\u00e3o e imagem<\/strong><\/h3>\n\n\n\n<p>Um roubo de dados pode prejudicar a imagem e a reputa\u00e7\u00e3o das empresas de FM. Os clientes podem perder a confian\u00e7a na capacidade da empresa em preservar os seus dados, resultando em perda de neg\u00f3cios e de receitas.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Consequ\u00eancias legais<\/strong><\/h3>\n\n\n\n<p>As empresas de manuten\u00e7\u00e3o e instala\u00e7\u00f5es que n\u00e3o cumprem as leis de prote\u00e7\u00e3o de dados podem enfrentar consequ\u00eancias legais, incluindo multas e a\u00e7\u00f5es judiciais movidas pelas partes lesadas.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Ruptura operacional<\/strong><\/h3>\n\n\n\n<p>Um roubo de dados em empresas de manuten\u00e7\u00e3o e FM pode causar perturba\u00e7\u00f5es operacionais significativas. A perda de dados ou a falta de acesso a sistemas cr\u00edticos, ainda que tempor\u00e1ria, podem resultar em atrasos na presta\u00e7\u00e3o do servi\u00e7o, <a href=\"https:\/\/blog.infraspeak.com\/pt-br\/fracas-o-que-aprender-com-avarias\/\">downtime<\/a> e redu\u00e7\u00e3o da produtividade.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Perda de confidencialidade<\/strong><\/h3>\n\n\n\n<p>As empresas de manuten\u00e7\u00e3o e FM lidam com informa\u00e7\u00f5es sens\u00edveis, incluindo registros financeiros, dados pessoais e informa\u00e7\u00f5es comerciais confidenciais. Um roubo de dados pode causar a perda destas informa\u00e7\u00f5es, o que pode provocar consequ\u00eancias graves n\u00e3o s\u00f3 para as empresas, como tamb\u00e9m para os seus clientes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Aumento dos custos de seguran\u00e7a<\/strong><\/h3>\n\n\n\n<p>Um roubo de dados pode resultar em um aumento dos custos de seguran\u00e7a \u2014 pode ser necess\u00e1rio investir em novas tecnologias de prote\u00e7\u00e3o de dados, contratar pessoal adicional e disponibilizar forma\u00e7\u00e3o extra aos funcion\u00e1rios sobre as melhores pr\u00e1ticas de ciberseguran\u00e7a.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Moral dos funcion\u00e1rios<\/strong><\/h3>\n\n\n\n<p>Uma falha no sistema de prote\u00e7\u00e3o de dados pode ter ainda impacto no estado de esp\u00edrito dos colaboradores. Estes podem come\u00e7ar a se sentir inseguros sobre a seguran\u00e7a das suas informa\u00e7\u00f5es pessoais e da pr\u00f3pria empresa.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Como uma Plataforma Inteligente de Gest\u00e3o de Manuten\u00e7\u00e3o pode evitar o roubo de dados<\/h2>\n\n\n\n<p>\u00c9 essencial que as empresas de manuten\u00e7\u00e3o e FM implementem fortes medidas de seguran\u00e7a para se protegerem contra acessos indevidos ao seu sistema de informa\u00e7\u00f5es. Estas provid\u00eancias podem incluir auditorias de seguran\u00e7a regulares, forma\u00e7\u00e3o dos funcion\u00e1rios em boas pr\u00e1ticas de ciberseguran\u00e7a e investimento nas mais recentes tecnologias de prote\u00e7\u00e3o de dados. Ao implementar estas medidas, as empresas est\u00e3o se protegendo, como tamb\u00e9m os seus clientes das consequ\u00eancias negativas de um roubo de dados.<\/p>\n\n\n\n<p>Neste sentido, uma<strong> Plataforma Inteligente de Gest\u00e3o de Manuten\u00e7\u00e3o<\/strong> (<a href=\"https:\/\/blog.infraspeak.com\/pt-br\/immp\/\">IMMP<\/a>) pode desempenhar um papel significativo no dia a dia das empresas de manuten\u00e7\u00e3o e FM, ao disponibilizar uma forma segura e eficiente de gerir a informa\u00e7\u00e3o.<\/p>\n\n\n\n<p>Conhe\u00e7a os atributos de uma IMMP que ajudam a prevenir roubo de dados:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Caracter\u00edsticas de seguran\u00e7a robustas<\/strong><\/h3>\n\n\n\n<p>As IMMP oferecem vigorosas caracter\u00edsticas de seguran\u00e7a, como verifica\u00e7\u00e3o de dois fatores, encripta\u00e7\u00e3o e controle de acesso baseado nas fun\u00e7\u00f5es de cada colaborador, para assegurar que apenas indiv\u00edduos autorizados possam acessar dados confidenciais.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Atualiza\u00e7\u00f5es do sistema regulares<\/strong><\/h3>\n\n\n\n<p>Ao oferecerem atualiza\u00e7\u00f5es do sistema de forma frequente, as IMMP ajudam a mant\u00ea-lo seguro e em conformidade com os mais avan\u00e7ados protocolos de seguran\u00e7a.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Gest\u00e3o de dados centralizada<\/strong><\/h3>\n\n\n\n<p>Ao utilizar um sistema de gest\u00e3o de dados centralizado, uma Plataforma Inteligente de Gest\u00e3o de Manuten\u00e7\u00e3o pode ajudar a prevenir roubos de dados, reduzindo o risco de duplica\u00e7\u00e3o de informa\u00e7\u00e3o e assegurando que esta \u00e9 armazenada de forma segura e organizada.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Monitoramento em tempo real<\/strong><\/h3>\n\n\n\n<p>Estas plataformas inteligentes proporcionam o monitoramento em tempo real da atividade do(s) usu\u00e1rio(s), permitindo detectar e responder rapidamente a potenciais amea\u00e7as \u00e0 seguran\u00e7a.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>C\u00f3pias de seguran\u00e7a automatizadas<\/strong><\/h3>\n\n\n\n<p>As IMMP permitem automatizar as c\u00f3pias de seguran\u00e7a dos dados, assegurando que os dados cr\u00edticos s\u00e3o sempre guardados e podem ser restaurados ap\u00f3s um ataque virtual.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Forma\u00e7\u00e3o dos usu\u00e1rios<\/strong><\/h3>\n\n\n\n<p>Uma IMMP pode dar forma\u00e7\u00e3o aos respectivos usu\u00e1rios sobre as melhores pr\u00e1ticas de ciberseguran\u00e7a, incluindo gest\u00e3o de senhas, preven\u00e7\u00e3o de phishing, e ainda identifica\u00e7\u00e3o e comunica\u00e7\u00e3o de potenciais amea\u00e7as \u00e0 seguran\u00e7a.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Gest\u00e3o de compliance<\/strong><\/h3>\n\n\n\n<p>As IMMP ajudam as empresas de manuten\u00e7\u00e3o e FM a cumprir as normas de prote\u00e7\u00e3o de dados, como as que constam no Regulamento Geral de Prote\u00e7\u00e3o de Dados (General Data Protection Regulation \u2014 GDPR).<\/p>\n\n\n\n<p>Por fim, <a href=\"https:\/\/infraspeak.com\/pt-br\/plataforma\/visao-geral\"><strong>uma IMMP como a Infraspeak<\/strong><\/a><strong> permite \u00e0s empresas gerirem os seus dados de forma segura e eficiente, reduzindo o risco de verem os seus sistemas de informa\u00e7\u00f5es atacados<\/strong>.<\/p>\n\n\n\n<p>Dotada de caracter\u00edsticas de seguran\u00e7a robustas e oferecendo atualiza\u00e7\u00f5es regulares do sistema, gest\u00e3o centralizada de dados, monitoramento em tempo real, backups automatizados, forma\u00e7\u00e3o de colaboradores e gest\u00e3o de compliance, <strong>a Infraspeak ajuda os profissionais de manuten\u00e7\u00e3o e facility management a evitar roubos de dados, mantendo protegidas as informa\u00e7\u00f5es confidenciais dos seus clientes<\/strong>.<\/p>\n\n\n\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"20160\" class=\"elementor elementor-20160 elementor-20057\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e28788c banner e-flex e-con-boxed e-con e-parent\" data-id=\"3e28788c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-12c2a413 e-con-full e-flex e-con e-parent\" data-id=\"12c2a413\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fccb20a elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"fccb20a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Elimine potenciais riscos \u00e0 reguran\u00e7a.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Melhore seus SLAs em at\u00e9 91%.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">100% de conformidade com os regulamentos para opera\u00e7\u00f5es de manuten\u00e7\u00e3o.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1cc5099d elementor-mobile-align-justify elementor-widget elementor-widget-button\" data-id=\"1cc5099d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/infraspeak.com\/pt-br\/plataforma\/visao-geral\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba como<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-55aa4726 e-flex e-con-boxed e-con e-parent\" data-id=\"55aa4726\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-73ceb7b5 elementor-widget elementor-widget-image\" data-id=\"73ceb7b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"633\" height=\"510\" src=\"https:\/\/blog.infraspeak.com\/wp-content\/uploads\/2023\/02\/hub_br.webp\" class=\"attachment-large size-large wp-image-20164\" alt=\"\" srcset=\"https:\/\/blog.infraspeak.com\/wp-content\/uploads\/2023\/02\/hub_br.webp 633w, https:\/\/blog.infraspeak.com\/wp-content\/uploads\/2023\/02\/hub_br-300x242.webp 300w\" sizes=\"(max-width: 633px) 100vw, 633px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n","protected":false},"excerpt":{"rendered":"<p>As amea\u00e7as de invas\u00f5es em sistemas digitais de informa\u00e7\u00e3o de facility management (FM) s\u00e3o uma preocupa\u00e7\u00e3o cada dia maior. Com a crescente necessidade de digitaliza\u00e7\u00e3o dos processos e o armazenamento de grandes volumes de informa\u00e7\u00e3o, \u00e9 mais importante do que nunca que os gestores de manuten\u00e7\u00e3o prestem especial aten\u00e7\u00e3o \u00e0 seguran\u00e7a dos dados. Neste artigo, [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":20802,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":"","_wp_rev_ctl_limit":""},"categories":[367],"tags":[],"class_list":["post-21823","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Como evitar o roubo de dados no facility management &#8226; Infraspeak Blog<\/title>\n<meta name=\"description\" content=\"O que s\u00e3o roubos de dados no FM, porque acontecem, e o que os gestores de instala\u00e7\u00f5es podem fazer para evit\u00e1-las.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.infraspeak.com\/pt-br\/evitar-roubo-de-dados-no-facility-management\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Como evitar o roubo de dados no facility management &#8226; Infraspeak Blog\" \/>\n<meta property=\"og:description\" content=\"O que s\u00e3o roubos de dados no FM, porque acontecem, e o que os gestores de instala\u00e7\u00f5es podem fazer para evit\u00e1-las.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.infraspeak.com\/pt-br\/evitar-roubo-de-dados-no-facility-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Infraspeak Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/infraspeakmaintenance\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-17T11:37:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-17T11:37:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.infraspeak.com\/wp-content\/uploads\/2023\/03\/data-breaches-FM.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infraspeak Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@infraspeak\" \/>\n<meta name=\"twitter:site\" content=\"@infraspeak\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infraspeak Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-br\\\/evitar-roubo-de-dados-no-facility-management\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-br\\\/evitar-roubo-de-dados-no-facility-management\\\/\"},\"author\":{\"name\":\"Infraspeak Team\",\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-pt\\\/#\\\/schema\\\/person\\\/b53887f01881a658b4cc1bf25f2d4377\"},\"headline\":\"Como evitar o roubo de dados no facility management\",\"datePublished\":\"2023-03-17T11:37:14+00:00\",\"dateModified\":\"2023-03-17T11:37:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-br\\\/evitar-roubo-de-dados-no-facility-management\\\/\"},\"wordCount\":1245,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-pt\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-br\\\/evitar-roubo-de-dados-no-facility-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.infraspeak.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/data-breaches-FM.jpg\",\"articleSection\":[\"Tecnologia\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-br\\\/evitar-roubo-de-dados-no-facility-management\\\/\",\"url\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-br\\\/evitar-roubo-de-dados-no-facility-management\\\/\",\"name\":\"Como evitar o roubo de dados no facility management &#8226; Infraspeak Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-pt\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-br\\\/evitar-roubo-de-dados-no-facility-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-br\\\/evitar-roubo-de-dados-no-facility-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.infraspeak.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/data-breaches-FM.jpg\",\"datePublished\":\"2023-03-17T11:37:14+00:00\",\"dateModified\":\"2023-03-17T11:37:43+00:00\",\"description\":\"O que s\u00e3o roubos de dados no FM, porque acontecem, e o que os gestores de instala\u00e7\u00f5es podem fazer para evit\u00e1-las.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-br\\\/evitar-roubo-de-dados-no-facility-management\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.infraspeak.com\\\/pt-br\\\/evitar-roubo-de-dados-no-facility-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-br\\\/evitar-roubo-de-dados-no-facility-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.infraspeak.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/data-breaches-FM.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.infraspeak.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/data-breaches-FM.jpg\",\"width\":640,\"height\":427,\"caption\":\"data-breaches-FM\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-br\\\/evitar-roubo-de-dados-no-facility-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.infraspeak.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Como evitar o roubo de dados no facility management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-pt\\\/#website\",\"url\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-pt\\\/\",\"name\":\"Infraspeak Blog\",\"description\":\"All About Maintenance and Facilities Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-pt\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-pt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-pt\\\/#organization\",\"name\":\"Infraspeak\",\"url\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-pt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-pt\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.infraspeak.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/is-logo@2x.png\",\"contentUrl\":\"https:\\\/\\\/blog.infraspeak.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/is-logo@2x.png\",\"width\":544,\"height\":180,\"caption\":\"Infraspeak\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-pt\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/infraspeakmaintenance\",\"https:\\\/\\\/x.com\\\/infraspeak\",\"https:\\\/\\\/www.instagram.com\\\/infraspeak\\\/\",\"http:\\\/\\\/www.linkedin.com\\\/company\\\/infraspeak\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCOdjKyhSD9RJbRhuP-S8Avw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-pt\\\/#\\\/schema\\\/person\\\/b53887f01881a658b4cc1bf25f2d4377\",\"name\":\"Infraspeak Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/blog.infraspeak.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/296167549_2627985274000609_8314221938057526692_n-120x120.jpg\",\"url\":\"https:\\\/\\\/blog.infraspeak.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/296167549_2627985274000609_8314221938057526692_n-120x120.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.infraspeak.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/296167549_2627985274000609_8314221938057526692_n-120x120.jpg\",\"caption\":\"Infraspeak Team\"},\"url\":\"https:\\\/\\\/blog.infraspeak.com\\\/pt-br\\\/author\\\/infraspeakteam\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Como evitar o roubo de dados no facility management &#8226; Infraspeak Blog","description":"O que s\u00e3o roubos de dados no FM, porque acontecem, e o que os gestores de instala\u00e7\u00f5es podem fazer para evit\u00e1-las.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.infraspeak.com\/pt-br\/evitar-roubo-de-dados-no-facility-management\/","og_locale":"pt_BR","og_type":"article","og_title":"Como evitar o roubo de dados no facility management &#8226; Infraspeak Blog","og_description":"O que s\u00e3o roubos de dados no FM, porque acontecem, e o que os gestores de instala\u00e7\u00f5es podem fazer para evit\u00e1-las.","og_url":"https:\/\/blog.infraspeak.com\/pt-br\/evitar-roubo-de-dados-no-facility-management\/","og_site_name":"Infraspeak Blog","article_publisher":"https:\/\/www.facebook.com\/infraspeakmaintenance","article_published_time":"2023-03-17T11:37:14+00:00","article_modified_time":"2023-03-17T11:37:43+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/blog.infraspeak.com\/wp-content\/uploads\/2023\/03\/data-breaches-FM.jpg","type":"image\/jpeg"}],"author":"Infraspeak Team","twitter_card":"summary_large_image","twitter_creator":"@infraspeak","twitter_site":"@infraspeak","twitter_misc":{"Escrito por":"Infraspeak Team","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.infraspeak.com\/pt-br\/evitar-roubo-de-dados-no-facility-management\/#article","isPartOf":{"@id":"https:\/\/blog.infraspeak.com\/pt-br\/evitar-roubo-de-dados-no-facility-management\/"},"author":{"name":"Infraspeak Team","@id":"https:\/\/blog.infraspeak.com\/pt-pt\/#\/schema\/person\/b53887f01881a658b4cc1bf25f2d4377"},"headline":"Como evitar o roubo de dados no facility management","datePublished":"2023-03-17T11:37:14+00:00","dateModified":"2023-03-17T11:37:43+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.infraspeak.com\/pt-br\/evitar-roubo-de-dados-no-facility-management\/"},"wordCount":1245,"publisher":{"@id":"https:\/\/blog.infraspeak.com\/pt-pt\/#organization"},"image":{"@id":"https:\/\/blog.infraspeak.com\/pt-br\/evitar-roubo-de-dados-no-facility-management\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.infraspeak.com\/wp-content\/uploads\/2023\/03\/data-breaches-FM.jpg","articleSection":["Tecnologia"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/blog.infraspeak.com\/pt-br\/evitar-roubo-de-dados-no-facility-management\/","url":"https:\/\/blog.infraspeak.com\/pt-br\/evitar-roubo-de-dados-no-facility-management\/","name":"Como evitar o roubo de dados no facility management &#8226; Infraspeak Blog","isPartOf":{"@id":"https:\/\/blog.infraspeak.com\/pt-pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.infraspeak.com\/pt-br\/evitar-roubo-de-dados-no-facility-management\/#primaryimage"},"image":{"@id":"https:\/\/blog.infraspeak.com\/pt-br\/evitar-roubo-de-dados-no-facility-management\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.infraspeak.com\/wp-content\/uploads\/2023\/03\/data-breaches-FM.jpg","datePublished":"2023-03-17T11:37:14+00:00","dateModified":"2023-03-17T11:37:43+00:00","description":"O que s\u00e3o roubos de dados no FM, porque acontecem, e o que os gestores de instala\u00e7\u00f5es podem fazer para evit\u00e1-las.","breadcrumb":{"@id":"https:\/\/blog.infraspeak.com\/pt-br\/evitar-roubo-de-dados-no-facility-management\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.infraspeak.com\/pt-br\/evitar-roubo-de-dados-no-facility-management\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.infraspeak.com\/pt-br\/evitar-roubo-de-dados-no-facility-management\/#primaryimage","url":"https:\/\/blog.infraspeak.com\/wp-content\/uploads\/2023\/03\/data-breaches-FM.jpg","contentUrl":"https:\/\/blog.infraspeak.com\/wp-content\/uploads\/2023\/03\/data-breaches-FM.jpg","width":640,"height":427,"caption":"data-breaches-FM"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.infraspeak.com\/pt-br\/evitar-roubo-de-dados-no-facility-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.infraspeak.com\/"},{"@type":"ListItem","position":2,"name":"Como evitar o roubo de dados no facility management"}]},{"@type":"WebSite","@id":"https:\/\/blog.infraspeak.com\/pt-pt\/#website","url":"https:\/\/blog.infraspeak.com\/pt-pt\/","name":"Infraspeak Blog","description":"All About Maintenance and Facilities Management","publisher":{"@id":"https:\/\/blog.infraspeak.com\/pt-pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.infraspeak.com\/pt-pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/blog.infraspeak.com\/pt-pt\/#organization","name":"Infraspeak","url":"https:\/\/blog.infraspeak.com\/pt-pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.infraspeak.com\/pt-pt\/#\/schema\/logo\/image\/","url":"https:\/\/blog.infraspeak.com\/wp-content\/uploads\/2018\/11\/is-logo@2x.png","contentUrl":"https:\/\/blog.infraspeak.com\/wp-content\/uploads\/2018\/11\/is-logo@2x.png","width":544,"height":180,"caption":"Infraspeak"},"image":{"@id":"https:\/\/blog.infraspeak.com\/pt-pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/infraspeakmaintenance","https:\/\/x.com\/infraspeak","https:\/\/www.instagram.com\/infraspeak\/","http:\/\/www.linkedin.com\/company\/infraspeak","https:\/\/www.youtube.com\/channel\/UCOdjKyhSD9RJbRhuP-S8Avw"]},{"@type":"Person","@id":"https:\/\/blog.infraspeak.com\/pt-pt\/#\/schema\/person\/b53887f01881a658b4cc1bf25f2d4377","name":"Infraspeak Team","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.infraspeak.com\/wp-content\/uploads\/2023\/02\/296167549_2627985274000609_8314221938057526692_n-120x120.jpg","url":"https:\/\/blog.infraspeak.com\/wp-content\/uploads\/2023\/02\/296167549_2627985274000609_8314221938057526692_n-120x120.jpg","contentUrl":"https:\/\/blog.infraspeak.com\/wp-content\/uploads\/2023\/02\/296167549_2627985274000609_8314221938057526692_n-120x120.jpg","caption":"Infraspeak Team"},"url":"https:\/\/blog.infraspeak.com\/pt-br\/author\/infraspeakteam\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.infraspeak.com\/pt-br\/wp-json\/wp\/v2\/posts\/21823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.infraspeak.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.infraspeak.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.infraspeak.com\/pt-br\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.infraspeak.com\/pt-br\/wp-json\/wp\/v2\/comments?post=21823"}],"version-history":[{"count":1,"href":"https:\/\/blog.infraspeak.com\/pt-br\/wp-json\/wp\/v2\/posts\/21823\/revisions"}],"predecessor-version":[{"id":21824,"href":"https:\/\/blog.infraspeak.com\/pt-br\/wp-json\/wp\/v2\/posts\/21823\/revisions\/21824"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.infraspeak.com\/pt-br\/wp-json\/wp\/v2\/media\/20802"}],"wp:attachment":[{"href":"https:\/\/blog.infraspeak.com\/pt-br\/wp-json\/wp\/v2\/media?parent=21823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.infraspeak.com\/pt-br\/wp-json\/wp\/v2\/categories?post=21823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.infraspeak.com\/pt-br\/wp-json\/wp\/v2\/tags?post=21823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}