{"id":34895,"date":"2023-10-27T09:06:16","date_gmt":"2023-10-27T09:06:16","guid":{"rendered":"https:\/\/edibbee.com\/simulacao-de-ataque-cibernetico\/"},"modified":"2024-05-29T15:36:17","modified_gmt":"2024-05-29T15:36:17","slug":"simulacao-de-ataque-cibernetico","status":"publish","type":"page","link":"https:\/\/edibbee.com\/pt-pt\/simulacao-de-ataque-cibernetico\/","title":{"rendered":"Simula\u00e7\u00e3o de Ataque Cibern\u00e9tico"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"34895\" class=\"elementor elementor-34895 elementor-29526\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c515bda elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c515bda\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dd87444\" data-id=\"dd87444\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6c9ccde elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"6c9ccde\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d1134\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h1\"  > Ataque Cibern\u00e9tico <br><em class=\"h3\">Simula\u00e7\u00e3o<\/em><\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-section-luminosity=\"dark\" class=\"elementor-section elementor-top-section elementor-element elementor-element-214a29b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"214a29b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-14806f7\" data-id=\"14806f7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c95af2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c95af2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb93967\" data-id=\"bb93967\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-03b559e elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"03b559e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d1602\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left h3\"  > Identifica\u00e7\u00e3o proativa de vulnerabilidades de seguran\u00e7a por meio de simula\u00e7\u00e3o de ataque cibern\u00e9tico<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e6f926 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"8e6f926\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d1a05\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > \nNuma era marcada pela escalada de amea\u00e7as cibern\u00e9ticas, garantir uma prote\u00e7\u00e3o abrangente tornou-se uma preocupa\u00e7\u00e3o primordial para os profissionais. Com os ataques cibern\u00e9ticos a crescerem em complexidade e aud\u00e1cia, estes representam n\u00e3o s\u00f3 riscos financeiros, mas tamb\u00e9m o potencial para a cria\u00e7\u00e3o de c\u00f3digos maliciosos e at\u00e9 mesmo para o ativismo pol\u00edtico. As repercuss\u00f5es dos ataques cibern\u00e9ticos s\u00e3o vastas, tendo os intrusos o poder de explorar sistemas ou dados roubados para os seus fins.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e991ac elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"6e991ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d1dbf\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Para fortalecer as defesas de uma organiza\u00e7\u00e3o, \u00e9 imperativo compreender as vulnerabilidades de seguran\u00e7a da perspectiva de um hacker. Esta compreens\u00e3o \u00e9 fundamental para avaliar as amea\u00e7as reais enfrentadas por uma organiza\u00e7\u00e3o e para refor\u00e7ar as defesas contra ataques cibern\u00e9ticos cada vez mais sofisticados. \u00c9 aqui que Edibbee entra em cena. Atrav\u00e9s de exerc\u00edcios de simula\u00e7\u00e3o de ataques cibern\u00e9ticos, Edibbee tem a capacidade de descobrir vulnerabilidades conhecidas e anteriormente n\u00e3o descobertas, submetendo os sistemas a amea\u00e7as do mundo real.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44097cb elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"44097cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d21e4\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Edibbee emprega um conjunto de metodologias personalizadas, rigorosamente testadas e comprovadas para avaliar pontos fracos na seguran\u00e7a f\u00edsica, pessoal, seguran\u00e7a processual, bem como seguran\u00e7a em n\u00edvel de sistema e aplicativo.\n<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a601b38 elementor-reverse-tablet elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a601b38\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;startDelay&quot;:300,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;y&quot;:&quot;40px&quot;,&quot;opacity&quot;:0},&quot;animations&quot;:{&quot;y&quot;:&quot;0px&quot;,&quot;opacity&quot;:1}}\" class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-600f145\" data-id=\"600f145\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51ea232 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"51ea232\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d25cd\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Passos para realizar exerc\u00edcios cibern\u00e9ticos<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-d20068b e-flex e-con-boxed e-con e-parent\" data-id=\"d20068b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-203b621 elementor-widget elementor-widget-image\" data-id=\"203b621\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"780\" height=\"585\" src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2023\/10\/cybersecurity-exercise2.png\" class=\"attachment-large size-large wp-image-34897\" alt=\"\" srcset=\"https:\/\/edibbee.com\/wp-content\/uploads\/2023\/10\/cybersecurity-exercise2.png 800w, https:\/\/edibbee.com\/wp-content\/uploads\/2023\/10\/cybersecurity-exercise2-300x225.png 300w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c7a03bd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c7a03bd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b04ae60\" data-id=\"b04ae60\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f86f211 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"f86f211\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d2b80\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left h3\"  > O que \u00e9 simula\u00e7\u00e3o de ataque cibern\u00e9tico?<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85a8d59 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"85a8d59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d3101\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > O software de simula\u00e7\u00e3o de ataques cibern\u00e9ticos \u00e9 uma ferramenta empregada para replicar amea\u00e7as de seguran\u00e7a do mundo real com o objetivo de descobrir vulnerabilidades na infraestrutura de seguran\u00e7a de uma empresa e formular estrat\u00e9gias de resposta a incidentes. Essas simula\u00e7\u00f5es podem envolver o envio de tentativas fict\u00edcias de phishing aos funcion\u00e1rios ou o lan\u00e7amento de ataques ao firewall de aplicativos da web da organiza\u00e7\u00e3o. Eles frequentemente incorporam simula\u00e7\u00f5es automatizadas, aproveitando a l\u00f3gica de amea\u00e7as orientada por IA para garantir que a equipe de seguran\u00e7a permane\u00e7a vigilante o tempo todo.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b5c70e elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"0b5c70e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d3675\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > As simula\u00e7\u00f5es s\u00e3o altamente adapt\u00e1veis \u200b\u200be adaptadas para atender \u00e0s necessidades espec\u00edficas de cada cliente. Eles est\u00e3o dispon\u00edveis para uso 24 horas por dia, mas tamb\u00e9m podem ser utilizados periodicamente, conforme a necessidade do cliente. Independentemente de ser adotada uma abordagem manual ou automatizada, avaliar com precis\u00e3o a efic\u00e1cia das opera\u00e7\u00f5es de seguran\u00e7a pode ser uma tarefa dif\u00edcil. Nosso software personalizado \u00e9 projetado para simular uma ampla gama de amea\u00e7as em diversos ambientes, permitindo que nossos clientes se preparem e avaliem com efic\u00e1cia sua postura de seguran\u00e7a.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56dae3b elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"56dae3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d3bf4\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Os exerc\u00edcios de simula\u00e7\u00e3o de ataques cibern\u00e9ticos abrangem v\u00e1rios vetores de ataque, como phishing, montagem e vincula\u00e7\u00e3o de malware, inje\u00e7\u00e3o de SQL, ataques distribu\u00eddos de nega\u00e7\u00e3o de servi\u00e7o (DDOS) e outras explora\u00e7\u00f5es. Esses exerc\u00edcios oferecem insights mais profundos ao Diretor de Seguran\u00e7a da Informa\u00e7\u00e3o (CISO), ao Diretor Financeiro (CFO) e ao Diretor Executivo (CEO), capacitando-os a aprimorar as defesas de seguran\u00e7a da organiza\u00e7\u00e3o.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26d5db0 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"26d5db0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d416c\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left h3\"  > O que \u00e9 simula\u00e7\u00e3o de ataque cibern\u00e9tico?<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c4a324 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"7c4a324\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d46e4\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Nossa abordagem envolve pensar como agentes de amea\u00e7as mal-intencionados, a fim de discernir oportunidades explor\u00e1veis. Utilizamos informa\u00e7\u00f5es dispon\u00edveis publicamente para obter insights do ponto de vista de um hacker, indo al\u00e9m dos limites dos testes de penetra\u00e7\u00e3o convencionais. Esta estrat\u00e9gia permite-nos apreciar a import\u00e2ncia estrat\u00e9gica das t\u00e1cticas, activos, factores geogr\u00e1ficos e outras considera\u00e7\u00f5es que s\u00e3o importantes para os hackers. Ao faz\u00ea-lo, simplificamos o processo de identifica\u00e7\u00e3o de pontos fracos de seguran\u00e7a nos mecanismos de defesa de uma organiza\u00e7\u00e3o, especialmente ao salvaguardar os seus activos mais valiosos.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2e6020 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"a2e6020\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d4c2b\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Que tal entender sua posi\u00e7\u00e3o de amea\u00e7a? Vamos organizar uma simula\u00e7\u00e3o confidencial de ataque cibern\u00e9tico agora.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-47002a3 elementor-reverse-tablet elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"47002a3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;startDelay&quot;:300,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;y&quot;:&quot;40px&quot;,&quot;opacity&quot;:0},&quot;animations&quot;:{&quot;y&quot;:&quot;0px&quot;,&quot;opacity&quot;:1}}\" class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ea88136\" data-id=\"ea88136\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9b5b5a6 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"9b5b5a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d514c\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Por que simula\u00e7\u00f5es de ataques Cibern\u00e9ticos?<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3be6591 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3be6591\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-82ea3dd\" data-id=\"82ea3dd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9b74fc4 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"9b74fc4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"64\" height=\"64\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 64 64&#039;%2F%3E\" class=\"attachment-full size-full wp-image-32609 ld-lazyload\" alt=\"evaluation\" data-src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2023\/12\/evaluation.png\" data-aspect=\"1\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Avalia\u00e7\u00e3o realista<\/h3><p class=\"elementor-image-box-description\">Uncover Unnoticed Vulnerabilities and Weaknesses Not Evident via Conventional Security Methods.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-3427b05\" data-id=\"3427b05\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9352fa7 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"9352fa7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"64\" height=\"64\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 64 64&#039;%2F%3E\" class=\"attachment-full size-full wp-image-32613 ld-lazyload\" alt=\"response\" data-src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2023\/12\/response.png\" data-aspect=\"1\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Resposta aprimorada a incidentes<\/h3><p class=\"elementor-image-box-description\">Avalie e melhore a profici\u00eancia na resposta a incidentes, obtendo insights valiosos sobre a efic\u00e1cia do gerenciamento de amea\u00e7as.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-0f61355\" data-id=\"0f61355\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8143a63 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"8143a63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 64 64&#039;%2F%3E\" class=\"attachment-full size-full wp-image-32615 ld-lazyload\" alt=\"risk-management\" data-src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2023\/12\/risk-management.png\" data-aspect=\"1\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Gest\u00e3o Proativa de Riscos<\/h3><p class=\"elementor-image-box-description\">\nTome medidas preventivas para descobrir e mitigar pontos fracos de seguran\u00e7a antes da explora\u00e7\u00e3o por atores reais de amea\u00e7as.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-190c77a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"190c77a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-3d5f7ed\" data-id=\"3d5f7ed\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d6e0f7e elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"d6e0f7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 64 64&#039;%2F%3E\" class=\"attachment-full size-full wp-image-32510 ld-lazyload\" alt=\"it-support\" data-src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2023\/12\/it-support.png\" data-aspect=\"1\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Conscientiza\u00e7\u00e3o de seguran\u00e7a aprimorada<\/h3><p class=\"elementor-image-box-description\">\nPromova a conscientiza\u00e7\u00e3o dos funcion\u00e1rios sobre diversas amea\u00e7as cibern\u00e9ticas e estrat\u00e9gias de ataque.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-6919270\" data-id=\"6919270\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-29ed9d2 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"29ed9d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 64 64&#039;%2F%3E\" class=\"attachment-full size-full wp-image-32620 ld-lazyload\" alt=\"compliant\" data-src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2023\/12\/compliant.png\" data-aspect=\"1\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Ader\u00eancia \u00e0 Conformidade<\/h3><p class=\"elementor-image-box-description\">As simula\u00e7\u00f5es de ataques cibern\u00e9ticos ajudam a verificar se as medidas de seguran\u00e7a cumprem os regulamentos e padr\u00f5es do setor.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-6c06f65\" data-id=\"6c06f65\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8100405 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8100405\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-be59b8a\" data-id=\"be59b8a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-088b1c6 elementor-widget__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"088b1c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d5670\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Clientela<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0f633e0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0f633e0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e5f69bd\" data-id=\"e5f69bd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-09c66dc elementor-section-full_width elementor-section-height-min-height elementor-section-height-default\" data-id=\"09c66dc\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;opacity&quot;:0},&quot;animations&quot;:{&quot;opacity&quot;:1}}\" class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-365981b\" data-id=\"365981b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-971ed35 elementor-widget elementor-widget-image\" data-id=\"971ed35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2022\/06\/brand-08.png\" title=\"brand-08\" alt=\"brand-08\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;startDelay&quot;:100,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;opacity&quot;:0},&quot;animations&quot;:{&quot;opacity&quot;:1}}\" class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-78b561b\" data-id=\"78b561b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd9d206 elementor-widget elementor-widget-image\" data-id=\"dd9d206\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2022\/06\/brand-09_czdynf.png\" title=\"brand-09_czdynf\" alt=\"brand-09_czdynf\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;startDelay&quot;:200,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;opacity&quot;:0},&quot;animations&quot;:{&quot;opacity&quot;:1}}\" class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-cb79acd\" data-id=\"cb79acd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5fe3569 elementor-widget elementor-widget-image\" data-id=\"5fe3569\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2022\/06\/brand25.png\" title=\"brand25\" alt=\"brand25\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;startDelay&quot;:300,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;opacity&quot;:0},&quot;animations&quot;:{&quot;opacity&quot;:1}}\" class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-1730310\" data-id=\"1730310\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-be556be elementor-widget elementor-widget-image\" data-id=\"be556be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2023\/10\/medicare.png\" title=\"medicare\" alt=\"medicare\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3132c99 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3132c99\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4c3e427\" data-id=\"4c3e427\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c880cf6 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default\" data-id=\"c880cf6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;opacity&quot;:0},&quot;animations&quot;:{&quot;opacity&quot;:1}}\" class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-1836973\" data-id=\"1836973\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6e34c37 elementor-widget elementor-widget-image\" data-id=\"6e34c37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"113\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 200 113&#039;%2F%3E\" class=\"attachment-full size-full wp-image-28584 ld-lazyload\" alt=\"bankentier\" data-src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2023\/10\/bankentier.png\" data-aspect=\"1.7699115044248\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;startDelay&quot;:100,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;opacity&quot;:0},&quot;animations&quot;:{&quot;opacity&quot;:1}}\" class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-a61c8ba\" data-id=\"a61c8ba\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d115d23 elementor-widget elementor-widget-image\" data-id=\"d115d23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"113\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 200 113&#039;%2F%3E\" class=\"attachment-full size-full wp-image-14708 ld-lazyload\" alt=\"web summit\" data-src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2022\/06\/brand-25.png\" data-aspect=\"1.7699115044248\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;startDelay&quot;:200,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;opacity&quot;:0},&quot;animations&quot;:{&quot;opacity&quot;:1}}\" class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-051d8ae\" data-id=\"051d8ae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-786ce15 elementor-widget elementor-widget-image\" data-id=\"786ce15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"113\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 200 113&#039;%2F%3E\" class=\"attachment-full size-full wp-image-28588 ld-lazyload\" alt=\"iberdola\" data-src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2023\/10\/iberdola.png\" data-aspect=\"1.7699115044248\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;startDelay&quot;:300,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;opacity&quot;:0},&quot;animations&quot;:{&quot;opacity&quot;:1}}\" class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-094274e\" data-id=\"094274e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24b858a elementor-widget elementor-widget-image\" data-id=\"24b858a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"113\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 200 113&#039;%2F%3E\" class=\"attachment-full size-full wp-image-28592 ld-lazyload\" alt=\"endesa\" data-src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2023\/10\/endesa.png\" data-aspect=\"1.7699115044248\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dd21a78 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dd21a78\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3843bca\" data-id=\"3843bca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8e47c2d elementor-section-full_width elementor-section-height-min-height elementor-section-height-default\" data-id=\"8e47c2d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;opacity&quot;:0},&quot;animations&quot;:{&quot;opacity&quot;:1}}\" class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-c4f630e\" data-id=\"c4f630e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d93df92 elementor-widget elementor-widget-image\" data-id=\"d93df92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"113\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 200 113&#039;%2F%3E\" class=\"attachment-full size-full wp-image-15093 ld-lazyload\" alt=\"brand27\" data-src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2022\/06\/brand27.png\" data-aspect=\"1.7699115044248\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;startDelay&quot;:100,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;opacity&quot;:0},&quot;animations&quot;:{&quot;opacity&quot;:1}}\" class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-cd1047a\" data-id=\"cd1047a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3f4eba5 elementor-widget elementor-widget-image\" data-id=\"3f4eba5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"113\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 200 113&#039;%2F%3E\" class=\"attachment-full size-full wp-image-15098 ld-lazyload\" alt=\"vodafone\" data-src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2022\/06\/brand40.png\" data-aspect=\"1.7699115044248\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;startDelay&quot;:200,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;opacity&quot;:0},&quot;animations&quot;:{&quot;opacity&quot;:1}}\" class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-33e30a1\" data-id=\"33e30a1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41f370f elementor-widget elementor-widget-image\" data-id=\"41f370f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"113\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 200 113&#039;%2F%3E\" class=\"attachment-full size-full wp-image-15103 ld-lazyload\" alt=\"brand39\" data-src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2022\/06\/brand39.png\" data-aspect=\"1.7699115044248\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;startDelay&quot;:300,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;opacity&quot;:0},&quot;animations&quot;:{&quot;opacity&quot;:1}}\" class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-db1b0f5\" data-id=\"db1b0f5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-457ec5b elementor-widget elementor-widget-image\" data-id=\"457ec5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"113\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 200 113&#039;%2F%3E\" class=\"attachment-full size-full wp-image-28593 ld-lazyload\" alt=\"clientele\" data-src=\"https:\/\/edibbee.com\/wp-content\/uploads\/2023\/10\/clientele.png\" data-aspect=\"1.7699115044248\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3b7b7b7 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"3b7b7b7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-871e8ae\" data-id=\"871e8ae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41ffebf elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"41ffebf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d5b97\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Tem uma ideia em mente? <span style=\"font-family: Playfair Display, palatino, serif;font-weight: bold\"><em>Fale connosco hoje. <\/em><\/span><\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf82272 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"bf82272\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d61ca\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Uma sess\u00e3o de estrat\u00e9gia \u00e9 perfeita para:<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa40bb0 elementor-widget elementor-widget-spacer\" data-id=\"aa40bb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e204eb9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e204eb9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1671b72\" data-id=\"1671b72\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a9ad95 elementor-widget elementor-widget-ld_list\" data-id=\"5a9ad95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\n\t\t<div class=\"lqd-bullet-list\">\n\t\t\t<ul class=\"bullet-list-ul reset-ul \">\n\t\t\t\t\t\t\t\t\t\t<li class=\"d-flex align-items-center\"> Simula\u00e7\u00f5es aut\u00f4nomas de ataques cibern\u00e9ticos, imitando t\u00e1ticas genu\u00ednas de hackers.<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"d-flex align-items-center\">Recomenda\u00e7\u00f5es de remedia\u00e7\u00e3o focadas e acion\u00e1veis.<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"d-flex align-items-center\"> Aumentando a conscientiza\u00e7\u00e3o sobre seguran\u00e7a entre o pessoal.<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"d-flex align-items-center\">Atualiza\u00e7\u00f5es consistentes sobre amea\u00e7as em evolu\u00e7\u00e3o.<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"d-flex align-items-center\"> Avalia\u00e7\u00e3o de riscos cont\u00ednuos e implementa\u00e7\u00e3o de estrat\u00e9gias de mitiga\u00e7\u00e3o para salvaguardar a organiza\u00e7\u00e3o.<\/li>\n\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e749d89\" data-id=\"e749d89\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c4bc8be elementor-widget elementor-widget-html\" data-id=\"c4bc8be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js\"><\/script><script>hbspt.forms.create({\n    region: \"eu1\",\n    portalId: \"25746799\",\n    formId: \"2c47fdcc-49cc-467a-8459-e63aac673ed3\"\n  });\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1a1662a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1a1662a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ba3fef5\" data-id=\"ba3fef5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8730944 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8730944\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-8c9b816\" data-id=\"8c9b816\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-adda3b4 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"adda3b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e089c1d6c6b\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Perguntas Frequentes<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ef534b9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ef534b9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-8c69d99\" data-id=\"8c69d99\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-55c5de6 elementor-widget elementor-widget-ld_accordion\" data-id=\"55c5de6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"accordion accordion-title-bordered accordion-sm accordion-side-spacing accordion-title-bg-transparent accordion-title-circle accordion-active-has-shadow accordion-active-has-fill\" id=\"accordion-69e089c1d8eb9\" role=\"tablist\" aria-multiselectable=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel  active\">\n\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-8991\">\n\t\t\t\t<h4 class=\"accordion-title  tabindex=\"-1\">\t\t\t\t\t<a class=\"\" role=\"button\" data-toggle=\"collapse\" data-bs-toggle=\"collapse\"\n                    tabindex=\"0\"\n\t\t\t\t\tdata-parent=\"#accordion-69e089c1d8eb9\" data-bs-parent=\"#accordion-69e089c1d8eb9\" href=\"#collapse-8991\" data-target=\"#collapse-8991\" data-bs-target=\"#collapse-8991\"\n\t\t\t\t\taria-expanded=\"true\" aria-controls=\"collapse-8991\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">1. Por que a simula\u00e7\u00e3o de ataques cibern\u00e9ticos \u00e9 importante?<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"lqd-icn-ess icon-ion-ios-add\"><\/i><i class=\"lqd-icn-ess icon-ion-ios-remove\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\t\t\t\t<\/div>\n\n\t\t\t\t<div id=\"collapse-8991\" class=\"accordion-collapse collapse  show\" data-bs-parent=\"#accordion-69e089c1d8eb9\" role=\"tabpanel\" aria-labelledby=\"heading-8991\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>As simula\u00e7\u00f5es de ataques cibern\u00e9ticos oferecem uma avalia\u00e7\u00e3o realista da postura de seguran\u00e7a de uma organiza\u00e7\u00e3o. Essas simula\u00e7\u00f5es replicam cen\u00e1rios reais de ataque, facilitando a identifica\u00e7\u00e3o de vulnerabilidades e pontos fracos que podem escapar \u00e0s medidas de seguran\u00e7a tradicionais. Desempenham um papel proativo no fortalecimento das defesas de seguran\u00e7a, melhorando as capacidades de resposta a incidentes e mitigando riscos potenciais.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-8992\">\n\t\t\t\t<h4 class=\"accordion-title  tabindex=\"-1\">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" data-bs-toggle=\"collapse\"\n                    tabindex=\"0\"\n\t\t\t\t\tdata-parent=\"#accordion-69e089c1d8eb9\" data-bs-parent=\"#accordion-69e089c1d8eb9\" href=\"#collapse-8992\" data-target=\"#collapse-8992\" data-bs-target=\"#collapse-8992\"\n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-8992\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">  2. Qual \u00e9 a diferen\u00e7a entre simula\u00e7\u00e3o de ataque cibern\u00e9tico e teste de penetra\u00e7\u00e3o?<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"lqd-icn-ess icon-ion-ios-add\"><\/i><i class=\"lqd-icn-ess icon-ion-ios-remove\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\t\t\t\t<\/div>\n\n\t\t\t\t<div id=\"collapse-8992\" class=\"accordion-collapse collapse \" data-bs-parent=\"#accordion-69e089c1d8eb9\" role=\"tabpanel\" aria-labelledby=\"heading-8992\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<div class=\"accordion-item bg-white border-0 rounded-3 shadow-sm mb-3\"><div id=\"q-3\" class=\"accordion-collapse collapse show\" data-bs-parent=\"#faq\"><div class=\"accordion-body fs-sm pt-0\"><p>A Simula\u00e7\u00e3o de Ataque Cibern\u00e9tico abrange uma avalia\u00e7\u00e3o mais ampla, replicando cen\u00e1rios de ataque do mundo real que abrangem v\u00e1rios elementos, como engenharia social, viola\u00e7\u00f5es de seguran\u00e7a f\u00edsica e ataques em v\u00e1rios est\u00e1gios. Tem como objetivo avaliar a postura geral de seguran\u00e7a da organiza\u00e7\u00e3o.<\/p><p>Por outro lado, o teste de penetra\u00e7\u00e3o tem um foco mais restrito. Concentra-se na identifica\u00e7\u00e3o e explora\u00e7\u00e3o de vulnerabilidades espec\u00edficas para obter acesso n\u00e3o autorizado, centrando os seus esfor\u00e7os em sistemas, aplica\u00e7\u00f5es ou redes individuais.<\/p><\/div><\/div><\/div>\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-8993\">\n\t\t\t\t<h4 class=\"accordion-title  tabindex=\"-1\">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" data-bs-toggle=\"collapse\"\n                    tabindex=\"0\"\n\t\t\t\t\tdata-parent=\"#accordion-69e089c1d8eb9\" data-bs-parent=\"#accordion-69e089c1d8eb9\" href=\"#collapse-8993\" data-target=\"#collapse-8993\" data-bs-target=\"#collapse-8993\"\n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-8993\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">3. Quais servi\u00e7os voc\u00eas oferecem em simula\u00e7\u00e3o de ataques cibern\u00e9ticos?<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"lqd-icn-ess icon-ion-ios-add\"><\/i><i class=\"lqd-icn-ess icon-ion-ios-remove\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\t\t\t\t<\/div>\n\n\t\t\t\t<div id=\"collapse-8993\" class=\"accordion-collapse collapse \" data-bs-parent=\"#accordion-69e089c1d8eb9\" role=\"tabpanel\" aria-labelledby=\"heading-8993\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>Fornecemos uma ampla gama de servi\u00e7os de avalia\u00e7\u00e3o de seguran\u00e7a projetados para fortalecer as defesas de uma organiza\u00e7\u00e3o. Nossas ofertas abrangem campanhas simuladas de phishing, avalia\u00e7\u00f5es de engenharia social, avalia\u00e7\u00f5es de seguran\u00e7a f\u00edsica, testes de penetra\u00e7\u00e3o de rede, testes de seguran\u00e7a de aplicativos e exerc\u00edcios abrangentes de red teaming.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-8994\">\n\t\t\t\t<h4 class=\"accordion-title  tabindex=\"-1\">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" data-bs-toggle=\"collapse\"\n                    tabindex=\"0\"\n\t\t\t\t\tdata-parent=\"#accordion-69e089c1d8eb9\" data-bs-parent=\"#accordion-69e089c1d8eb9\" href=\"#collapse-8994\" data-target=\"#collapse-8994\" data-bs-target=\"#collapse-8994\"\n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-8994\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">  4. Com que frequ\u00eancia devem ser realizadas simula\u00e7\u00f5es de ataques cibern\u00e9ticos?<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"lqd-icn-ess icon-ion-ios-add\"><\/i><i class=\"lqd-icn-ess icon-ion-ios-remove\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\t\t\t\t<\/div>\n\n\t\t\t\t<div id=\"collapse-8994\" class=\"accordion-collapse collapse \" data-bs-parent=\"#accordion-69e089c1d8eb9\" role=\"tabpanel\" aria-labelledby=\"heading-8994\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>A frequ\u00eancia das simula\u00e7\u00f5es de ataques cibern\u00e9ticos depende de v\u00e1rios fatores, incluindo o setor da organiza\u00e7\u00e3o, a exposi\u00e7\u00e3o ao risco, as obriga\u00e7\u00f5es regulat\u00f3rias e o ambiente de amea\u00e7as em constante mudan\u00e7a. Embora seja recomendado um ciclo anual m\u00ednimo, as entidades com riscos de seguran\u00e7a elevados ou mandatos de conformidade rigorosos podem optar por avalia\u00e7\u00f5es trimestrais ou semestrais para manter uma postura de seguran\u00e7a consistentemente robusta.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-8995\">\n\t\t\t\t<h4 class=\"accordion-title  tabindex=\"-1\">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" data-bs-toggle=\"collapse\"\n                    tabindex=\"0\"\n\t\t\t\t\tdata-parent=\"#accordion-69e089c1d8eb9\" data-bs-parent=\"#accordion-69e089c1d8eb9\" href=\"#collapse-8995\" data-target=\"#collapse-8995\" data-bs-target=\"#collapse-8995\"\n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-8995\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">5. De que forma os especialistas em simula\u00e7\u00e3o de ataques cibern\u00e9ticos da Edibbee podem beneficiar o seu neg\u00f3cio?<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"lqd-icn-ess icon-ion-ios-add\"><\/i><i class=\"lqd-icn-ess icon-ion-ios-remove\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\t\t\t\t<\/div>\n\n\t\t\t\t<div id=\"collapse-8995\" class=\"accordion-collapse collapse \" data-bs-parent=\"#accordion-69e089c1d8eb9\" role=\"tabpanel\" aria-labelledby=\"heading-8995\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>A equipe de especialistas da Edibbee orquestra ataques cibern\u00e9ticos controlados em sua organiza\u00e7\u00e3o, com a inten\u00e7\u00e3o de penetrar na infraestrutura, assumir o controle sobre alvos espec\u00edficos e extra\u00ed-los com seguran\u00e7a. Este processo revela o impacto potencial das vulnerabilidades que v\u00e3o desde a tecnologia at\u00e9 a conscientiza\u00e7\u00e3o dos funcion\u00e1rios em seu neg\u00f3cio.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-8996\">\n\t\t\t\t<h4 class=\"accordion-title  tabindex=\"-1\">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" data-bs-toggle=\"collapse\"\n                    tabindex=\"0\"\n\t\t\t\t\tdata-parent=\"#accordion-69e089c1d8eb9\" data-bs-parent=\"#accordion-69e089c1d8eb9\" href=\"#collapse-8996\" data-target=\"#collapse-8996\" data-bs-target=\"#collapse-8996\"\n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-8996\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">6. \u00c9 poss\u00edvel adaptar os servi\u00e7os de simula\u00e7\u00e3o de ataques cibern\u00e9ticos para se alinharem aos meus requisitos comerciais exclusivos?<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"lqd-icn-ess icon-ion-ios-add\"><\/i><i class=\"lqd-icn-ess icon-ion-ios-remove\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\t\t\t\t<\/div>\n\n\t\t\t\t<div id=\"collapse-8996\" class=\"accordion-collapse collapse \" data-bs-parent=\"#accordion-69e089c1d8eb9\" role=\"tabpanel\" aria-labelledby=\"heading-8996\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>Com certeza, nossos servi\u00e7os de simula\u00e7\u00e3o de ataques cibern\u00e9ticos podem ser adaptados para atender \u00e0s suas necessidades comerciais distintas. Reconhecemos que cada organiza\u00e7\u00e3o possui demandas de seguran\u00e7a \u00fanicas, influenciadas por seu setor, mandatos regulat\u00f3rios e toler\u00e2ncia a riscos. Como resultado, fornecemos solu\u00e7\u00f5es personalizadas para se alinhar aos objetivos e necessidades de seguran\u00e7a precisos da sua organiza\u00e7\u00e3o.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-8997\">\n\t\t\t\t<h4 class=\"accordion-title  tabindex=\"-1\">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" data-bs-toggle=\"collapse\"\n                    tabindex=\"0\"\n\t\t\t\t\tdata-parent=\"#accordion-69e089c1d8eb9\" data-bs-parent=\"#accordion-69e089c1d8eb9\" href=\"#collapse-8997\" data-target=\"#collapse-8997\" data-bs-target=\"#collapse-8997\"\n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-8997\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">7. O que \u00e9 uma simula\u00e7\u00e3o de ataque cibern\u00e9tico?<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"lqd-icn-ess icon-ion-ios-add\"><\/i><i class=\"lqd-icn-ess icon-ion-ios-remove\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\t\t\t\t<\/div>\n\n\t\t\t\t<div id=\"collapse-8997\" class=\"accordion-collapse collapse \" data-bs-parent=\"#accordion-69e089c1d8eb9\" role=\"tabpanel\" aria-labelledby=\"heading-8997\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>? Numa simula\u00e7\u00e3o de ataque cibern\u00e9tico, uma organiza\u00e7\u00e3o (e os seus parceiros de seguran\u00e7a) emula um hack real contra a sua pr\u00f3pria rede, infraestrutura e ativos utilizando as ferramentas, t\u00e1ticas e procedimentos (TTPs) de criminosos cibern\u00e9ticos conhecidos.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-8998\">\n\t\t\t\t<h4 class=\"accordion-title  tabindex=\"-1\">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" data-bs-toggle=\"collapse\"\n                    tabindex=\"0\"\n\t\t\t\t\tdata-parent=\"#accordion-69e089c1d8eb9\" data-bs-parent=\"#accordion-69e089c1d8eb9\" href=\"#collapse-8998\" data-target=\"#collapse-8998\" data-bs-target=\"#collapse-8998\"\n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-8998\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">8. O que \u00e9 um ataque simulado?<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"lqd-icn-ess icon-ion-ios-add\"><\/i><i class=\"lqd-icn-ess icon-ion-ios-remove\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\t\t\t\t<\/div>\n\n\t\t\t\t<div id=\"collapse-8998\" class=\"accordion-collapse collapse \" data-bs-parent=\"#accordion-69e089c1d8eb9\" role=\"tabpanel\" aria-labelledby=\"heading-8998\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>Simula\u00e7\u00f5es de viola\u00e7\u00e3o e ataque s\u00e3o um m\u00e9todo avan\u00e7ado de teste de seguran\u00e7a de computador. Essas simula\u00e7\u00f5es identificam vulnerabilidades em ambientes de seguran\u00e7a, imitando os prov\u00e1veis \u200b\u200bcaminhos e t\u00e9cnicas de ataque usadas por agentes mal-intencionados.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ataque Cibern\u00e9tico Simula\u00e7\u00e3o Identifica\u00e7\u00e3o proativa de vulnerabilidades de seguran\u00e7a por meio de simula\u00e7\u00e3o de ataque cibern\u00e9tico Numa era marcada pela escalada de amea\u00e7as cibern\u00e9ticas, garantir uma prote\u00e7\u00e3o abrangente tornou-se uma preocupa\u00e7\u00e3o primordial para os profissionais. Com os ataques cibern\u00e9ticos a crescerem em complexidade e aud\u00e1cia, estes representam n\u00e3o s\u00f3 riscos financeiros, mas tamb\u00e9m o potencial [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-34895","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Solu\u00e7\u00f5es de simula\u00e7\u00e3o de ataques cibern\u00e9ticos protegem sua rede | Edibbee<\/title>\n<meta name=\"description\" content=\"Edibbee oferece solu\u00e7\u00f5es de simula\u00e7\u00e3o de ataques cibern\u00e9ticos para proteger sua rede. Proteja sua infraestrutura contra amea\u00e7as com nossos servi\u00e7os abrangentes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/edibbee.com\/pt-pt\/simulacao-de-ataque-cibernetico\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Solu\u00e7\u00f5es de simula\u00e7\u00e3o de ataques cibern\u00e9ticos protegem sua rede | Edibbee\" \/>\n<meta property=\"og:description\" content=\"Edibbee oferece solu\u00e7\u00f5es de simula\u00e7\u00e3o de ataques cibern\u00e9ticos para proteger sua rede. Proteja sua infraestrutura contra amea\u00e7as com nossos servi\u00e7os abrangentes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/edibbee.com\/pt-pt\/simulacao-de-ataque-cibernetico\/\" \/>\n<meta property=\"og:site_name\" content=\"Edibbee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/edibbee\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-29T15:36:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/edibbee.com\/wp-content\/uploads\/2023\/10\/cybersecurity-exercise2.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/edibbee.com\\\/pt-pt\\\/simulacao-de-ataque-cibernetico\\\/\",\"url\":\"https:\\\/\\\/edibbee.com\\\/pt-pt\\\/simulacao-de-ataque-cibernetico\\\/\",\"name\":\"Solu\u00e7\u00f5es de simula\u00e7\u00e3o de ataques cibern\u00e9ticos protegem sua rede | Edibbee\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/edibbee.com\\\/pt-pt\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/edibbee.com\\\/pt-pt\\\/simulacao-de-ataque-cibernetico\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/edibbee.com\\\/pt-pt\\\/simulacao-de-ataque-cibernetico\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/edibbee.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/cybersecurity-exercise2.png\",\"datePublished\":\"2023-10-27T09:06:16+00:00\",\"dateModified\":\"2024-05-29T15:36:17+00:00\",\"description\":\"Edibbee oferece solu\u00e7\u00f5es de simula\u00e7\u00e3o de ataques cibern\u00e9ticos para proteger sua rede. Proteja sua infraestrutura contra amea\u00e7as com nossos servi\u00e7os abrangentes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/edibbee.com\\\/pt-pt\\\/simulacao-de-ataque-cibernetico\\\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/edibbee.com\\\/pt-pt\\\/simulacao-de-ataque-cibernetico\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/edibbee.com\\\/pt-pt\\\/simulacao-de-ataque-cibernetico\\\/#primaryimage\",\"url\":\"https:\\\/\\\/edibbee.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/cybersecurity-exercise2.png\",\"contentUrl\":\"https:\\\/\\\/edibbee.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/cybersecurity-exercise2.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/edibbee.com\\\/pt-pt\\\/simulacao-de-ataque-cibernetico\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/edibbee.com\\\/pt-pt\\\/edibbee\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Simula\u00e7\u00e3o de Ataque Cibern\u00e9tico\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/edibbee.com\\\/pt-pt\\\/#website\",\"url\":\"https:\\\/\\\/edibbee.com\\\/pt-pt\\\/\",\"name\":\"Edibbee\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/edibbee.com\\\/pt-pt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Solu\u00e7\u00f5es de simula\u00e7\u00e3o de ataques cibern\u00e9ticos protegem sua rede | Edibbee","description":"Edibbee oferece solu\u00e7\u00f5es de simula\u00e7\u00e3o de ataques cibern\u00e9ticos para proteger sua rede. Proteja sua infraestrutura contra amea\u00e7as com nossos servi\u00e7os abrangentes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/edibbee.com\/pt-pt\/simulacao-de-ataque-cibernetico\/","og_locale":"pt_PT","og_type":"article","og_title":"Solu\u00e7\u00f5es de simula\u00e7\u00e3o de ataques cibern\u00e9ticos protegem sua rede | Edibbee","og_description":"Edibbee oferece solu\u00e7\u00f5es de simula\u00e7\u00e3o de ataques cibern\u00e9ticos para proteger sua rede. Proteja sua infraestrutura contra amea\u00e7as com nossos servi\u00e7os abrangentes.","og_url":"https:\/\/edibbee.com\/pt-pt\/simulacao-de-ataque-cibernetico\/","og_site_name":"Edibbee","article_publisher":"https:\/\/www.facebook.com\/edibbee\/","article_modified_time":"2024-05-29T15:36:17+00:00","og_image":[{"url":"https:\/\/edibbee.com\/wp-content\/uploads\/2023\/10\/cybersecurity-exercise2.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Tempo estimado de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/edibbee.com\/pt-pt\/simulacao-de-ataque-cibernetico\/","url":"https:\/\/edibbee.com\/pt-pt\/simulacao-de-ataque-cibernetico\/","name":"Solu\u00e7\u00f5es de simula\u00e7\u00e3o de ataques cibern\u00e9ticos protegem sua rede | Edibbee","isPartOf":{"@id":"https:\/\/edibbee.com\/pt-pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/edibbee.com\/pt-pt\/simulacao-de-ataque-cibernetico\/#primaryimage"},"image":{"@id":"https:\/\/edibbee.com\/pt-pt\/simulacao-de-ataque-cibernetico\/#primaryimage"},"thumbnailUrl":"https:\/\/edibbee.com\/wp-content\/uploads\/2023\/10\/cybersecurity-exercise2.png","datePublished":"2023-10-27T09:06:16+00:00","dateModified":"2024-05-29T15:36:17+00:00","description":"Edibbee oferece solu\u00e7\u00f5es de simula\u00e7\u00e3o de ataques cibern\u00e9ticos para proteger sua rede. Proteja sua infraestrutura contra amea\u00e7as com nossos servi\u00e7os abrangentes.","breadcrumb":{"@id":"https:\/\/edibbee.com\/pt-pt\/simulacao-de-ataque-cibernetico\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/edibbee.com\/pt-pt\/simulacao-de-ataque-cibernetico\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/edibbee.com\/pt-pt\/simulacao-de-ataque-cibernetico\/#primaryimage","url":"https:\/\/edibbee.com\/wp-content\/uploads\/2023\/10\/cybersecurity-exercise2.png","contentUrl":"https:\/\/edibbee.com\/wp-content\/uploads\/2023\/10\/cybersecurity-exercise2.png"},{"@type":"BreadcrumbList","@id":"https:\/\/edibbee.com\/pt-pt\/simulacao-de-ataque-cibernetico\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/edibbee.com\/pt-pt\/edibbee\/"},{"@type":"ListItem","position":2,"name":"Simula\u00e7\u00e3o de Ataque Cibern\u00e9tico"}]},{"@type":"WebSite","@id":"https:\/\/edibbee.com\/pt-pt\/#website","url":"https:\/\/edibbee.com\/pt-pt\/","name":"Edibbee","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/edibbee.com\/pt-pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"}]}},"_links":{"self":[{"href":"https:\/\/edibbee.com\/pt-pt\/wp-json\/wp\/v2\/pages\/34895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edibbee.com\/pt-pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/edibbee.com\/pt-pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/edibbee.com\/pt-pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/edibbee.com\/pt-pt\/wp-json\/wp\/v2\/comments?post=34895"}],"version-history":[{"count":1,"href":"https:\/\/edibbee.com\/pt-pt\/wp-json\/wp\/v2\/pages\/34895\/revisions"}],"predecessor-version":[{"id":34905,"href":"https:\/\/edibbee.com\/pt-pt\/wp-json\/wp\/v2\/pages\/34895\/revisions\/34905"}],"wp:attachment":[{"href":"https:\/\/edibbee.com\/pt-pt\/wp-json\/wp\/v2\/media?parent=34895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}