The importance of information security in corporate information technology companies has the primary objective of proposing security measures to protect information in corporate information technology companies. In this sense, the research is a qualitative research, exploratory and descriptive, as it is based on the search for bibliographic material that makes it possible to suggest security measures for the protection of information. Secondary data were collected systematically, looking for the keyword - security measures and their synonyms. The search was carried out in computerized databases, such as Google Acadêmico® and the Portal de Periódicos Capes. A set of suggestions for security measures that enable corporate companies in the field of Information Technology to take advantage of has been identified. It is highlighted as a conclusion that the proposed preventive, detective and corrective measures must be involved in a security and contingency plan disseminated throughout the organization.
CERT.br. (2012). Cartilha de Segurançapara Internet: Interceptação de tráfego (Sniffing). 4.0-Versão. São Paulo. Retrieved from http://cartilha.cert.br/.
Coopamootoo, K. (2018). Cyber Security: Privacidade online e offline. [vídeo]. Newcastle University. Retrieved from
https://www.futurelearn.com/courses/cyber-security/0/steps/19596.
Creswell, J. W. (2010) Projeto de pesquisa métodos qualitativo, quantitativo e misto. In: Projeto de pesquisa métodos qualitativo, quantitativo e misto.
Financial Fraud Action UK. (2017). Fraud The Facts: This category covers fraud on cards that have been. Retrieved from
https://www.financialfraudaction.org.uk/fraudfacts17/assets/fraud_the_facts.pdf.
Futurelearn. (2018a). Cyber Security: Riscos pessoais decorrentes de violação de privacidade nos negócios. [vídeo]. Newcastle University. Retrieved from https://www.futurelearn.com/courses/cyber-security/0/steps/19598.
Futurelearn (2018b) Cyber Security for Small and Medium Enterprises: What can we learn from this attack? Universidade Deakin. Retrieved from https://www.futurelearn.com/courses/cyber-security-business#what-is-upgrade.
Gonsalez. Y. J. (2011) Que es Protocolo SET. Universidad de le Salle. Retrieved from https://www.researchgate.net/publication/261551164_QUE_ES_PROTOCOLO_SET
Martinelli, H. (2008). Vírus de Celular: Estudo e classificação para um protótipo de defesa: O início das ameaças: Quanto às formas de propagação mais comuns temos. Uniritter. Brasil - RS, Porto Alegre.
Laureano, M. A. P. (2005) Gestão de segurança da informação. Retrieved from http://www.mlaureano.org/aulas_material/gst/apostila_versao_20.pdf.
Oficina da Net. (2015) Samsung é condenada a pagar indenização milionária a Apple. Retrieved from
Oliveira, G. (2009). Segurança de redes:As ameaças organizacionais. Escola Superior Aberta do Brasil - Vitoria - Espírito Santo.
Quissanga, F. C. (2015).Caracterização de vírus informáticos em telefonia móvel celular:Propagação e infecção.(Trabalho de conclusão do curso) Escola Superior Aberta do Brasil -ESAB - Vitoria - Espírito Santo.
Portal de periódicos capes. Missão e Objetivos. Retrieved from https://www.periodicos.capes.gov.br/index.php?option=com_pcontent&view=pcontent&alias=missao-objetivos&Itemid=144.
Terra (2016). Panama Papers. Retrieved from https://www.terra.com.br/noticias/mundo/panama-papers-geram-denuncias-e-investigacoes-em-todo-o mundo,814039f797239995dea030884e41f8faakajlviv.html.