{"id":20055,"date":"2026-02-11T15:40:53","date_gmt":"2026-02-11T18:40:53","guid":{"rendered":"https:\/\/acrisure.com.br\/insights\/?p=20055"},"modified":"2026-02-12T14:42:56","modified_gmt":"2026-02-12T17:42:56","slug":"fraudes-gift-cards-empresas","status":"publish","type":"post","link":"https:\/\/acrisure.com.br\/insights\/fraudes-gift-cards-empresas\/","title":{"rendered":"Fraudes com gift cards ganham espa\u00e7o e acendem alerta para empresas"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Post&#8221; _builder_version=&#8221;4.19.4&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Post&#8221; _builder_version=&#8221;4.27.3&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Conte\u00fado&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;1px&#8221; custom_margin=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span data-contrast=\"auto\">Fraudes de\u00a0<\/span><b><i><span data-contrast=\"auto\">Business Email\u00a0Compromise\u00a0(BEC)<\/span><\/i><\/b><span data-contrast=\"auto\">\u00a0seguem entre os principais vetores de perdas financeiras corporativas. <\/span><\/p>\n<p><span data-contrast=\"auto\">O relat\u00f3rio\u00a0<\/span><a href=\"https:\/\/www.fortra.com\/blog\/bec-global-insights-report-december-2025\" target=\"_blank\" rel=\"noopener\"><i><span data-contrast=\"none\">Fortra\u2019s\u00a0December\u00a02025 BEC Global Insights<\/span><\/i><\/a><span data-contrast=\"auto\">\u00a0indica uma mudan\u00e7a relevante: golpes envolvendo\u00a0<\/span><b><i><span data-contrast=\"auto\">gift\u00a0cards<\/span><\/i><\/b><b><span data-contrast=\"auto\">\u00a0passaram a liderar esse tipo de ataque<\/span><\/b><span data-contrast=\"auto\">, sinalizando uma evolu\u00e7\u00e3o na forma como criminosos exploram processos internos e rotinas de trabalho.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Como funcionam os\u00a0BEC\u00a0scams\u00a0hoje<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">BEC \u00e9 um tipo de fraude baseado em\u00a0<\/span><b><span data-contrast=\"auto\">engenharia social<\/span><\/b><span data-contrast=\"auto\">. O atacante se passa por um\u00a0<\/span><b><span data-contrast=\"auto\">executivo, gestor ou parceiro<\/span><\/b><span data-contrast=\"auto\">\u00a0e solicita uma\u00a0<\/span><b><span data-contrast=\"auto\">a\u00e7\u00e3o financeira fora do fluxo<\/span><\/b><span data-contrast=\"auto\">\u00a0habitual.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Nos casos mais recentes, o pedido costuma envolver a\u00a0<\/span><b><span data-contrast=\"auto\">compra urgente de\u00a0gift\u00a0cards e o envio dos c\u00f3digos por e-mail ou mensagem<\/span><\/b><span data-contrast=\"auto\">. A escolha desse formato n\u00e3o \u00e9 aleat\u00f3ria:\u00a0cart\u00f5es-presente\u00a0s\u00e3o\u00a0<\/span><b><span data-contrast=\"auto\">f\u00e1ceis de adquirir, dif\u00edceis de rastrear e rapidamente convertidos em dinheiro<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">O sucesso desse tipo de fraude est\u00e1\u00a0<\/span><b><span data-contrast=\"auto\">menos relacionado a falhas tecnol\u00f3gicas e mais \u00e0 din\u00e2mica organizacional<\/span><\/b><span data-contrast=\"auto\">. Os ataques costumam explorar:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">rela\u00e7\u00f5es de confian\u00e7a e hierarquia;<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">senso de urg\u00eancia em decis\u00f5es operacionais;<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">lacunas em processos de valida\u00e7\u00e3o.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Quando\u00a0<\/span><b><span data-contrast=\"auto\">o pedido parece compat\u00edvel\u00a0com a rotina<\/span><\/b><span data-contrast=\"auto\">\u00a0da empresa, a chance de verifica\u00e7\u00e3o diminui.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">A rela\u00e7\u00e3o entre phishing e BEC<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Ataques de BEC raramente acontecem de forma isolada. Em muitos casos, s\u00e3o precedidos por campanhas de\u00a0phishing\u00a0que\u00a0<\/span><b><span data-contrast=\"auto\">ajudam a\u00a0mapear estruturas internas, h\u00e1bitos de comunica\u00e7\u00e3o e pap\u00e9is organizacionais<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Dados da Kaspersky indicam que\u00a0<\/span><b><span data-contrast=\"auto\">43% das pequenas e m\u00e9dias empresas da Am\u00e9rica Latina j\u00e1 sofreram\u00a0phishing<\/span><\/b><span data-contrast=\"auto\">, com o Brasil liderando em volume de tentativas na regi\u00e3o. Esse contexto ajuda a explicar por que fraudes mais direcionadas, como BEC, encontram um\u00a0<\/span><b><span data-contrast=\"auto\">ambiente favor\u00e1vel para evoluir<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Esse encadeamento mostra que\u00a0<\/span><b><span data-contrast=\"auto\">o risco n\u00e3o est\u00e1 apenas no ataque final, mas na sequ\u00eancia de eventos que o torna vi\u00e1vel.<\/span><\/b><br \/><i><\/i><\/p>\n<h4><i><span data-contrast=\"none\">Leia tamb\u00e9m:<\/span><\/i><\/h4>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><a href=\"https:\/\/acrisure.com.br\/insights\/shadow-data\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Shadow data: o risco invis\u00edvel que amplia incidentes cibern\u00e9ticos<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><a href=\"https:\/\/acrisure.com.br\/insights\/seguro-cibernetico-incidentes\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Gest\u00e3o de sinistros cibern\u00e9tico e maturidade em seguran\u00e7a digital<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Pr\u00e1ticas que reduzem a exposi\u00e7\u00e3o<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">A experi\u00eancia de mercado mostra que a mitiga\u00e7\u00e3o de BEC depende principalmente de\u00a0<\/span><b><span data-contrast=\"auto\">processos e comportamento organizacional<\/span><\/b><span data-contrast=\"auto\">. Entre as medidas mais adotadas est\u00e3o:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">proibi\u00e7\u00e3o\u00a0<\/span><\/b><span data-contrast=\"auto\">de solicita\u00e7\u00f5es financeiras fora dos fluxos oficiais;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">valida\u00e7\u00e3o<\/span><\/b><span data-contrast=\"auto\">\u00a0por m\u00faltiplos canais em pedidos urgentes;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">treinamento<\/span><\/b><span data-contrast=\"auto\">\u00a0cont\u00ednuo sobre engenharia social;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">incentivo<\/span><\/b><span data-contrast=\"auto\">\u00a0\u00e0 confirma\u00e7\u00e3o de solicita\u00e7\u00f5es at\u00edpicas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Essas pr\u00e1ticas n\u00e3o eliminam o risco, mas\u00a0<\/span><b><span data-contrast=\"auto\">reduzem significativamente a probabilidade de fraude bem-sucedida.<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><span data-contrast=\"none\">O papel do seguro cibern\u00e9tico<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Com o aumento das perdas financeiras associadas a fraudes digitais, o\u00a0<\/span><a href=\"https:\/\/acrisure.com.br\/cyber\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">seguro cibern\u00e9tico<\/span><\/a><span data-contrast=\"auto\">\u00a0passou\u00a0a integrar a estrat\u00e9gia de mitiga\u00e7\u00e3o. A cobertura pode apoiar\u00a0<\/span><b><span data-contrast=\"auto\">custos de resposta a incidentes, investiga\u00e7\u00f5es e perdas financeiras\u00a0<\/span><\/b><span data-contrast=\"auto\">decorrentes de fraude.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A\u00a0contrata\u00e7\u00e3o da ap\u00f3lice normalmente exige um processo de\u00a0<\/span><b><span data-contrast=\"auto\">avalia\u00e7\u00e3o de maturidade\u00a0<\/span><\/b><span data-contrast=\"auto\">em seguran\u00e7a e governan\u00e7a<\/span><span data-contrast=\"auto\">. Durante a subscri\u00e7\u00e3o,\u00a0<\/span><b><span data-contrast=\"auto\">seguradoras analisam\u00a0controles internos, pol\u00edticas, treinamentos, processos\u00a0de valida\u00e7\u00e3o\u00a0e planos de resposta\u00a0<\/span><\/b><span data-contrast=\"auto\">a incidentes.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Na pr\u00e1tica, esse processo funciona como um\u00a0<\/span><b><span data-contrast=\"auto\">diagn\u00f3stico estruturado de risco<\/span><\/b><span data-contrast=\"auto\">. Al\u00e9m de viabilizar a transfer\u00eancia de parte das perdas financeiras, ele ajuda a\u00a0<\/span><b><span data-contrast=\"auto\">identificar lacunas, priorizar melhorias e fortalecer\u00a0o compliance<\/span><\/b><span data-contrast=\"auto\">\u00a0antes mesmo de um incidente ocorrer.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Assim, o seguro atua de forma\u00a0<\/span><b><span data-contrast=\"auto\">complementar aos controles preventivos<\/span><\/b><span data-contrast=\"auto\">, contribuindo para maior previsibilidade\u00a0diante de eventos que n\u00e3o podem ser totalmente evitados.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"2\"><span data-contrast=\"none\">BEC como parte da agenda\u00a0corporativa<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">O avan\u00e7o das fraudes com\u00a0<\/span><i><span data-contrast=\"auto\">gift\u00a0cards<\/span><\/i><span data-contrast=\"auto\">\u00a0indica uma adapta\u00e7\u00e3o dos ataques \u00e0 realidade operacional das empresas. Em vez de explorar vulnerabilidades t\u00e9cnicas,\u00a0<\/span><b><span data-contrast=\"auto\">os criminosos priorizam rotinas administrativas<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Por isso, a resposta mais eficaz tende a combinar\u00a0<\/span><b><span data-contrast=\"auto\">compliance, treinamento\u00a0e instrumentos de prote\u00e7\u00e3o.<\/span><\/b><span data-contrast=\"auto\">\u00a0Essa abordagem integrada fortalece a resili\u00eancia organizacional diante de um risco que continua evoluindo.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A digitaliza\u00e7\u00e3o e a automa\u00e7\u00e3o de tarefas n\u00e3o s\u00e3o tend\u00eancias futuras:\u00a0elas j\u00e1 transformam hoje a organiza\u00e7\u00e3o, performance e riscos no trabalho. O foco para l\u00edderes n\u00e3o \u00e9 a tecnologia isoladamente, mas\u00a0seus efeitos sobre pessoas, sa\u00fade e resultados do neg\u00f3cio.\u00a0<\/p>\n","protected":false},"author":1,"featured_media":20062,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[42],"tags":[19],"class_list":["post-20055","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-riscos-ciberneticos","tag-gestao-de-riscos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fraudes com gift cards acendem alerta para empresas<\/title>\n<meta name=\"description\" content=\"Fraudes de\u00a0Business Email\u00a0Compromise\u00a0(BEC)\u00a0seguem entre os principais vetores de perdas financeiras corporativas.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acrisure.com.br\/insights\/fraudes-gift-cards-empresas\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fraudes com gift cards acendem alerta para empresas\" \/>\n<meta property=\"og:description\" content=\"Fraudes de\u00a0Business Email\u00a0Compromise\u00a0(BEC)\u00a0seguem entre os principais vetores de perdas financeiras corporativas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acrisure.com.br\/insights\/fraudes-gift-cards-empresas\/\" \/>\n<meta property=\"og:site_name\" content=\"Insights \/ Acrisure\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itsseg\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-11T18:40:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-12T17:42:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/bec-scam-email-pishing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1620\" \/>\n\t<meta property=\"og:image:height\" content=\"650\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"publishouse\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"publishouse\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/fraudes-gift-cards-empresas\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/fraudes-gift-cards-empresas\\\/\"},\"author\":{\"name\":\"publishouse\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#\\\/schema\\\/person\\\/ae285068bde2d94bbb6b0692760fb361\"},\"headline\":\"Fraudes com gift cards ganham espa\u00e7o e acendem alerta para empresas\",\"datePublished\":\"2026-02-11T18:40:53+00:00\",\"dateModified\":\"2026-02-12T17:42:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/fraudes-gift-cards-empresas\\\/\"},\"wordCount\":752,\"image\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/fraudes-gift-cards-empresas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/wp-content\\\/uploads\\\/bec-scam-email-pishing.jpg\",\"keywords\":[\"Gest\u00e3o de Riscos\"],\"articleSection\":[\"Riscos cibern\u00e9ticos\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/fraudes-gift-cards-empresas\\\/\",\"url\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/fraudes-gift-cards-empresas\\\/\",\"name\":\"Fraudes com gift cards acendem alerta para empresas\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/fraudes-gift-cards-empresas\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/fraudes-gift-cards-empresas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/wp-content\\\/uploads\\\/bec-scam-email-pishing.jpg\",\"datePublished\":\"2026-02-11T18:40:53+00:00\",\"dateModified\":\"2026-02-12T17:42:56+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#\\\/schema\\\/person\\\/ae285068bde2d94bbb6b0692760fb361\"},\"description\":\"Fraudes de\u00a0Business Email\u00a0Compromise\u00a0(BEC)\u00a0seguem entre os principais vetores de perdas financeiras corporativas.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/fraudes-gift-cards-empresas\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/fraudes-gift-cards-empresas\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/fraudes-gift-cards-empresas\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/wp-content\\\/uploads\\\/bec-scam-email-pishing.jpg\",\"contentUrl\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/wp-content\\\/uploads\\\/bec-scam-email-pishing.jpg\",\"width\":1620,\"height\":650,\"caption\":\"Email communication. Online encryption concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/fraudes-gift-cards-empresas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fraudes com gift cards ganham espa\u00e7o e acendem alerta para empresas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#website\",\"url\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/\",\"name\":\"Insights \\\/ Acrisure\",\"description\":\"Portal de Not\u00edcias e Conte\u00fado\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#\\\/schema\\\/person\\\/ae285068bde2d94bbb6b0692760fb361\",\"name\":\"publishouse\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g\",\"caption\":\"publishouse\"},\"sameAs\":[\"https:\\\/\\\/acrisure.com.br\\\/insights\"],\"url\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/author\\\/publishouse\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fraudes com gift cards acendem alerta para empresas","description":"Fraudes de\u00a0Business Email\u00a0Compromise\u00a0(BEC)\u00a0seguem entre os principais vetores de perdas financeiras corporativas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acrisure.com.br\/insights\/fraudes-gift-cards-empresas\/","og_locale":"pt_BR","og_type":"article","og_title":"Fraudes com gift cards acendem alerta para empresas","og_description":"Fraudes de\u00a0Business Email\u00a0Compromise\u00a0(BEC)\u00a0seguem entre os principais vetores de perdas financeiras corporativas.","og_url":"https:\/\/acrisure.com.br\/insights\/fraudes-gift-cards-empresas\/","og_site_name":"Insights \/ Acrisure","article_publisher":"https:\/\/www.facebook.com\/itsseg\/","article_published_time":"2026-02-11T18:40:53+00:00","article_modified_time":"2026-02-12T17:42:56+00:00","og_image":[{"width":1620,"height":650,"url":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/bec-scam-email-pishing.jpg","type":"image\/jpeg"}],"author":"publishouse","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"publishouse","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/acrisure.com.br\/insights\/fraudes-gift-cards-empresas\/#article","isPartOf":{"@id":"https:\/\/acrisure.com.br\/insights\/fraudes-gift-cards-empresas\/"},"author":{"name":"publishouse","@id":"https:\/\/acrisure.com.br\/insights\/#\/schema\/person\/ae285068bde2d94bbb6b0692760fb361"},"headline":"Fraudes com gift cards ganham espa\u00e7o e acendem alerta para empresas","datePublished":"2026-02-11T18:40:53+00:00","dateModified":"2026-02-12T17:42:56+00:00","mainEntityOfPage":{"@id":"https:\/\/acrisure.com.br\/insights\/fraudes-gift-cards-empresas\/"},"wordCount":752,"image":{"@id":"https:\/\/acrisure.com.br\/insights\/fraudes-gift-cards-empresas\/#primaryimage"},"thumbnailUrl":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/bec-scam-email-pishing.jpg","keywords":["Gest\u00e3o de Riscos"],"articleSection":["Riscos cibern\u00e9ticos"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/acrisure.com.br\/insights\/fraudes-gift-cards-empresas\/","url":"https:\/\/acrisure.com.br\/insights\/fraudes-gift-cards-empresas\/","name":"Fraudes com gift cards acendem alerta para empresas","isPartOf":{"@id":"https:\/\/acrisure.com.br\/insights\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acrisure.com.br\/insights\/fraudes-gift-cards-empresas\/#primaryimage"},"image":{"@id":"https:\/\/acrisure.com.br\/insights\/fraudes-gift-cards-empresas\/#primaryimage"},"thumbnailUrl":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/bec-scam-email-pishing.jpg","datePublished":"2026-02-11T18:40:53+00:00","dateModified":"2026-02-12T17:42:56+00:00","author":{"@id":"https:\/\/acrisure.com.br\/insights\/#\/schema\/person\/ae285068bde2d94bbb6b0692760fb361"},"description":"Fraudes de\u00a0Business Email\u00a0Compromise\u00a0(BEC)\u00a0seguem entre os principais vetores de perdas financeiras corporativas.","breadcrumb":{"@id":"https:\/\/acrisure.com.br\/insights\/fraudes-gift-cards-empresas\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acrisure.com.br\/insights\/fraudes-gift-cards-empresas\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/acrisure.com.br\/insights\/fraudes-gift-cards-empresas\/#primaryimage","url":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/bec-scam-email-pishing.jpg","contentUrl":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/bec-scam-email-pishing.jpg","width":1620,"height":650,"caption":"Email communication. Online encryption concept"},{"@type":"BreadcrumbList","@id":"https:\/\/acrisure.com.br\/insights\/fraudes-gift-cards-empresas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/acrisure.com.br\/insights\/"},{"@type":"ListItem","position":2,"name":"Fraudes com gift cards ganham espa\u00e7o e acendem alerta para empresas"}]},{"@type":"WebSite","@id":"https:\/\/acrisure.com.br\/insights\/#website","url":"https:\/\/acrisure.com.br\/insights\/","name":"Insights \/ Acrisure","description":"Portal de Not\u00edcias e Conte\u00fado","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acrisure.com.br\/insights\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Person","@id":"https:\/\/acrisure.com.br\/insights\/#\/schema\/person\/ae285068bde2d94bbb6b0692760fb361","name":"publishouse","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g","caption":"publishouse"},"sameAs":["https:\/\/acrisure.com.br\/insights"],"url":"https:\/\/acrisure.com.br\/insights\/author\/publishouse\/"}]}},"_links":{"self":[{"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/posts\/20055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/comments?post=20055"}],"version-history":[{"count":6,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/posts\/20055\/revisions"}],"predecessor-version":[{"id":20107,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/posts\/20055\/revisions\/20107"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/media\/20062"}],"wp:attachment":[{"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/media?parent=20055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/categories?post=20055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/tags?post=20055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}