{"id":11319,"date":"2025-02-13T14:04:20","date_gmt":"2025-02-13T17:04:20","guid":{"rendered":"https:\/\/acrisure.com.br\/insights\/?p=11319"},"modified":"2025-12-08T15:54:50","modified_gmt":"2025-12-08T18:54:50","slug":"ciberseguranca-2025","status":"publish","type":"post","link":"https:\/\/acrisure.com.br\/insights\/ciberseguranca-2025\/","title":{"rendered":"Ciberseguran\u00e7a: desafios e estrat\u00e9gias em 2025"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Post&#8221; _builder_version=&#8221;4.19.4&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Post&#8221; _builder_version=&#8221;4.27.3&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Conte\u00fado&#8221; _builder_version=&#8221;4.27.3&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;1px&#8221; custom_margin=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>O F\u00f3rum Econ\u00f4mico Mundial (WEF, na sigla em ingl\u00eas) lan\u00e7ou recentemente o <em>Global Cybersecurity Outlook 2025<\/em>, um estudo sobre a evolu\u00e7\u00e3o da seguran\u00e7a cibern\u00e9tica e seus desafios.<\/p>\n<p>Nesta edi\u00e7\u00e3o, o relat\u00f3rio destaca que o r\u00e1pido avan\u00e7o da tecnologia, junto com a crescente sofistica\u00e7\u00e3o dos cibercriminosos e as cadeias de suprimentos interconectadas, tornam o ciberespa\u00e7o mais complexo e desafiador do que nunca.<\/p>\n<h2><strong>Principais conclus\u00f5es: amea\u00e7as e vulnerabilidades em ascens\u00e3o<\/strong><\/h2>\n<p>Um dos principais alertas levantados pelo WEF \u00e9 a complexidade do cen\u00e1rio cibern\u00e9tico, impulsionada por <strong>tens\u00f5es geopol\u00edticas<\/strong> que alimentam um quadro de incertezas. Cerca de 60% das empresas ajustaram suas estrat\u00e9gias de ciberseguran\u00e7a em resposta a conflitos globais, com foco na prote\u00e7\u00e3o contra roubo de propriedade intelectual e interrup\u00e7\u00e3o de opera\u00e7\u00f5es.<\/p>\n<p>Al\u00e9m disso, o relat\u00f3rio aponta que ciberespionagem, vazamento de informa\u00e7\u00f5es confidenciais e ataques sofisticados est\u00e3o entre as <a href=\"https:\/\/acrisure.com.br\/insights\/empresa-ataques-ciberneticos\/\" target=\"_blank\" rel=\"noopener\"><strong>maiores preocupa\u00e7\u00f5es de CEOs<\/strong><\/a>, refor\u00e7ando a urg\u00eancia de fortalecer a seguran\u00e7a digital.<\/p>\n<p>A <strong>Intelig\u00eancia Artificial (IA)<\/strong> \u00e9 apontada como uma faca de dois gumes, com potencial para fortalecer a seguran\u00e7a cibern\u00e9tica, mas tamb\u00e9m para ser utilizada por agentes maliciosos. Apesar disso, apenas 37% das empresas afirmaram adotar processos para avaliar a estabilidade dessas ferramentas antes de sua implementa\u00e7\u00e3o.<\/p>\n<p>As <strong>interdepend\u00eancias da<\/strong> <strong>cadeia de suprimentos<\/strong> tamb\u00e9m s\u00e3o identificadas como uma barreira significativa para alcan\u00e7ar a resili\u00eancia cibern\u00e9tica, com 54% das grandes empresas identificando a gest\u00e3o de riscos de terceiros como o principal obst\u00e1culo.<\/p>\n<h3>Leia tamb\u00e9m<\/h3>\n<ul>\n<li><a href=\"https:\/\/acrisure.com.br\/insights\/ransomware-seguro-cyber\/\" target=\"_blank\" rel=\"noopener\">Brasil \u00e9 a maior v\u00edtima de Ransomware da Am\u00e9rica Latina<\/a><\/li>\n<li><a href=\"https:\/\/acrisure.com.br\/insights\/byod-riscos-ciberseguranca\/\" target=\"_blank\" rel=\"noopener\">BYOD e os riscos para a ciberseguran\u00e7a corporativa<\/a><\/li>\n<li><a href=\"https:\/\/acrisure.com.br\/insights\/ataques-ddos\/\" target=\"_blank\" rel=\"noopener\">Ataques DDoS: Impacto e Estrat\u00e9gias de Mitiga\u00e7\u00e3o<\/a><\/li>\n<\/ul>\n<h3><strong>Recomenda\u00e7\u00f5es: como fortalecer a ciberseguran\u00e7a<\/strong><\/h3>\n<p>Diante desses desafios, o F\u00f3rum Econ\u00f4mico Mundial oferece algumas recomenda\u00e7\u00f5es importantes:<\/p>\n<ol>\n<li><strong>Avalia\u00e7\u00e3o de seguran\u00e7a da IA<\/strong><\/li>\n<\/ol>\n<p>Desenvolver processos rigorosos para avaliar a seguran\u00e7a de ferramentas de IA antes de sua implementa\u00e7\u00e3o. Isso garantir\u00e1 que a IA seja utilizada de forma segura e respons\u00e1vel, mitigando poss\u00edveis amea\u00e7as.<\/p>\n<ol start=\"2\">\n<li><strong>Abordagem das interdepend\u00eancias da cadeia de suprimentos<\/strong><\/li>\n<\/ol>\n<p>As organiza\u00e7\u00f5es precisam abordar as interdepend\u00eancias da cadeia de suprimentos para aumentar sua resili\u00eancia cibern\u00e9tica. Isso envolve o estabelecimento de parcerias com fornecedores confi\u00e1veis e a implementa\u00e7\u00e3o de medidas de seguran\u00e7a robustas em toda a cadeia.<\/p>\n<ol start=\"3\">\n<li><strong>Conscientiza\u00e7\u00e3o sobre o impacto das tens\u00f5es geopol\u00edticas<\/strong><\/li>\n<\/ol>\n<p>\u00c9 fundamental que as organiza\u00e7\u00f5es estejam cientes do impacto das tens\u00f5es geopol\u00edticas no cen\u00e1rio da seguran\u00e7a cibern\u00e9tica. Isso permitir\u00e1 que elas se preparem para os potenciais riscos e tomem medidas preventivas.<\/p>\n<h3><strong>Implica\u00e7\u00f5es para o futuro<\/strong><\/h3>\n<p>O <em>Global Cybersecurity Outlook 2025<\/em> serve como um alerta para a necessidade urgente de a\u00e7\u00f5es concretas na seguran\u00e7a cibern\u00e9tica. L\u00edderes e organiza\u00e7\u00f5es devem se preparar para os desafios do ciberespa\u00e7o e investir em estrat\u00e9gias para <a href=\"https:\/\/acrisure.com.br\/insights\/seguranca-virtual-nas-empresas\/\" target=\"_blank\" rel=\"noopener\">proteger seus ativos digitais<\/a>.<\/p>\n<p>O relat\u00f3rio enfatiza que a ciberseguran\u00e7a n\u00e3o \u00e9 apenas um detalhe t\u00e9cnico, mas tamb\u00e9m uma quest\u00e3o estrat\u00e9gica que exige colabora\u00e7\u00e3o entre governos, empresas e indiv\u00edduos. Somente com esfor\u00e7os conjuntos ser\u00e1 poss\u00edvel construir um ambiente digital mais seguro e resiliente.<\/p>\n<h3><strong>Onde encontrar o relat\u00f3rio completo<\/strong><\/h3>\n<p>O relat\u00f3rio est\u00e1 dispon\u00edvel para download no site do F\u00f3rum Econ\u00f4mico Mundial: <a href=\"https:\/\/reports.weforum.org\/global-cybersecurity-outlook-2025\/\" target=\"_blank\" rel=\"noopener\">clique aqui e confira!<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Um dos principais alertas levantados pelo WEF \u00e9 a complexidade da ciberseguran\u00e7a, impulsionada pelas tens\u00f5es geopol\u00edticas.<\/p>\n","protected":false},"author":1,"featured_media":11322,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[42],"tags":[19],"class_list":["post-11319","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-riscos-ciberneticos","tag-gestao-de-riscos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ciberseguran\u00e7a: desafios e estrat\u00e9gias em 2025<\/title>\n<meta name=\"description\" content=\"Um dos principais alertas levantados pelo WEF \u00e9 a complexidade da ciberseguran\u00e7a, impulsionada pelas tens\u00f5es geopol\u00edticas.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acrisure.com.br\/insights\/ciberseguranca-2025\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguran\u00e7a: desafios e estrat\u00e9gias em 2025\" \/>\n<meta property=\"og:description\" content=\"Um dos principais alertas levantados pelo WEF \u00e9 a complexidade da ciberseguran\u00e7a, impulsionada pelas tens\u00f5es geopol\u00edticas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acrisure.com.br\/insights\/ciberseguranca-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Insights \/ Acrisure\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itsseg\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-13T17:04:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-08T18:54:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/ciberseguranca-2025-e1740670134504.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"publishouse\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"publishouse\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/ciberseguranca-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/ciberseguranca-2025\\\/\"},\"author\":{\"name\":\"publishouse\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#\\\/schema\\\/person\\\/ae285068bde2d94bbb6b0692760fb361\"},\"headline\":\"Ciberseguran\u00e7a: desafios e estrat\u00e9gias em 2025\",\"datePublished\":\"2025-02-13T17:04:20+00:00\",\"dateModified\":\"2025-12-08T18:54:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/ciberseguranca-2025\\\/\"},\"wordCount\":692,\"image\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/ciberseguranca-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/wp-content\\\/uploads\\\/ciberseguranca-2025-e1740670134504.jpg\",\"keywords\":[\"Gest\u00e3o de Riscos\"],\"articleSection\":[\"Riscos cibern\u00e9ticos\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/ciberseguranca-2025\\\/\",\"url\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/ciberseguranca-2025\\\/\",\"name\":\"Ciberseguran\u00e7a: desafios e estrat\u00e9gias em 2025\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/ciberseguranca-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/ciberseguranca-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/wp-content\\\/uploads\\\/ciberseguranca-2025-e1740670134504.jpg\",\"datePublished\":\"2025-02-13T17:04:20+00:00\",\"dateModified\":\"2025-12-08T18:54:50+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#\\\/schema\\\/person\\\/ae285068bde2d94bbb6b0692760fb361\"},\"description\":\"Um dos principais alertas levantados pelo WEF \u00e9 a complexidade da ciberseguran\u00e7a, impulsionada pelas tens\u00f5es geopol\u00edticas.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/ciberseguranca-2025\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/ciberseguranca-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/ciberseguranca-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/wp-content\\\/uploads\\\/ciberseguranca-2025-e1740670134504.jpg\",\"contentUrl\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/wp-content\\\/uploads\\\/ciberseguranca-2025-e1740670134504.jpg\",\"width\":1920,\"height\":640,\"caption\":\"Representa\u00e7\u00e3o de malware infectando dispositivos conectados a rede\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/ciberseguranca-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciberseguran\u00e7a: desafios e estrat\u00e9gias em 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#website\",\"url\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/\",\"name\":\"Insights \\\/ Acrisure\",\"description\":\"Portal de Not\u00edcias e Conte\u00fado\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#\\\/schema\\\/person\\\/ae285068bde2d94bbb6b0692760fb361\",\"name\":\"publishouse\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g\",\"caption\":\"publishouse\"},\"sameAs\":[\"https:\\\/\\\/acrisure.com.br\\\/insights\"],\"url\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/author\\\/publishouse\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberseguran\u00e7a: desafios e estrat\u00e9gias em 2025","description":"Um dos principais alertas levantados pelo WEF \u00e9 a complexidade da ciberseguran\u00e7a, impulsionada pelas tens\u00f5es geopol\u00edticas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acrisure.com.br\/insights\/ciberseguranca-2025\/","og_locale":"pt_BR","og_type":"article","og_title":"Ciberseguran\u00e7a: desafios e estrat\u00e9gias em 2025","og_description":"Um dos principais alertas levantados pelo WEF \u00e9 a complexidade da ciberseguran\u00e7a, impulsionada pelas tens\u00f5es geopol\u00edticas.","og_url":"https:\/\/acrisure.com.br\/insights\/ciberseguranca-2025\/","og_site_name":"Insights \/ Acrisure","article_publisher":"https:\/\/www.facebook.com\/itsseg\/","article_published_time":"2025-02-13T17:04:20+00:00","article_modified_time":"2025-12-08T18:54:50+00:00","og_image":[{"width":1920,"height":640,"url":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/ciberseguranca-2025-e1740670134504.jpg","type":"image\/jpeg"}],"author":"publishouse","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"publishouse","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/acrisure.com.br\/insights\/ciberseguranca-2025\/#article","isPartOf":{"@id":"https:\/\/acrisure.com.br\/insights\/ciberseguranca-2025\/"},"author":{"name":"publishouse","@id":"https:\/\/acrisure.com.br\/insights\/#\/schema\/person\/ae285068bde2d94bbb6b0692760fb361"},"headline":"Ciberseguran\u00e7a: desafios e estrat\u00e9gias em 2025","datePublished":"2025-02-13T17:04:20+00:00","dateModified":"2025-12-08T18:54:50+00:00","mainEntityOfPage":{"@id":"https:\/\/acrisure.com.br\/insights\/ciberseguranca-2025\/"},"wordCount":692,"image":{"@id":"https:\/\/acrisure.com.br\/insights\/ciberseguranca-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/ciberseguranca-2025-e1740670134504.jpg","keywords":["Gest\u00e3o de Riscos"],"articleSection":["Riscos cibern\u00e9ticos"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/acrisure.com.br\/insights\/ciberseguranca-2025\/","url":"https:\/\/acrisure.com.br\/insights\/ciberseguranca-2025\/","name":"Ciberseguran\u00e7a: desafios e estrat\u00e9gias em 2025","isPartOf":{"@id":"https:\/\/acrisure.com.br\/insights\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acrisure.com.br\/insights\/ciberseguranca-2025\/#primaryimage"},"image":{"@id":"https:\/\/acrisure.com.br\/insights\/ciberseguranca-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/ciberseguranca-2025-e1740670134504.jpg","datePublished":"2025-02-13T17:04:20+00:00","dateModified":"2025-12-08T18:54:50+00:00","author":{"@id":"https:\/\/acrisure.com.br\/insights\/#\/schema\/person\/ae285068bde2d94bbb6b0692760fb361"},"description":"Um dos principais alertas levantados pelo WEF \u00e9 a complexidade da ciberseguran\u00e7a, impulsionada pelas tens\u00f5es geopol\u00edticas.","breadcrumb":{"@id":"https:\/\/acrisure.com.br\/insights\/ciberseguranca-2025\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acrisure.com.br\/insights\/ciberseguranca-2025\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/acrisure.com.br\/insights\/ciberseguranca-2025\/#primaryimage","url":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/ciberseguranca-2025-e1740670134504.jpg","contentUrl":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/ciberseguranca-2025-e1740670134504.jpg","width":1920,"height":640,"caption":"Representa\u00e7\u00e3o de malware infectando dispositivos conectados a rede"},{"@type":"BreadcrumbList","@id":"https:\/\/acrisure.com.br\/insights\/ciberseguranca-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/acrisure.com.br\/insights\/"},{"@type":"ListItem","position":2,"name":"Ciberseguran\u00e7a: desafios e estrat\u00e9gias em 2025"}]},{"@type":"WebSite","@id":"https:\/\/acrisure.com.br\/insights\/#website","url":"https:\/\/acrisure.com.br\/insights\/","name":"Insights \/ Acrisure","description":"Portal de Not\u00edcias e Conte\u00fado","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acrisure.com.br\/insights\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Person","@id":"https:\/\/acrisure.com.br\/insights\/#\/schema\/person\/ae285068bde2d94bbb6b0692760fb361","name":"publishouse","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g","caption":"publishouse"},"sameAs":["https:\/\/acrisure.com.br\/insights"],"url":"https:\/\/acrisure.com.br\/insights\/author\/publishouse\/"}]}},"_links":{"self":[{"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/posts\/11319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/comments?post=11319"}],"version-history":[{"count":8,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/posts\/11319\/revisions"}],"predecessor-version":[{"id":16525,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/posts\/11319\/revisions\/16525"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/media\/11322"}],"wp:attachment":[{"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/media?parent=11319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/categories?post=11319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/tags?post=11319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}