{"id":8661,"date":"2024-09-26T11:58:58","date_gmt":"2024-09-26T14:58:58","guid":{"rendered":"https:\/\/acrisure.com.br\/insights\/?p=8661"},"modified":"2025-12-16T14:42:19","modified_gmt":"2025-12-16T17:42:19","slug":"desafios-seguranca-cibernetica","status":"publish","type":"post","link":"https:\/\/acrisure.com.br\/insights\/desafios-seguranca-cibernetica\/","title":{"rendered":"Blindagem Digital: 5 desafios da Seguran\u00e7a Cibern\u00e9tica"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Post&#8221; _builder_version=&#8221;4.19.4&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Post&#8221; _builder_version=&#8221;4.23&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Conte\u00fado&#8221; _builder_version=&#8221;4.27.3&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;1px&#8221; custom_margin=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Em 2024, o custo m\u00e9dio de um ciberataque no Brasil alcan\u00e7ou R$ 7,44 milh\u00f5es, um aumento de 11,5% em rela\u00e7\u00e3o a 2023, conforme o relat\u00f3rio <a href=\"https:\/\/valor.globo.com\/empresas\/noticia\/2024\/09\/25\/custo-com-ciberataque-sobe-115-no-pais.ghtml\" target=\"_blank\" rel=\"noopener\"><em>Cost of a Data Breach<\/em><\/a>, divulgado pela IBM em 25 de setembro.<\/p>\n<p>Em um webinar promovido pela\u00a0 Acrisure sobre os desafios da seguran\u00e7a cibern\u00e9tica nas empresas, Altijanes Barbosa, t\u00e9cnico em seguran\u00e7a da informa\u00e7\u00e3o, e Fernanda Bulsoni, advogada especializada em seguros corporativos, analisaram como a gest\u00e3o de riscos e a conscientiza\u00e7\u00e3o s\u00e3o fundamentais para proteger os neg\u00f3cios.<\/p>\n<p>Aqui est\u00e3o os principais pontos discutidos nessa conversa:<\/p>\n<ol>\n<li><strong>Gest\u00e3o cont\u00ednua da seguran\u00e7a cibern\u00e9tica<\/strong><\/li>\n<\/ol>\n<p>Os cibercriminosos est\u00e3o sempre buscando brechas para acessar dados. Mesmo com poucos recursos, eles podem tentar ataques. Portanto, a gest\u00e3o de riscos deve ser cont\u00ednua, incluindo reparo, capacita\u00e7\u00e3o e conscientiza\u00e7\u00e3o dos colaboradores sobre seguran\u00e7a digital. Os desafios e as consequ\u00eancias dos ataques devem estar no centro das discuss\u00f5es.<\/p>\n<ol start=\"2\">\n<li><strong>Amea\u00e7a interna<\/strong><\/li>\n<\/ol>\n<p>Muitas empresas acreditam que os ataques v\u00eam apenas de fora, mas h\u00e1 casos em que criminosos infiltram pessoas nas organiza\u00e7\u00f5es para obter dados sigilosos. Identifique as atividades cr\u00edticas da empresa, os riscos envolvidos e as poss\u00edveis vulnerabilidades.<\/p>\n<p><strong>Leia tamb\u00e9m: <\/strong><a href=\"https:\/\/acrisure.com.br\/insights\/como-se-preparar-riscos-ciberneticos\/\" target=\"_blank\" rel=\"noopener\">Como se preparar para os riscos cibern\u00e9ticos<\/a><\/p>\n<ol start=\"3\">\n<li><strong>Excesso de confian\u00e7a \u00e9 perigoso<\/strong><br \/>Nenhuma empresa \u00e9 100% segura. Embora algumas sejam mais visadas, todas podem ser alvos, especialmente aquelas que lidam com dados pessoais, como CPFs e registros m\u00e9dicos. A cren\u00e7a de que ataques n\u00e3o ocorrer\u00e3o pode aumentar o risco. Em 2022, houve <a href=\"https:\/\/jornal.usp.br\/radio-usp\/brasil-sofreu-mais-de-100-bilhoes-de-tentativas-de-ataques-ciberneticos-no-ultimo-ano\/#:~:text=Em%202022%2C%20o%20Brasil%20sofreu,Caribe%2C%20que%20somaram%20360%20bilh%C3%B5es.\" target=\"_blank\" rel=\"noopener\">103 bilh\u00f5es de tentativas de invas\u00e3o de dados<\/a> no Brasil, um alerta para a necessidade de vigil\u00e2ncia constante.<\/li>\n<\/ol>\n<ol start=\"4\">\n<li><strong>Pequenas e m\u00e9dias empresas como porta de entrada<\/strong><br \/><a href=\"https:\/\/acrisure.com.br\/insights\/ataques-ciberneticos-em-empresas\/\" target=\"_blank\" rel=\"noopener\">Empresas de pequeno e m\u00e9dio porte s\u00e3o o principal alvo de ataques.<\/a> Muitas vezes, os criminosos se aproveitam da pouca infraestrutura dessas empresas como meio de atingir grandes corpora\u00e7\u00f5es. Todas, independentemente do porte, devem ter um plano de resposta a incidentes cibern\u00e9ticos.<\/li>\n<\/ol>\n<ol start=\"5\">\n<li><strong> Seguro Cibern\u00e9tico como complemento<\/strong><br \/>\u00d3rg\u00e3os reguladores, como ANS, SUSEP e ANEEL, recomendam que as empresas tenham um <a href=\"https:\/\/acrisure.com.br\/cyber\/\" target=\"_blank\" rel=\"noopener\"><strong>Seguro Cyber<\/strong><\/a>. O custo do seguro depender\u00e1 do n\u00edvel de maturidade da seguran\u00e7a digital da empresa, seu faturamento, riscos e as coberturas contratadas.<\/li>\n<\/ol>\n<p>Comparado com os preju\u00edzos potencialmente devastadores de um ataque virtual, o seguro se destaca como uma ferramenta estrat\u00e9gica, complementando as medidas preventivas e oferecendo prote\u00e7\u00e3o financeira para a recupera\u00e7\u00e3o da empresa.<\/p>\n<p>Confira o webinar \u201c<a href=\"https:\/\/www.linkedin.com\/events\/blindagemdigital-seguran-aesegu7234538532193636355\/theater\/\" target=\"_blank\" rel=\"noopener\"><em>Blindagem Digital: Seguran\u00e7a e Seguro Cibern\u00e9tico<\/em><\/a>\u201d na \u00edntegra.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Em um webinar da Acrisure sobre os desafios da seguran\u00e7a cibern\u00e9tica nas empresas, foram esclarecidos diferentes pontos sobre o assunto. <\/p>\n","protected":false},"author":1,"featured_media":8666,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[42],"tags":[19],"class_list":["post-8661","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-riscos-ciberneticos","tag-gestao-de-riscos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Blindagem Digital: 5 desafios da Seguran\u00e7a Cibern\u00e9tica<\/title>\n<meta name=\"description\" content=\"Em um webinar da It\u2019sSeg sobre os desafios da seguran\u00e7a cibern\u00e9tica nas empresas, foram esclarecidos diferentes pontos sobre o assunto.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acrisure.com.br\/insights\/desafios-seguranca-cibernetica\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blindagem Digital: 5 desafios da Seguran\u00e7a Cibern\u00e9tica\" \/>\n<meta property=\"og:description\" content=\"Em um webinar da It\u2019sSeg sobre os desafios da seguran\u00e7a cibern\u00e9tica nas empresas, foram esclarecidos diferentes pontos sobre o assunto.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acrisure.com.br\/insights\/desafios-seguranca-cibernetica\/\" \/>\n<meta property=\"og:site_name\" content=\"Insights \/ Acrisure\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itsseg\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-26T14:58:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-16T17:42:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/capas.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"publishouse\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"publishouse\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/desafios-seguranca-cibernetica\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/desafios-seguranca-cibernetica\\\/\"},\"author\":{\"name\":\"publishouse\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#\\\/schema\\\/person\\\/ae285068bde2d94bbb6b0692760fb361\"},\"headline\":\"Blindagem Digital: 5 desafios da Seguran\u00e7a Cibern\u00e9tica\",\"datePublished\":\"2024-09-26T14:58:58+00:00\",\"dateModified\":\"2025-12-16T17:42:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/desafios-seguranca-cibernetica\\\/\"},\"wordCount\":540,\"image\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/desafios-seguranca-cibernetica\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/wp-content\\\/uploads\\\/capas.webp\",\"keywords\":[\"Gest\u00e3o de Riscos\"],\"articleSection\":[\"Riscos cibern\u00e9ticos\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/desafios-seguranca-cibernetica\\\/\",\"url\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/desafios-seguranca-cibernetica\\\/\",\"name\":\"Blindagem Digital: 5 desafios da Seguran\u00e7a Cibern\u00e9tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/desafios-seguranca-cibernetica\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/desafios-seguranca-cibernetica\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/wp-content\\\/uploads\\\/capas.webp\",\"datePublished\":\"2024-09-26T14:58:58+00:00\",\"dateModified\":\"2025-12-16T17:42:19+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#\\\/schema\\\/person\\\/ae285068bde2d94bbb6b0692760fb361\"},\"description\":\"Em um webinar da It\u2019sSeg sobre os desafios da seguran\u00e7a cibern\u00e9tica nas empresas, foram esclarecidos diferentes pontos sobre o assunto.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/desafios-seguranca-cibernetica\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/desafios-seguranca-cibernetica\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/desafios-seguranca-cibernetica\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/wp-content\\\/uploads\\\/capas.webp\",\"contentUrl\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/wp-content\\\/uploads\\\/capas.webp\",\"width\":1920,\"height\":640,\"caption\":\"Cadeado aberto representando fragilidade da blindagem digital\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/desafios-seguranca-cibernetica\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blindagem Digital: 5 desafios da Seguran\u00e7a Cibern\u00e9tica\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#website\",\"url\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/\",\"name\":\"Insights \\\/ Acrisure\",\"description\":\"Portal de Not\u00edcias e Conte\u00fado\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#\\\/schema\\\/person\\\/ae285068bde2d94bbb6b0692760fb361\",\"name\":\"publishouse\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g\",\"caption\":\"publishouse\"},\"sameAs\":[\"https:\\\/\\\/acrisure.com.br\\\/insights\"],\"url\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/author\\\/publishouse\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blindagem Digital: 5 desafios da Seguran\u00e7a Cibern\u00e9tica","description":"Em um webinar da It\u2019sSeg sobre os desafios da seguran\u00e7a cibern\u00e9tica nas empresas, foram esclarecidos diferentes pontos sobre o assunto.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acrisure.com.br\/insights\/desafios-seguranca-cibernetica\/","og_locale":"pt_BR","og_type":"article","og_title":"Blindagem Digital: 5 desafios da Seguran\u00e7a Cibern\u00e9tica","og_description":"Em um webinar da It\u2019sSeg sobre os desafios da seguran\u00e7a cibern\u00e9tica nas empresas, foram esclarecidos diferentes pontos sobre o assunto.","og_url":"https:\/\/acrisure.com.br\/insights\/desafios-seguranca-cibernetica\/","og_site_name":"Insights \/ Acrisure","article_publisher":"https:\/\/www.facebook.com\/itsseg\/","article_published_time":"2024-09-26T14:58:58+00:00","article_modified_time":"2025-12-16T17:42:19+00:00","og_image":[{"width":1920,"height":640,"url":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/capas.webp","type":"image\/webp"}],"author":"publishouse","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"publishouse","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/acrisure.com.br\/insights\/desafios-seguranca-cibernetica\/#article","isPartOf":{"@id":"https:\/\/acrisure.com.br\/insights\/desafios-seguranca-cibernetica\/"},"author":{"name":"publishouse","@id":"https:\/\/acrisure.com.br\/insights\/#\/schema\/person\/ae285068bde2d94bbb6b0692760fb361"},"headline":"Blindagem Digital: 5 desafios da Seguran\u00e7a Cibern\u00e9tica","datePublished":"2024-09-26T14:58:58+00:00","dateModified":"2025-12-16T17:42:19+00:00","mainEntityOfPage":{"@id":"https:\/\/acrisure.com.br\/insights\/desafios-seguranca-cibernetica\/"},"wordCount":540,"image":{"@id":"https:\/\/acrisure.com.br\/insights\/desafios-seguranca-cibernetica\/#primaryimage"},"thumbnailUrl":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/capas.webp","keywords":["Gest\u00e3o de Riscos"],"articleSection":["Riscos cibern\u00e9ticos"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/acrisure.com.br\/insights\/desafios-seguranca-cibernetica\/","url":"https:\/\/acrisure.com.br\/insights\/desafios-seguranca-cibernetica\/","name":"Blindagem Digital: 5 desafios da Seguran\u00e7a Cibern\u00e9tica","isPartOf":{"@id":"https:\/\/acrisure.com.br\/insights\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acrisure.com.br\/insights\/desafios-seguranca-cibernetica\/#primaryimage"},"image":{"@id":"https:\/\/acrisure.com.br\/insights\/desafios-seguranca-cibernetica\/#primaryimage"},"thumbnailUrl":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/capas.webp","datePublished":"2024-09-26T14:58:58+00:00","dateModified":"2025-12-16T17:42:19+00:00","author":{"@id":"https:\/\/acrisure.com.br\/insights\/#\/schema\/person\/ae285068bde2d94bbb6b0692760fb361"},"description":"Em um webinar da It\u2019sSeg sobre os desafios da seguran\u00e7a cibern\u00e9tica nas empresas, foram esclarecidos diferentes pontos sobre o assunto.","breadcrumb":{"@id":"https:\/\/acrisure.com.br\/insights\/desafios-seguranca-cibernetica\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acrisure.com.br\/insights\/desafios-seguranca-cibernetica\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/acrisure.com.br\/insights\/desafios-seguranca-cibernetica\/#primaryimage","url":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/capas.webp","contentUrl":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/capas.webp","width":1920,"height":640,"caption":"Cadeado aberto representando fragilidade da blindagem digital"},{"@type":"BreadcrumbList","@id":"https:\/\/acrisure.com.br\/insights\/desafios-seguranca-cibernetica\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/acrisure.com.br\/insights\/"},{"@type":"ListItem","position":2,"name":"Blindagem Digital: 5 desafios da Seguran\u00e7a Cibern\u00e9tica"}]},{"@type":"WebSite","@id":"https:\/\/acrisure.com.br\/insights\/#website","url":"https:\/\/acrisure.com.br\/insights\/","name":"Insights \/ Acrisure","description":"Portal de Not\u00edcias e Conte\u00fado","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acrisure.com.br\/insights\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Person","@id":"https:\/\/acrisure.com.br\/insights\/#\/schema\/person\/ae285068bde2d94bbb6b0692760fb361","name":"publishouse","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g","caption":"publishouse"},"sameAs":["https:\/\/acrisure.com.br\/insights"],"url":"https:\/\/acrisure.com.br\/insights\/author\/publishouse\/"}]}},"_links":{"self":[{"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/posts\/8661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/comments?post=8661"}],"version-history":[{"count":8,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/posts\/8661\/revisions"}],"predecessor-version":[{"id":16698,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/posts\/8661\/revisions\/16698"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/media\/8666"}],"wp:attachment":[{"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/media?parent=8661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/categories?post=8661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/tags?post=8661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}