{"id":63545,"date":"2023-06-14T08:07:55","date_gmt":"2023-06-14T11:07:55","guid":{"rendered":"https:\/\/abes.org.br\/?p=63545"},"modified":"2023-05-24T22:10:28","modified_gmt":"2023-05-25T01:10:28","slug":"3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\/","title":{"rendered":"3 mistakes companies still make in defending against cyberattacks"},"content":{"rendered":"<p>It&#039;s nothing new that cyber threats continue to evolve and pose significant risks to businesses of all sizes in all industries. The consequences of a cyber attack can be devastating, covering a wide range from huge financial losses to irreparable damage to your image, in addition to fines related to legal responsibilities.<u><\/u><u><\/u><\/p>\n<p>But organizations can defend themselves if they embrace the five pillars of cyber resilience: identify, protect, detect, respond and recover. These are simple actions that, when combined efficiently, allow companies to create a security framework capable of protecting them from today&#039;s growing threats.<u><\/u><u><\/u><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-63546 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/3erros-cybersecurity-300x203.jpg\" alt=\"\" width=\"300\" height=\"203\" \/><\/p>\n<p>\u201cIt may seem commonplace, but a well-designed protection strategy can be compromised by basic mistakes,\u201d says Caio Sposito, country manager Brazil at Arcserve. Among them, the executive cites the fact that many companies underestimate the value of their digital assets and data. \u201cYou need to fully understand the value of your digital assets, including intellectual property, customer data and proprietary information. This lack of awareness can lead to inadequate protection measures, such as weak passwords, outdated software and insufficient access controls, which exposes the company to cyber threats\u201d, remembering that organizations must constantly monitor their IT area, including applying patches and promoting regular system and software updates, as well as implementing strong authentication mechanisms and encryption protocols.<u><\/u><u><\/u><\/p>\n<p>Another very common misconception is the ineffective management of third-party risk. \u201cMany companies rely on third-party vendors and service providers to support their operations, and these external partners often have access to critical systems, data and networks. However, not all third-party partners have a strong cybersecurity stance. Thus, vulnerabilities are created that can provide entry points for cyber attacks\u201d, highlights Caio Sposito.<u><\/u><u><\/u><\/p>\n<p>Inadequate testing of incident response plans is another mistake that seriously compromises enterprise security. Organizations often invest significant resources in developing incident response plans to mitigate the impact of cyber attacks. However, many fail to adequately test and update their plans, leaving them ill-prepared to effectively respond to real-world cyber incidents.<u><\/u><u><\/u><\/p>\n<p>\u201cAs the threat landscape evolves, companies must avoid common mistakes in their cyber resiliency efforts. Understanding the value of assets and data, effectively managing third-party risk, and properly testing incident response plans are critical components of a robust cybersecurity strategy,\u201d summarizes Caio Sposito.<\/p>","protected":false},"excerpt":{"rendered":"<p>N\u00e3o \u00e9 nenhuma novidade que as amea\u00e7as cibern\u00e9ticas continuam a evoluir e representam riscos significativos para empresas de todos os tamanhos em todos os setores. As consequ\u00eancias de um ataque cibern\u00e9tico podem ser devastadoras, cobrindo um amplo arco que vai desde enormes preju\u00edzos financeiros at\u00e9 danos irrepar\u00e1veis \u00e0 sua imagem, al\u00e9m de multas relativas \u00e0s [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":63546,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[4150,4151,270],"class_list":["post-63545","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-postura-em-ciberseguranca","tag-resiliencia-cibernetica","tag-seguranca-cibernetica"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 erros que as empresas ainda cometem na defesa contra o ciberataques - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 erros que as empresas ainda cometem na defesa contra o ciberataques - ABES\" \/>\n<meta property=\"og:description\" content=\"N\u00e3o \u00e9 nenhuma novidade que as amea\u00e7as cibern\u00e9ticas continuam a evoluir e representam riscos significativos para empresas de todos os tamanhos em todos os setores. As consequ\u00eancias de um ataque cibern\u00e9tico podem ser devastadoras, cobrindo um amplo arco que vai desde enormes preju\u00edzos financeiros at\u00e9 danos irrepar\u00e1veis \u00e0 sua imagem, al\u00e9m de multas relativas \u00e0s [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-14T11:07:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/3erros-cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1298\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"3 erros que as empresas ainda cometem na defesa contra o ciberataques\",\"datePublished\":\"2023-06-14T11:07:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\\\/\"},\"wordCount\":493,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/3erros-cybersecurity.jpg\",\"keywords\":[\"postura em ciberseguran\u00e7a\",\"resili\u00eancia cibern\u00e9tica\",\"seguran\u00e7a cibern\u00e9tica\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\\\/\",\"name\":\"3 erros que as empresas ainda cometem na defesa contra o ciberataques - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/3erros-cybersecurity.jpg\",\"datePublished\":\"2023-06-14T11:07:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/3erros-cybersecurity.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/3erros-cybersecurity.jpg\",\"width\":1920,\"height\":1298},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 erros que as empresas ainda cometem na defesa contra o ciberataques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 mistakes companies still make when defending against cyberattacks - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\/","og_locale":"en_US","og_type":"article","og_title":"3 erros que as empresas ainda cometem na defesa contra o ciberataques - ABES","og_description":"N\u00e3o \u00e9 nenhuma novidade que as amea\u00e7as cibern\u00e9ticas continuam a evoluir e representam riscos significativos para empresas de todos os tamanhos em todos os setores. As consequ\u00eancias de um ataque cibern\u00e9tico podem ser devastadoras, cobrindo um amplo arco que vai desde enormes preju\u00edzos financeiros at\u00e9 danos irrepar\u00e1veis \u00e0 sua imagem, al\u00e9m de multas relativas \u00e0s [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2023-06-14T11:07:55+00:00","og_image":[{"width":1920,"height":1298,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/3erros-cybersecurity.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"3 erros que as empresas ainda cometem na defesa contra o ciberataques","datePublished":"2023-06-14T11:07:55+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\/"},"wordCount":493,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/3erros-cybersecurity.jpg","keywords":["postura em ciberseguran\u00e7a","resili\u00eancia cibern\u00e9tica","seguran\u00e7a cibern\u00e9tica"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\/","url":"https:\/\/abes.org.br\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\/","name":"3 mistakes companies still make when defending against cyberattacks - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/3erros-cybersecurity.jpg","datePublished":"2023-06-14T11:07:55+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/3erros-cybersecurity.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/3erros-cybersecurity.jpg","width":1920,"height":1298},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/3-erros-que-as-empresas-ainda-cometem-na-defesa-contra-o-ciberataques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"3 erros que as empresas ainda cometem na defesa contra o ciberataques"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-18 16:06:49","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/63545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=63545"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/63545\/revisions"}],"predecessor-version":[{"id":63547,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/63545\/revisions\/63547"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/63546"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=63545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=63545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=63545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}