{"id":2688,"date":"2022-04-26T16:03:42","date_gmt":"2022-04-26T19:03:42","guid":{"rendered":"https:\/\/neobits.com.br\/?p=2688"},"modified":"2022-04-26T16:03:44","modified_gmt":"2022-04-26T19:03:44","slug":"cyberseguranca-tendencias-2022","status":"publish","type":"post","link":"https:\/\/neobits.com.br\/?p=2688","title":{"rendered":"Ciberseguran\u00e7a: as principais tend\u00eancias de 2022"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2688\" class=\"elementor elementor-2688\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-652d004 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"652d004\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-07c80ac\" data-id=\"07c80ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3bfb72e elementor-widget elementor-widget-image\" data-id=\"3bfb72e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"864\" src=\"https:\/\/neobits.com.br\/wp-content\/uploads\/2022\/04\/sofware-developer-thinking-while-touching-beard-while-typing-laptop-sitting-desk-with-multiple-screens-parsing-code-focused-database-admin-working-with-team-coding-background-1024x864.jpg\" class=\"attachment-large size-large wp-image-2690\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-42e8437 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"42e8437\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-062ebd0\" data-id=\"062ebd0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f6a9867 elementor-widget elementor-widget-text-editor\" data-id=\"f6a9867\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">\u00c9 inquestion\u00e1vel que a acelera\u00e7\u00e3o digital das empresas foi muito expressiva no cen\u00e1rio pand\u00eamico. E a partir dessa movimenta\u00e7\u00e3o, os ataques cibern\u00e9ticos aumentaram, ocasionando o investimento significativo de milhares de empresas do mundo todo na seguran\u00e7a de dados.\u00a0<\/span><br \/><br \/><br \/><br \/><br \/><span style=\"font-weight: 400;\">Ali\u00e1s, voc\u00ea sabia que de acordo com a ACC, <\/span><span style=\"font-weight: 400;\">Ag\u00eancia de Ciberseguran\u00e7a da Catalunha, o registro de amea\u00e7as cibern\u00e9ticas em 2021 foi de quase 300%? Tendo conhecimento desse crescimento expressivo dos ataques, que tal prevenir a sua empresa?<\/span><br \/><br \/><br \/><br \/><br \/><span style=\"font-weight: 400;\">Hoje vamos compartilhar algumas das principais tend\u00eancias de ciberseguran\u00e7a, uma pr\u00e1tica que protege computadores e servidores contra amea\u00e7as cibern\u00e9ticas ou ataques perigosos. Confira a seguir!<\/span><\/p><p><b>1. Sistema de Gerenciamento de Informa\u00e7\u00f5es e Eventos de Seguran\u00e7a (SIEM)<\/b><\/p><p><span style=\"font-weight: 400;\">Devido ao avan\u00e7o das novas tecnologias, que auxiliam o trabalho do SOC (Security Operations Center), h\u00e1 uma grande possibilidade das empresas deixarem o SIEM. <\/span><\/p><p><b>2. Trabalho remoto<\/b><\/p><p><span style=\"font-weight: 400;\">O formato h\u00edbrido \u00e9 um modelo de trabalho que ganhou muita for\u00e7a durante a pandemia, considerado um grande desafio pela seguran\u00e7a cibern\u00e9tica. O motivo est\u00e1 nas vulnerabilidades j\u00e1 existentes nas empresas e pela necessidade da variedade de ferramentas necess\u00e1rias para preven\u00e7\u00e3o, tornando o cuidado com os riscos ainda mais significativos.\u00a0<\/span><br \/><b><\/b><\/p><p><b>3. Profissionais especializados<\/b><\/p><p><span style=\"font-weight: 400;\">Com o avan\u00e7o da seguran\u00e7a cibern\u00e9tica, o que est\u00e1 previsto \u00e9 uma forte necessidade das empresas em contratar profissionais<\/span><span style=\"font-weight: 400;\"> altamente qualificados para atender a demanda. Neste caso, \u00e9 incentivado o uso de ferramentas que estimulem as equipes a se tornarem mais produtivas e assertivas.\u00a0<\/span><br \/><br \/><b>4. Sistemas automatizados<\/b><\/p><p><b><span style=\"font-weight: 400;\">Aqui est\u00e1 uma solu\u00e7\u00e3o inteligente para garantir maior efici\u00eancia e agilidade nas tarefas, facilitando a resposta de amea\u00e7as cibern\u00e9ticas para todos os portes de empresas.<\/span><br \/><\/b><\/p><p><b>5. Seguro cibern\u00e9tico<\/b><\/p><p><span style=\"font-weight: 400;\">Empresas atualizadas sobre a ciberseguran\u00e7a est\u00e3o cada vez mais em busca de recursos que promovam maior prote\u00e7\u00e3o. Logo, o seguro cibern\u00e9tico cria uma forma de prevenir multas e preju\u00edzos financeiros, tornando-se imprescind\u00edvel ao neg\u00f3cio.<\/span><br \/><br \/><b>6. LGPD no Brasil<\/b><\/p><p><span style=\"font-weight: 400;\">Com a Lei Geral de Prote\u00e7\u00e3o de Dados em vigor desde 2021, a estimativa \u00e9 que ocorra uma potencializa\u00e7\u00e3o eficiente da ciberseguran\u00e7a no pa\u00eds. O LGPD apresenta normas para serem cumpridas por corpora\u00e7\u00f5es, promovendo o uso de dados de forma consciente e segura.<\/span><br \/><br \/><span style=\"font-weight: 400;\">Curtiu ficar ainda mais atualizado sobre as novidades do segmento de tecnologia e seguran\u00e7a da informa\u00e7\u00e3o? \ud83d\ude09<\/span><br \/><br \/><span style=\"font-weight: 400;\">Compartilhe este conte\u00fado com quem tamb\u00e9m precisa se informar sobre essas tend\u00eancias da ciberseguran\u00e7a e conte com as solu\u00e7\u00f5es da Neobits para manter o seu neg\u00f3cio protegido contra ataques cibern\u00e9ticos. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00c9 inquestion\u00e1vel que a acelera\u00e7\u00e3o digital das empresas foi muito expressiva no cen\u00e1rio pand\u00eamico. E a partir dessa movimenta\u00e7\u00e3o, os ataques cibern\u00e9ticos aumentaram, ocasionando o investimento significativo de milhares de empresas do mundo todo na seguran\u00e7a de dados.&nbsp; Ali\u00e1s, voc\u00ea sabia que de acordo com a ACC, Ag\u00eancia de Ciberseguran\u00e7a da Catalunha, o registro de [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2690,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[39,30,63,53,24,51,29,62,52],"tags":[36,31,57,59,54,56,55,60,61,58,49],"class_list":["post-2688","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backup","category-cybersecurity","category-firewall","category-home-office","category-infraestrutura","category-lgpd","category-seguranca-da-informacao","category-seguro-cibernetico","category-sistemas-automatizados","tag-backup","tag-cybersecurity","tag-cyberseguranca","tag-firewall","tag-home-office","tag-infra","tag-infraestrutura","tag-lgpd","tag-seguro-cibernetico","tag-sistemas-automatizados","tag-sysadmin"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ciberseguran\u00e7a: as principais tend\u00eancias de 2022 - neobits<\/title>\n<meta name=\"description\" content=\"neobits seguran\u00e7a da informa\u00e7\u00e3o 5 dicas para gest\u00e3o de documentos digitais.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/neobits.com.br\/?p=2688\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguran\u00e7a: as principais tend\u00eancias de 2022 - neobits\" \/>\n<meta property=\"og:description\" content=\"neobits seguran\u00e7a da informa\u00e7\u00e3o 5 dicas para gest\u00e3o de documentos digitais.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/neobits.com.br\/?p=2688\" \/>\n<meta property=\"og:site_name\" content=\"neobits\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-26T19:03:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-26T19:03:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/neobits.com.br\/wp-content\/uploads\/2022\/04\/sofware-developer-thinking-while-touching-beard-while-typing-laptop-sitting-desk-with-multiple-screens-parsing-code-focused-database-admin-working-with-team-coding-background.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"864\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Giovani Vargas Poletto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Giovani Vargas Poletto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/neobits.com.br\/?p=2688#article\",\"isPartOf\":{\"@id\":\"https:\/\/neobits.com.br\/?p=2688\"},\"author\":{\"name\":\"Giovani Vargas Poletto\",\"@id\":\"https:\/\/neobits.com.br\/#\/schema\/person\/61147f35254c3459670bc95239388e7b\"},\"headline\":\"Ciberseguran\u00e7a: as principais tend\u00eancias de 2022\",\"datePublished\":\"2022-04-26T19:03:42+00:00\",\"dateModified\":\"2022-04-26T19:03:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/neobits.com.br\/?p=2688\"},\"wordCount\":445,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/neobits.com.br\/#organization\"},\"image\":{\"@id\":\"https:\/\/neobits.com.br\/?p=2688#primaryimage\"},\"thumbnailUrl\":\"https:\/\/neobits.com.br\/wp-content\/uploads\/2022\/04\/sofware-developer-thinking-while-touching-beard-while-typing-laptop-sitting-desk-with-multiple-screens-parsing-code-focused-database-admin-working-with-team-coding-background.jpg\",\"keywords\":[\"backup\",\"cybersecurity\",\"cyberseguran\u00e7a\",\"firewall\",\"home office\",\"infra\",\"infraestrutura\",\"LGPD\",\"Seguro Cibern\u00e9tico\",\"sistemas automatizados\",\"sysadmin\"],\"articleSection\":[\"backup\",\"cybersecurity\",\"Firewall\",\"home office\",\"infraestrutura\",\"LGPD\",\"seguran\u00e7a da informa\u00e7\u00e3o\",\"seguro cibern\u00e9tico\",\"sistemas automatizados\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/neobits.com.br\/?p=2688#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/neobits.com.br\/?p=2688\",\"url\":\"https:\/\/neobits.com.br\/?p=2688\",\"name\":\"Ciberseguran\u00e7a: as principais tend\u00eancias de 2022 - neobits\",\"isPartOf\":{\"@id\":\"https:\/\/neobits.com.br\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/neobits.com.br\/?p=2688#primaryimage\"},\"image\":{\"@id\":\"https:\/\/neobits.com.br\/?p=2688#primaryimage\"},\"thumbnailUrl\":\"https:\/\/neobits.com.br\/wp-content\/uploads\/2022\/04\/sofware-developer-thinking-while-touching-beard-while-typing-laptop-sitting-desk-with-multiple-screens-parsing-code-focused-database-admin-working-with-team-coding-background.jpg\",\"datePublished\":\"2022-04-26T19:03:42+00:00\",\"dateModified\":\"2022-04-26T19:03:44+00:00\",\"description\":\"neobits seguran\u00e7a da informa\u00e7\u00e3o 5 dicas para gest\u00e3o de documentos digitais.\",\"breadcrumb\":{\"@id\":\"https:\/\/neobits.com.br\/?p=2688#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/neobits.com.br\/?p=2688\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/neobits.com.br\/?p=2688#primaryimage\",\"url\":\"https:\/\/neobits.com.br\/wp-content\/uploads\/2022\/04\/sofware-developer-thinking-while-touching-beard-while-typing-laptop-sitting-desk-with-multiple-screens-parsing-code-focused-database-admin-working-with-team-coding-background.jpg\",\"contentUrl\":\"https:\/\/neobits.com.br\/wp-content\/uploads\/2022\/04\/sofware-developer-thinking-while-touching-beard-while-typing-laptop-sitting-desk-with-multiple-screens-parsing-code-focused-database-admin-working-with-team-coding-background.jpg\",\"width\":1536,\"height\":864,\"caption\":\"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\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/neobits.com.br\/?p=2688#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/neobits.com.br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciberseguran\u00e7a: as principais tend\u00eancias de 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/neobits.com.br\/#website\",\"url\":\"https:\/\/neobits.com.br\/\",\"name\":\"neobits\",\"description\":\"Seguran\u00e7a e Performance Tecnol\u00f3gica\",\"publisher\":{\"@id\":\"https:\/\/neobits.com.br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/neobits.com.br\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/neobits.com.br\/#organization\",\"name\":\"Neobits Seguran\u00e7a e Performance\",\"url\":\"https:\/\/neobits.com.br\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/neobits.com.br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/neobits.com.br\/wp-content\/uploads\/2022\/03\/Ativo-2@4x.png\",\"contentUrl\":\"https:\/\/neobits.com.br\/wp-content\/uploads\/2022\/03\/Ativo-2@4x.png\",\"width\":2514,\"height\":763,\"caption\":\"Neobits Seguran\u00e7a e Performance\"},\"image\":{\"@id\":\"https:\/\/neobits.com.br\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/neobits.com.br\/#\/schema\/person\/61147f35254c3459670bc95239388e7b\",\"name\":\"Giovani Vargas Poletto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/neobits.com.br\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15d40d9b6442065b5138e3f71d6934678f06fd34043e93c5a9431a5c5b0d9c74?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15d40d9b6442065b5138e3f71d6934678f06fd34043e93c5a9431a5c5b0d9c74?s=96&d=mm&r=g\",\"caption\":\"Giovani Vargas Poletto\"},\"sameAs\":[\"http:\/\/neobits.com.br\"],\"url\":\"https:\/\/neobits.com.br\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberseguran\u00e7a: as principais tend\u00eancias de 2022 - neobits","description":"neobits seguran\u00e7a da informa\u00e7\u00e3o 5 dicas para gest\u00e3o de documentos digitais.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/neobits.com.br\/?p=2688","og_locale":"pt_BR","og_type":"article","og_title":"Ciberseguran\u00e7a: as principais tend\u00eancias de 2022 - neobits","og_description":"neobits seguran\u00e7a da informa\u00e7\u00e3o 5 dicas para gest\u00e3o de documentos digitais.","og_url":"https:\/\/neobits.com.br\/?p=2688","og_site_name":"neobits","article_published_time":"2022-04-26T19:03:42+00:00","article_modified_time":"2022-04-26T19:03:44+00:00","og_image":[{"width":1536,"height":864,"url":"https:\/\/neobits.com.br\/wp-content\/uploads\/2022\/04\/sofware-developer-thinking-while-touching-beard-while-typing-laptop-sitting-desk-with-multiple-screens-parsing-code-focused-database-admin-working-with-team-coding-background.jpg","type":"image\/jpeg"}],"author":"Giovani Vargas Poletto","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Giovani Vargas Poletto","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/neobits.com.br\/?p=2688#article","isPartOf":{"@id":"https:\/\/neobits.com.br\/?p=2688"},"author":{"name":"Giovani Vargas Poletto","@id":"https:\/\/neobits.com.br\/#\/schema\/person\/61147f35254c3459670bc95239388e7b"},"headline":"Ciberseguran\u00e7a: as principais tend\u00eancias de 2022","datePublished":"2022-04-26T19:03:42+00:00","dateModified":"2022-04-26T19:03:44+00:00","mainEntityOfPage":{"@id":"https:\/\/neobits.com.br\/?p=2688"},"wordCount":445,"commentCount":0,"publisher":{"@id":"https:\/\/neobits.com.br\/#organization"},"image":{"@id":"https:\/\/neobits.com.br\/?p=2688#primaryimage"},"thumbnailUrl":"https:\/\/neobits.com.br\/wp-content\/uploads\/2022\/04\/sofware-developer-thinking-while-touching-beard-while-typing-laptop-sitting-desk-with-multiple-screens-parsing-code-focused-database-admin-working-with-team-coding-background.jpg","keywords":["backup","cybersecurity","cyberseguran\u00e7a","firewall","home office","infra","infraestrutura","LGPD","Seguro Cibern\u00e9tico","sistemas automatizados","sysadmin"],"articleSection":["backup","cybersecurity","Firewall","home office","infraestrutura","LGPD","seguran\u00e7a da informa\u00e7\u00e3o","seguro cibern\u00e9tico","sistemas automatizados"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/neobits.com.br\/?p=2688#respond"]}]},{"@type":"WebPage","@id":"https:\/\/neobits.com.br\/?p=2688","url":"https:\/\/neobits.com.br\/?p=2688","name":"Ciberseguran\u00e7a: as principais tend\u00eancias de 2022 - neobits","isPartOf":{"@id":"https:\/\/neobits.com.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/neobits.com.br\/?p=2688#primaryimage"},"image":{"@id":"https:\/\/neobits.com.br\/?p=2688#primaryimage"},"thumbnailUrl":"https:\/\/neobits.com.br\/wp-content\/uploads\/2022\/04\/sofware-developer-thinking-while-touching-beard-while-typing-laptop-sitting-desk-with-multiple-screens-parsing-code-focused-database-admin-working-with-team-coding-background.jpg","datePublished":"2022-04-26T19:03:42+00:00","dateModified":"2022-04-26T19:03:44+00:00","description":"neobits seguran\u00e7a da informa\u00e7\u00e3o 5 dicas para gest\u00e3o de documentos digitais.","breadcrumb":{"@id":"https:\/\/neobits.com.br\/?p=2688#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/neobits.com.br\/?p=2688"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/neobits.com.br\/?p=2688#primaryimage","url":"https:\/\/neobits.com.br\/wp-content\/uploads\/2022\/04\/sofware-developer-thinking-while-touching-beard-while-typing-laptop-sitting-desk-with-multiple-screens-parsing-code-focused-database-admin-working-with-team-coding-background.jpg","contentUrl":"https:\/\/neobits.com.br\/wp-content\/uploads\/2022\/04\/sofware-developer-thinking-while-touching-beard-while-typing-laptop-sitting-desk-with-multiple-screens-parsing-code-focused-database-admin-working-with-team-coding-background.jpg","width":1536,"height":864,"caption":"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"},{"@type":"BreadcrumbList","@id":"https:\/\/neobits.com.br\/?p=2688#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/neobits.com.br\/"},{"@type":"ListItem","position":2,"name":"Ciberseguran\u00e7a: as principais tend\u00eancias de 2022"}]},{"@type":"WebSite","@id":"https:\/\/neobits.com.br\/#website","url":"https:\/\/neobits.com.br\/","name":"neobits","description":"Seguran\u00e7a e Performance Tecnol\u00f3gica","publisher":{"@id":"https:\/\/neobits.com.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/neobits.com.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/neobits.com.br\/#organization","name":"Neobits Seguran\u00e7a e Performance","url":"https:\/\/neobits.com.br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/neobits.com.br\/#\/schema\/logo\/image\/","url":"https:\/\/neobits.com.br\/wp-content\/uploads\/2022\/03\/Ativo-2@4x.png","contentUrl":"https:\/\/neobits.com.br\/wp-content\/uploads\/2022\/03\/Ativo-2@4x.png","width":2514,"height":763,"caption":"Neobits Seguran\u00e7a e Performance"},"image":{"@id":"https:\/\/neobits.com.br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/neobits.com.br\/#\/schema\/person\/61147f35254c3459670bc95239388e7b","name":"Giovani Vargas Poletto","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/neobits.com.br\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15d40d9b6442065b5138e3f71d6934678f06fd34043e93c5a9431a5c5b0d9c74?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15d40d9b6442065b5138e3f71d6934678f06fd34043e93c5a9431a5c5b0d9c74?s=96&d=mm&r=g","caption":"Giovani Vargas Poletto"},"sameAs":["http:\/\/neobits.com.br"],"url":"https:\/\/neobits.com.br\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/neobits.com.br\/index.php?rest_route=\/wp\/v2\/posts\/2688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/neobits.com.br\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/neobits.com.br\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/neobits.com.br\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/neobits.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2688"}],"version-history":[{"count":7,"href":"https:\/\/neobits.com.br\/index.php?rest_route=\/wp\/v2\/posts\/2688\/revisions"}],"predecessor-version":[{"id":2697,"href":"https:\/\/neobits.com.br\/index.php?rest_route=\/wp\/v2\/posts\/2688\/revisions\/2697"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/neobits.com.br\/index.php?rest_route=\/wp\/v2\/media\/2690"}],"wp:attachment":[{"href":"https:\/\/neobits.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/neobits.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/neobits.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}