{"id":8142,"date":"2022-05-23T13:16:05","date_gmt":"2022-05-23T16:16:05","guid":{"rendered":"http:\/\/larsbrokers.com\/ciberseguridad-en-seguros\/"},"modified":"2022-05-23T13:16:29","modified_gmt":"2022-05-23T16:16:29","slug":"ciberseguridad-en-seguros","status":"publish","type":"post","link":"https:\/\/larsbrokers.com\/pt-br\/ciberseguridad-en-seguros\/","title":{"rendered":"Ciberserguridad en el sector asegurador"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:5%;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#f07e2d;--awb-font-size:52px;\"><h1 class=\"title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:52;line-height:1.4;\">LARS NETWORK<\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#008fa3;--awb-font-size:24px;\"><h2 class=\"title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:24;line-height:1.5;\">NEWS &amp; INSIGHTS<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:5%;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\"><h1 class=\"title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:34;line-height:1.4;\">Ciberseguridad en el sector Seguros<\/h1><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p style=\"font-size: 18px; font-weight: 200;\">Los ciberataques se han convertido en una amenaza cada vez m\u00e1s peligrosa para las empresas, especialmente durante la pandemia del Covid 19. Las infraestructuras tecnol\u00f3gicas de las aseguradoras se han puesto a prueba, mostrando sus vulnerabilidades.<\/p>\n<p style=\"font-size: 18px; font-weight: 200;\">La sofisticaci\u00f3n de los ciberataques y la evoluci\u00f3n de las tecnolog\u00edas est\u00e1n entre los principales problemas de las aseguradoras. Asimismo, la falta de recursos especializados en ciberseguridad, se han convertido en un agujero negro para las empresas aseguradoras. Esto crea una dependencia tecnol\u00f3gica enorme a la hora de prestar servicios de calidad y en el funcionamiento operativo de las entidades.<\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:45px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\"><h2 class=\"title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:18;--minFontSize:18;line-height:1.5;\">Tendencias en Ciberseguridad para sector asegurador<\/h2><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-4 fusion-content-boxes-1 content-boxes-icon-on-side content-left\" style=\"--awb-hover-accent-color:#a0ce4e;--awb-circle-hover-accent-color:#a0ce4e;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-content-padding-left:64px;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:#333333;border-width:1px;background-color:#333333;box-sizing:content-box;height:42px;width:42px;line-height:42px;border-radius:50%;font-size:21px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-circle fas circle-yes\"><\/i><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:18px;--fontSize:18;line-height:1.5;padding-left:64px;\">Modelo de Seguridad ZERO TRUST<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Principio de seguridad de red basado en la filosof\u00eda de que ninguna persona o dispositivo dentro o fuera de la red de una organizaci\u00f3n debe tener acceso para conectarse a sistemas o servicios de TI hasta que <em><strong>se autentique y se compruebe constantemente<\/strong><\/em>.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-content-padding-left:64px;\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:#333333;border-width:1px;background-color:#333333;box-sizing:content-box;height:42px;width:42px;line-height:42px;border-radius:50%;font-size:21px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-circle fas circle-yes\"><\/i><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:18px;--fontSize:18;line-height:1.5;padding-left:64px;\">Principios de Seguridad inform\u00e1tica<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Para que sea posible mantener la protecci\u00f3n ante las amenazas internas y externas, existen algunos principios de seguridad de la informaci\u00f3n, que son: <em><strong>confidencialidad<\/strong><\/em>, <em><strong>integridad<\/strong><\/em>, <em><strong>disponibilidad<\/strong><\/em> y <em><strong>autenticidad<\/strong><\/em>.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-content-padding-left:64px;\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:#333333;border-width:1px;background-color:#333333;box-sizing:content-box;height:42px;width:42px;line-height:42px;border-radius:50%;font-size:21px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-circle fas circle-yes\"><\/i><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:18px;--fontSize:18;line-height:1.5;padding-left:64px;\">Protecci\u00f3n endpoint<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>La seguridad para <em><strong>endpoints<\/strong> <\/em>hace referencia a la pr\u00e1ctica de proteger las redes empresariales contra las amenazas que se originan en los dispositivos remotos o locales. Estas tecnolog\u00edas permitir\u00e1n a las aseguradoras <em><strong>proteger y aislar<\/strong><\/em> los problemas que surjan en un ciberataque.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-content-padding-left:64px;\" class=\"fusion-column content-box-column content-box-column content-box-column-4 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:#333333;border-width:1px;background-color:#333333;box-sizing:content-box;height:42px;width:42px;line-height:42px;border-radius:50%;font-size:21px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-circle fas circle-yes\"><\/i><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:18px;--fontSize:18;line-height:1.5;padding-left:64px;\">Programa de Gesti\u00f3n<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>La gesti\u00f3n de la seguridad de terceras partes es el <em><strong>proceso de analizar y gestionar el riesgo asociado con proveedores de servicios<\/strong><\/em> que poseen de una u otra forma acceso a la informaci\u00f3n sensible de nuestra organizaci\u00f3n (informaci\u00f3n confidencial, propiedad intelectual, datos personales de clientes, informaci\u00f3n financiera, etc.). Es imprescindible para el futuro del sector asegurador que las organizaciones formen un proceso coherente para identificar, monitorizar, y analizar los m\u00faltiples riesgos provenientes de terceros.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\"><h2 class=\"title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:18;--minFontSize:18;line-height:1.5;\">Desaf\u00edos para las aseguradoras<\/h2><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-4 fusion-content-boxes-2 content-boxes-icon-on-side content-left\" style=\"--awb-hover-accent-color:#a0ce4e;--awb-circle-hover-accent-color:#a0ce4e;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-content-padding-left:64px;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:#333333;border-width:1px;background-color:#333333;box-sizing:content-box;height:42px;width:42px;line-height:42px;border-radius:50%;font-size:21px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-circle fas circle-yes\"><\/i><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:18px;--fontSize:18;line-height:1.5;padding-left:64px;\">Medidas formativas para empleados<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">Con el trabajo en remoto o h\u00edbrido como tendencia, la puerta de entrada para muchos hackers puede ser la falta de formaci\u00f3n de los equipos sobre ciberseguridad.<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-content-padding-left:64px;\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:#333333;border-width:1px;background-color:#333333;box-sizing:content-box;height:42px;width:42px;line-height:42px;border-radius:50%;font-size:21px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-circle fas circle-yes\"><\/i><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:18px;--fontSize:18;line-height:1.5;padding-left:64px;\">Ataques Ransomeware<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">Ha afectado de manera dr\u00e1stica a muchas empresas del sector, causando enormes p\u00e9rdidas. Las copias de seguridad y almacenamiento son poco efectivas ante estos ataques ya que evita que el usuario pueda ingresar a sus dispositivos. La gesti\u00f3n y el an\u00e1lisis de estos ataques ser\u00e1n esenciales para las empresas del sector asegurador, evitando cometer errores pasados.<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-content-padding-left:64px;\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:#333333;border-width:1px;background-color:#333333;box-sizing:content-box;height:42px;width:42px;line-height:42px;border-radius:50%;font-size:21px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-circle fas circle-yes\"><\/i><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:18px;--fontSize:18;line-height:1.5;padding-left:64px;\">Cambio de paradigma<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>El gran reto de las compa\u00f1\u00edas del sector en este 2022 ser\u00e1 <em><strong>modificar la mentalidad<\/strong><\/em> de aquellos que rechazan equivocadamente la <em><strong>inversi\u00f3n<\/strong> <\/em>en ciberseguridad, cambiando la visi\u00f3n de mero gasto a una necesidad b\u00e1sica.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-content-padding-left:64px;\" class=\"fusion-column content-box-column content-box-column content-box-column-4 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:#333333;border-width:1px;background-color:#333333;box-sizing:content-box;height:42px;width:42px;line-height:42px;border-radius:50%;font-size:21px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-circle fas circle-yes\"><\/i><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:18px;--fontSize:18;line-height:1.5;padding-left:64px;\">Nube<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Avanzar en la implementaci\u00f3n de tecnolog\u00edas <em><strong>Cloud<\/strong><\/em>, con los retos en materia de seguridad que conlleva. La <em><strong>ciberseguridad<\/strong> <\/em>deber\u00e1 de tratarse como tema principal en las compa\u00f1\u00edas de seguros, para evitar problemas a nivel de negocio y de reputaci\u00f3n.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-bottom:50px;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#008fa3;border-top-width:2px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" alt=\"CIF Logo\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-orig-src=\"http:\/\/larsbrokers.com\/wp-content\/uploads\/2018\/02\/cif-logo.png\" class=\"lazyload img-responsive\"\/><\/span><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:70px;margin-bottom:0px;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#008fa3;border-top-width:2px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-testimonials classic fusion-testimonials-1\" style=\"--awb-textcolor:#747474;--awb-backgroundcolor:#f6f6f6;\" data-random=\"0\" data-speed=\"4000\"><div class=\"reviews\"><div class=\"review active-testimonial no-avatar\"><blockquote><q class=\"fusion-clearfix\">\n<p style=\"text-align: center;\">We greatly appreciate your participation.<\/p>\n<p style=\"text-align: center;\">Thanks again for supporting our work.<\/p>\n<\/q><\/blockquote><div class=\"author\"><span class=\"company-name\"><strong>Robert Cackett &amp; Marcelo Rodriguez<\/strong>, <a href=\"http:\/\/larsbrokers.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span>LARS Network<\/span><\/a><\/span><\/div><\/div><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:25px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-2\"><p style=\"font-size: 18px; font-weight: 200;\">For further information please visit <a href=\"http:\/\/larsbrokers.com\/\">larsbrokers.com<\/a><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":8139,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[258],"tags":[342,347,303],"class_list":["post-8142","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-2022-pt-br","tag-ciberseguridad-pt-br","tag-noticias-pt-br"],"_links":{"self":[{"href":"https:\/\/larsbrokers.com\/pt-br\/wp-json\/wp\/v2\/posts\/8142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/larsbrokers.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/larsbrokers.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/larsbrokers.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/larsbrokers.com\/pt-br\/wp-json\/wp\/v2\/comments?post=8142"}],"version-history":[{"count":1,"href":"https:\/\/larsbrokers.com\/pt-br\/wp-json\/wp\/v2\/posts\/8142\/revisions"}],"predecessor-version":[{"id":8144,"href":"https:\/\/larsbrokers.com\/pt-br\/wp-json\/wp\/v2\/posts\/8142\/revisions\/8144"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/larsbrokers.com\/pt-br\/wp-json\/wp\/v2\/media\/8139"}],"wp:attachment":[{"href":"https:\/\/larsbrokers.com\/pt-br\/wp-json\/wp\/v2\/media?parent=8142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/larsbrokers.com\/pt-br\/wp-json\/wp\/v2\/categories?post=8142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/larsbrokers.com\/pt-br\/wp-json\/wp\/v2\/tags?post=8142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}