{"id":10645,"date":"2023-07-14T09:01:25","date_gmt":"2023-07-14T12:01:25","guid":{"rendered":"https:\/\/www.mpl.com.br\/?p=10645"},"modified":"2023-07-14T09:01:25","modified_gmt":"2023-07-14T12:01:25","slug":"cyber-security-nao-e-so-problema-de-ti","status":"publish","type":"post","link":"https:\/\/www.mpl.com.br\/en\/cyber-security-nao-e-so-problema-de-ti\/","title":{"rendered":"Cyber Security is not just an IT problem!"},"content":{"rendered":"<p>If we look for what \u201cCyber Security\u201d means, in addition to advertisements for security companies, we will find many similar definitions. Some more, others less complete, but the vast majority focusing on the practice, policy or security methodology, involving computers, servers, mobile devices, electronic systems, networks, data, etc.<\/p>\n<p>By interpreting all these technical details, we understand that the problem is IT, correct? The answer is no.<\/p>\n<p>A few years ago, these definitions could have been correct, but bringing them to current times, we see that they are incomplete. A new character emerges, as a victim, but also as the cause of the security breach or even as a vector for the propagation of malicious codes: the human being, the user of technology.<\/p>\n<p>In many events, it is normally he who opens or forwards an improper email, who uses a pen drive of unknown origin, who does not keep his passwords properly, who uses or allows the work equipment to be used for other activities. In short, it was the time that a malicious code or a \u201chacker\u201d did the work alone.<\/p>\n<p>Understanding this and becoming aware that it is not enough to have the most up-to-date antivirus, the most secure networks and state-of-the-art encryption, but also that it is necessary to create internal policies that establish constant user training, which bring more responsibility and even extend the good practices for the family environment, is a fundamental condition for a good safety practice.<\/p>\n<p>In addition to this concern with the correct use of resources, equipment and IT infrastructure, many companies already implement an austere policy regarding security when contracting new applications, systems and partners. Usually, an extensive questionnaire on this topic is applied to ensure that the contracted third party is also complying with essential security measures.<\/p>\n<p>See this and other measures that will help you to better understand the subject at the link <a href=\"https:\/\/www.egonzehnder.com\/rewiring-boardroom-cybersecurity\/chapter-1-the-broken-state-of-cybersecurity-governance\" target=\"_blank\" rel=\"noopener\">https:\/\/www.egonzehnder.com\/rewiring-boardroom-cybersecurity\/chapter-1-the-broken-state-of-cybersecurity-governance<\/a><\/p>\n<p>There needs to be a collective conscience. Cybersecurity is everyone&#039;s problem.<\/p>","protected":false},"excerpt":{"rendered":"<p>If we look up what \"Cyber Security\" means, beyond the advertisements of security companies, we will find many similar definitions. Some more, some less, but the vast majority focus on the practice, policy or methodology of security, involving computers, servers, mobile devices,...<\/p>","protected":false},"author":10,"featured_media":10646,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-10645","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security n\u00e3o \u00e9 s\u00f3 problema de TI! - MPL - Excel\u00eancia em Transforma\u00e7\u00e3o Digital e ERP JD Edwards<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mpl.com.br\/en\/cyber-security-nao-e-so-problema-de-ti\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security n\u00e3o \u00e9 s\u00f3 problema de TI! - MPL - Excel\u00eancia em Transforma\u00e7\u00e3o Digital e ERP JD Edwards\" \/>\n<meta property=\"og:description\" content=\"Se formos procurar o que significa \u201cCyber Security\u201d, al\u00e9m das propagandas de empresas de seguran\u00e7a, encontraremos muitas defini\u00e7\u00f5es semelhantes. Umas mais, outras menos completas, mas a grande maioria tendo como foco a pr\u00e1tica, a pol\u00edtica ou a metodologia de seguran\u00e7a, envolvendo computadores, servidores, dispositivos m\u00f3veis,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mpl.com.br\/en\/cyber-security-nao-e-so-problema-de-ti\/\" \/>\n<meta property=\"og:site_name\" content=\"MPL - Excel\u00eancia em Transforma\u00e7\u00e3o Digital e ERP JD Edwards\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/pages\/MPL-Corporate-Software\/142291315809464\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-14T12:01:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mpl.com.br\/wp-content\/uploads\/2023\/07\/cyberseguranca.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1049\" \/>\n\t<meta property=\"og:image:height\" content=\"701\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simone Taveira\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mpl_\" \/>\n<meta name=\"twitter:site\" content=\"@mpl_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simone Taveira\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/cyber-security-nao-e-so-problema-de-ti\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/cyber-security-nao-e-so-problema-de-ti\\\/\"},\"author\":{\"name\":\"Simone Taveira\",\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/#\\\/schema\\\/person\\\/65f82d8087c26afa63918ae21fc11c97\"},\"headline\":\"Cyber Security n\u00e3o \u00e9 s\u00f3 problema de TI!\",\"datePublished\":\"2023-07-14T12:01:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/cyber-security-nao-e-so-problema-de-ti\\\/\"},\"wordCount\":375,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/cyber-security-nao-e-so-problema-de-ti\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mpl.com.br\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/cyberseguranca.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mpl.com.br\\\/cyber-security-nao-e-so-problema-de-ti\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/cyber-security-nao-e-so-problema-de-ti\\\/\",\"url\":\"https:\\\/\\\/www.mpl.com.br\\\/cyber-security-nao-e-so-problema-de-ti\\\/\",\"name\":\"Cyber Security n\u00e3o \u00e9 s\u00f3 problema de TI! - MPL - Excel\u00eancia em Transforma\u00e7\u00e3o Digital e ERP JD Edwards\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/cyber-security-nao-e-so-problema-de-ti\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/cyber-security-nao-e-so-problema-de-ti\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mpl.com.br\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/cyberseguranca.jpg\",\"datePublished\":\"2023-07-14T12:01:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/cyber-security-nao-e-so-problema-de-ti\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mpl.com.br\\\/cyber-security-nao-e-so-problema-de-ti\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/cyber-security-nao-e-so-problema-de-ti\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mpl.com.br\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/cyberseguranca.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mpl.com.br\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/cyberseguranca.jpg\",\"width\":1049,\"height\":701},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/cyber-security-nao-e-so-problema-de-ti\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mpl.com.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security n\u00e3o \u00e9 s\u00f3 problema de TI!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/#website\",\"url\":\"https:\\\/\\\/www.mpl.com.br\\\/\",\"name\":\"MPL - Solu\u00e7\u00f5es em ERP Oracle JD Edwards e Transforma\u00e7\u00e3o Digital\",\"description\":\"A MPL \u00e9 l\u00edder em solu\u00e7\u00f5es de transforma\u00e7\u00e3o digital, integra\u00e7\u00e3o de sistemas e consultoria em Oracle JD Edwards. Potencialize sua empresa com inova\u00e7\u00e3o e automa\u00e7\u00e3o de processos.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/#organization\"},\"alternateName\":\"ERP Oracle JD Edwards\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mpl.com.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/#organization\",\"name\":\"MPL - Solu\u00e7\u00f5es em ERP Oracle JD Edwards e Transforma\u00e7\u00e3o Digital\",\"alternateName\":\"ERP Oracle JD Edwards\",\"url\":\"https:\\\/\\\/www.mpl.com.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mpl.com.br\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/logoMPL.png\",\"contentUrl\":\"https:\\\/\\\/www.mpl.com.br\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/logoMPL.png\",\"width\":469,\"height\":116,\"caption\":\"MPL - Solu\u00e7\u00f5es em ERP Oracle JD Edwards e Transforma\u00e7\u00e3o Digital\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/pages\\\/MPL-Corporate-Software\\\/142291315809464\",\"https:\\\/\\\/x.com\\\/mpl_\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCVsLH6x9u-CF8R2yxLmvBZA\\\/featured\",\"http:\\\/\\\/www.linkedin.com\\\/company\\\/216460\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mpl.com.br\\\/#\\\/schema\\\/person\\\/65f82d8087c26afa63918ae21fc11c97\",\"name\":\"Simone Taveira\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8056739a2cce9c7ec9efafd16f00d70e40d7507574975ddbd17aa3a76bc3a318?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8056739a2cce9c7ec9efafd16f00d70e40d7507574975ddbd17aa3a76bc3a318?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8056739a2cce9c7ec9efafd16f00d70e40d7507574975ddbd17aa3a76bc3a318?s=96&d=mm&r=g\",\"caption\":\"Simone Taveira\"},\"url\":\"https:\\\/\\\/www.mpl.com.br\\\/en\\\/author\\\/simonempl-com-br\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security n\u00e3o \u00e9 s\u00f3 problema de TI! - MPL - Excel\u00eancia em Transforma\u00e7\u00e3o Digital e ERP JD Edwards","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mpl.com.br\/en\/cyber-security-nao-e-so-problema-de-ti\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security n\u00e3o \u00e9 s\u00f3 problema de TI! - MPL - Excel\u00eancia em Transforma\u00e7\u00e3o Digital e ERP JD Edwards","og_description":"Se formos procurar o que significa \u201cCyber Security\u201d, al\u00e9m das propagandas de empresas de seguran\u00e7a, encontraremos muitas defini\u00e7\u00f5es semelhantes. Umas mais, outras menos completas, mas a grande maioria tendo como foco a pr\u00e1tica, a pol\u00edtica ou a metodologia de seguran\u00e7a, envolvendo computadores, servidores, dispositivos m\u00f3veis,...","og_url":"https:\/\/www.mpl.com.br\/en\/cyber-security-nao-e-so-problema-de-ti\/","og_site_name":"MPL - Excel\u00eancia em Transforma\u00e7\u00e3o Digital e ERP JD Edwards","article_publisher":"https:\/\/facebook.com\/pages\/MPL-Corporate-Software\/142291315809464","article_published_time":"2023-07-14T12:01:25+00:00","og_image":[{"width":1049,"height":701,"url":"https:\/\/www.mpl.com.br\/wp-content\/uploads\/2023\/07\/cyberseguranca.jpg","type":"image\/jpeg"}],"author":"Simone Taveira","twitter_card":"summary_large_image","twitter_creator":"@mpl_","twitter_site":"@mpl_","twitter_misc":{"Written by":"Simone Taveira","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mpl.com.br\/cyber-security-nao-e-so-problema-de-ti\/#article","isPartOf":{"@id":"https:\/\/www.mpl.com.br\/cyber-security-nao-e-so-problema-de-ti\/"},"author":{"name":"Simone Taveira","@id":"https:\/\/www.mpl.com.br\/#\/schema\/person\/65f82d8087c26afa63918ae21fc11c97"},"headline":"Cyber Security n\u00e3o \u00e9 s\u00f3 problema de TI!","datePublished":"2023-07-14T12:01:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mpl.com.br\/cyber-security-nao-e-so-problema-de-ti\/"},"wordCount":375,"commentCount":0,"publisher":{"@id":"https:\/\/www.mpl.com.br\/#organization"},"image":{"@id":"https:\/\/www.mpl.com.br\/cyber-security-nao-e-so-problema-de-ti\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mpl.com.br\/wp-content\/uploads\/2023\/07\/cyberseguranca.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mpl.com.br\/cyber-security-nao-e-so-problema-de-ti\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mpl.com.br\/cyber-security-nao-e-so-problema-de-ti\/","url":"https:\/\/www.mpl.com.br\/cyber-security-nao-e-so-problema-de-ti\/","name":"Cyber Security n\u00e3o \u00e9 s\u00f3 problema de TI! - MPL - Excel\u00eancia em Transforma\u00e7\u00e3o Digital e ERP JD Edwards","isPartOf":{"@id":"https:\/\/www.mpl.com.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mpl.com.br\/cyber-security-nao-e-so-problema-de-ti\/#primaryimage"},"image":{"@id":"https:\/\/www.mpl.com.br\/cyber-security-nao-e-so-problema-de-ti\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mpl.com.br\/wp-content\/uploads\/2023\/07\/cyberseguranca.jpg","datePublished":"2023-07-14T12:01:25+00:00","breadcrumb":{"@id":"https:\/\/www.mpl.com.br\/cyber-security-nao-e-so-problema-de-ti\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mpl.com.br\/cyber-security-nao-e-so-problema-de-ti\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mpl.com.br\/cyber-security-nao-e-so-problema-de-ti\/#primaryimage","url":"https:\/\/www.mpl.com.br\/wp-content\/uploads\/2023\/07\/cyberseguranca.jpg","contentUrl":"https:\/\/www.mpl.com.br\/wp-content\/uploads\/2023\/07\/cyberseguranca.jpg","width":1049,"height":701},{"@type":"BreadcrumbList","@id":"https:\/\/www.mpl.com.br\/cyber-security-nao-e-so-problema-de-ti\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mpl.com.br\/"},{"@type":"ListItem","position":2,"name":"Cyber Security n\u00e3o \u00e9 s\u00f3 problema de TI!"}]},{"@type":"WebSite","@id":"https:\/\/www.mpl.com.br\/#website","url":"https:\/\/www.mpl.com.br\/","name":"MPL - Solu\u00e7\u00f5es em ERP Oracle JD Edwards e Transforma\u00e7\u00e3o Digital","description":"MPL is a leader in digital transformation solutions, systems integration and Oracle JD Edwards consulting. Empower your company with innovation and process automation.","publisher":{"@id":"https:\/\/www.mpl.com.br\/#organization"},"alternateName":"ERP Oracle JD Edwards","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mpl.com.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mpl.com.br\/#organization","name":"MPL - Solu\u00e7\u00f5es em ERP Oracle JD Edwards e Transforma\u00e7\u00e3o Digital","alternateName":"ERP Oracle JD Edwards","url":"https:\/\/www.mpl.com.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mpl.com.br\/#\/schema\/logo\/image\/","url":"https:\/\/www.mpl.com.br\/wp-content\/uploads\/2022\/04\/logoMPL.png","contentUrl":"https:\/\/www.mpl.com.br\/wp-content\/uploads\/2022\/04\/logoMPL.png","width":469,"height":116,"caption":"MPL - Solu\u00e7\u00f5es em ERP Oracle JD Edwards e Transforma\u00e7\u00e3o Digital"},"image":{"@id":"https:\/\/www.mpl.com.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/pages\/MPL-Corporate-Software\/142291315809464","https:\/\/x.com\/mpl_","https:\/\/www.youtube.com\/channel\/UCVsLH6x9u-CF8R2yxLmvBZA\/featured","http:\/\/www.linkedin.com\/company\/216460"]},{"@type":"Person","@id":"https:\/\/www.mpl.com.br\/#\/schema\/person\/65f82d8087c26afa63918ae21fc11c97","name":"Simone Taveira","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8056739a2cce9c7ec9efafd16f00d70e40d7507574975ddbd17aa3a76bc3a318?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8056739a2cce9c7ec9efafd16f00d70e40d7507574975ddbd17aa3a76bc3a318?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8056739a2cce9c7ec9efafd16f00d70e40d7507574975ddbd17aa3a76bc3a318?s=96&d=mm&r=g","caption":"Simone Taveira"},"url":"https:\/\/www.mpl.com.br\/en\/author\/simonempl-com-br\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mpl.com.br\/en\/wp-json\/wp\/v2\/posts\/10645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mpl.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mpl.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mpl.com.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mpl.com.br\/en\/wp-json\/wp\/v2\/comments?post=10645"}],"version-history":[{"count":0,"href":"https:\/\/www.mpl.com.br\/en\/wp-json\/wp\/v2\/posts\/10645\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mpl.com.br\/en\/wp-json\/wp\/v2\/media\/10646"}],"wp:attachment":[{"href":"https:\/\/www.mpl.com.br\/en\/wp-json\/wp\/v2\/media?parent=10645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mpl.com.br\/en\/wp-json\/wp\/v2\/categories?post=10645"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mpl.com.br\/en\/wp-json\/wp\/v2\/tags?post=10645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}