{"id":69,"date":"2025-06-25T14:08:54","date_gmt":"2025-06-25T17:08:54","guid":{"rendered":"https:\/\/bnftec.com\/?p=69"},"modified":"2025-07-29T07:10:38","modified_gmt":"2025-07-29T10:10:38","slug":"ciberataques-setor-saude","status":"publish","type":"post","link":"https:\/\/bnftec.com\/en\/ciberataques-setor-saude\/","title":{"rendered":"Why are healthcare companies frequent targets of cyberattacks?"},"content":{"rendered":"<p class=\"has-black-color has-text-color has-link-color wp-elements-68fb39784e0114a58bfaa429082a8021\" style=\"font-size:16px\"><strong>A sensitive sector, valuable data, and fragile security: the perfect combination for digital chaos. The cyberattack on the healthcare sector exemplifies how this vulnerability can be dramatically exploited.<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-78fcd709e0bba6332fde16bc40c49f04\" style=\"font-size:16px\">If you work in hospitals, clinics, laboratories or health insurance companies, pay attention: your sector is among the <strong>most targeted by cybercriminals worldwide<\/strong>. And that&#039;s no coincidence.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-1e40b7e5a0d1ecc2bffcc7467b7e0370\" style=\"font-size:16px\">By handling critical information daily\u2014often literally related to people&#039;s lives\u2014the healthcare sector becomes a breeding ground for cybercriminals who see its data as a gold mine.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color has-medium-font-size wp-elements-c84fc9fabbc5f44514db914c855b88e3\"><strong>Why is the healthcare sector such an attractive target?<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-f04cf1738092b11aab9a7712a7283ee6\" id=\"h-1-dados-extremamente-valiosos\" style=\"font-size:18px\">1. Extremely valuable data<\/h3>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-8394c9c28c94559ddf34ce7a18f013ad\" style=\"font-size:16px\">Electronic medical records, test results, diagnoses, medical histories, insurance plans, personal and banking data, and even biometrics. A single medical record can be valuable. <strong>up to 50 times more than credit card data<\/strong> on the illegal market.<br>In summary: <strong>where there is value, there is interest; and where there is interest, risk is imminent.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-8a7efb897edb51e9526c24141bb543ec\" id=\"h-2-infraestrutura-digital-defasada\" style=\"font-size:18px\">2. Outdated digital infrastructure<\/h3>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-279cd8f712a443416127367f06d63527\" style=\"font-size:16px\">Many healthcare institutions still operate with legacy systems that are poorly integrated and full of vulnerabilities.<br>Delayed updates, misconfigurations, and a lack of a clear security policy create the perfect combination for attacks.<br>And, in a sector where the priority is to save lives and speed up care, <strong>cybersecurity often takes a back seat<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-aaf1310da54a44284aa47462109f0bee\" id=\"h-3-alto-volume-e-complexidade-operacional\" style=\"font-size:18px\">3. High volume and operational complexity<\/h3>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-2f079f4b24209ad791cb86a745b102cc\" style=\"font-size:16px\">Every day, thousands of professionals access healthcare systems: doctors, nurses, technicians, administrators, and even external providers.<br><strong>Every access point is a potential gateway for cyberattacks.<\/strong><br>The advancement of the Internet of Medical Things (IoMT) \u2014 with connected equipment often lacking adequate protection \u2014 only expands this attack surface.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-bc2613c9e79061b313ee8cd7a554029e\" id=\"h-4-baixa-cultura-de-ciberseguranca\" style=\"font-size:18px\">4. Low cybersecurity culture<\/h3>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-ced73b4a1d1feacf3642308c9c706537\" style=\"font-size:16px\">The lack of training in good digital practices leaves professionals vulnerable to scams. <strong>social engineering, phishing and ransomware<\/strong>.<br>The human factor remains the weakest link in the security chain.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-4666c2c027e4d4f3ac87a474a042d03a\" style=\"font-size:18px\"><strong>The real impact of a health attack<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-433398251c436e2759a1e86f9f2cfebf\" style=\"font-size:16px\">The damage goes far beyond the financial:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-black-color has-text-color has-link-color wp-elements-2f6a841734e94c977c791fe49acfc4f9\" style=\"font-size:16px\">Service interruption and canceled surgeries<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-a3a7476bf8661993e28db2118a6ee2ee\" style=\"font-size:16px\">Leakage of confidential patient data<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-de6d9455fb0a8516d4006810c7e46337\" style=\"font-size:16px\">Heavy fines for non-compliance with the LGPD<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-a0dd3465f810028af334ddbe80f4c274\" style=\"font-size:16px\">Irreversible damage to the institution&#039;s reputation<\/li>\n<\/ul>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-8402ccdf75a2d76e7326eec73a7115f7\" style=\"font-size:16px\">In many cases, criminals hijack systems and demand <strong>million-dollar bailouts<\/strong>, while lives are at risk from hours or days of inactivity.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-35c70b97d571f7c56fd49150eb5bac84\" style=\"font-size:18px\"><strong>How to protect yourself?<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-e4d9052ba1a09384035c439773ed24df\" style=\"font-size:16px\">There is no single solution, but rather a strategic path: <strong>continued investment in cybersecurity<\/strong>.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-95b1f8bdf5687646620adf67b0d703e1\" style=\"font-size:16px\">BNF operates with a proactive, continuous and personalized protection model, including:<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-d4c0cc4194161508b0aa83527f20fecf\" style=\"font-size:16px\"><strong>Staff training and awareness<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-3bd27c69e8ae11f7f69f626994c3aad5\" style=\"font-size:16px\"><strong>24\/7 Monitoring<\/strong> of digital assets<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-4e74fa54d96840e1aaaec219e19f5d83\" style=\"font-size:16px\"><strong>Vulnerability testing (Pentest)<\/strong> to identify gaps<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-93005314b8b538e9d649be0bc50156cb\" style=\"font-size:16px\"><strong>Rapid incident response<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-e5b34e1271aeabbfec079e2b1459bc85\" style=\"font-size:16px\"><strong>Real-time intelligence<\/strong> to anticipate threats<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-d759291a79d89f2773f68264b3af4117\">Health can&#039;t wait. Neither can your safety.<\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-578a98b88e83872fac376667e989acd5\" style=\"font-size:16px\">If you work in the management of a healthcare company, the question is not <em>\u201cWill they attack me?\u201d<\/em>, but rather:<br><strong>\u201cWhen will they try, and how prepared will we be?\u201d<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-34d90e27a243e8986fcfc6b1006a1a03\" style=\"font-size:16px\"><strong>Don&#039;t wait for the crisis to knock on your door.<\/strong><br>Talk to BNF and make your institution&#039;s security a priority now.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>If you work in hospitals, clinics, laboratories, or health insurance companies, beware: your sector is among the most targeted by cybercriminals worldwide. And this is no coincidence.<\/p>","protected":false},"author":1,"featured_media":1918,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_joinchat":[],"footnotes":""},"categories":[1],"tags":[],"class_list":["post-69","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sem-categoria"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Por que empresas de sa\u00fade s\u00e3o alvos frequentes de ciberataques? - BNF Cyber Security<\/title>\n<meta name=\"description\" content=\"O setor sa\u00fade \u00e9 um alvo frequente de ciberataques. Aprenda como proteger informa\u00e7\u00f5es cr\u00edticas contra criminosos digitais.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bnftec.com\/en\/ciberataques-setor-saude\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Por que empresas de sa\u00fade s\u00e3o alvos frequentes de ciberataques?\" \/>\n<meta property=\"og:description\" content=\"O setor sa\u00fade \u00e9 um alvo frequente de ciberataques. Aprenda como proteger informa\u00e7\u00f5es cr\u00edticas contra criminosos digitais.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bnftec.com\/en\/ciberataques-setor-saude\/\" \/>\n<meta property=\"og:site_name\" content=\"BNF Cyber Security\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-25T17:08:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-29T10:10:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/06\/ciberseguranca_realista-1024x683.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"vimedigital\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"vimedigital\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/ciberataques-setor-saude\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/ciberataques-setor-saude\\\/\"},\"author\":{\"name\":\"vimedigital\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#\\\/schema\\\/person\\\/01d38ac69ac6d9f402e80e6c635a46a7\"},\"headline\":\"Por que empresas de sa\u00fade s\u00e3o alvos frequentes de ciberataques?\",\"datePublished\":\"2025-06-25T17:08:54+00:00\",\"dateModified\":\"2025-07-29T10:10:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/ciberataques-setor-saude\\\/\"},\"wordCount\":573,\"publisher\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/ciberataques-setor-saude\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/ciberseguranca_realista.png\",\"articleSection\":[\"Sem categoria\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/ciberataques-setor-saude\\\/\",\"url\":\"https:\\\/\\\/bnftec.com\\\/ciberataques-setor-saude\\\/\",\"name\":\"Por que empresas de sa\u00fade s\u00e3o alvos frequentes de ciberataques? - BNF Cyber Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/ciberataques-setor-saude\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/ciberataques-setor-saude\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/ciberseguranca_realista.png\",\"datePublished\":\"2025-06-25T17:08:54+00:00\",\"dateModified\":\"2025-07-29T10:10:38+00:00\",\"description\":\"O setor sa\u00fade \u00e9 um alvo frequente de ciberataques. Aprenda como proteger informa\u00e7\u00f5es cr\u00edticas contra criminosos digitais.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/ciberataques-setor-saude\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bnftec.com\\\/ciberataques-setor-saude\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/ciberataques-setor-saude\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/ciberseguranca_realista.png\",\"contentUrl\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/ciberseguranca_realista.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/ciberataques-setor-saude\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/bnftec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Por que empresas de sa\u00fade s\u00e3o alvos frequentes de ciberataques?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#website\",\"url\":\"https:\\\/\\\/bnftec.com\\\/\",\"name\":\"BNF Cyber Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bnftec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#organization\",\"name\":\"BNF Cyber Security\",\"url\":\"https:\\\/\\\/bnftec.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Modo_de_isolamento-1.png\",\"contentUrl\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Modo_de_isolamento-1.png\",\"width\":222,\"height\":89,\"caption\":\"BNF Cyber Security\"},\"image\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#\\\/schema\\\/person\\\/01d38ac69ac6d9f402e80e6c635a46a7\",\"name\":\"vimedigital\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d7dbe53eece634a2076988498bbac570d70dd2cc3b6816281e384e2799459c0?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d7dbe53eece634a2076988498bbac570d70dd2cc3b6816281e384e2799459c0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d7dbe53eece634a2076988498bbac570d70dd2cc3b6816281e384e2799459c0?s=96&d=mm&r=g\",\"caption\":\"vimedigital\"},\"sameAs\":[\"https:\\\/\\\/bnftec.com\"],\"url\":\"https:\\\/\\\/bnftec.com\\\/en\\\/author\\\/vimedigital\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Por que empresas de sa\u00fade s\u00e3o alvos frequentes de ciberataques? - BNF Cyber Security","description":"O setor sa\u00fade \u00e9 um alvo frequente de ciberataques. Aprenda como proteger informa\u00e7\u00f5es cr\u00edticas contra criminosos digitais.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bnftec.com\/en\/ciberataques-setor-saude\/","og_locale":"en_US","og_type":"article","og_title":"Por que empresas de sa\u00fade s\u00e3o alvos frequentes de ciberataques?","og_description":"O setor sa\u00fade \u00e9 um alvo frequente de ciberataques. Aprenda como proteger informa\u00e7\u00f5es cr\u00edticas contra criminosos digitais.","og_url":"https:\/\/bnftec.com\/en\/ciberataques-setor-saude\/","og_site_name":"BNF Cyber Security","article_published_time":"2025-06-25T17:08:54+00:00","article_modified_time":"2025-07-29T10:10:38+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/06\/ciberseguranca_realista-1024x683.png","type":"image\/png"}],"author":"vimedigital","twitter_card":"summary_large_image","twitter_misc":{"Written by":"vimedigital","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bnftec.com\/ciberataques-setor-saude\/#article","isPartOf":{"@id":"https:\/\/bnftec.com\/ciberataques-setor-saude\/"},"author":{"name":"vimedigital","@id":"https:\/\/bnftec.com\/#\/schema\/person\/01d38ac69ac6d9f402e80e6c635a46a7"},"headline":"Por que empresas de sa\u00fade s\u00e3o alvos frequentes de ciberataques?","datePublished":"2025-06-25T17:08:54+00:00","dateModified":"2025-07-29T10:10:38+00:00","mainEntityOfPage":{"@id":"https:\/\/bnftec.com\/ciberataques-setor-saude\/"},"wordCount":573,"publisher":{"@id":"https:\/\/bnftec.com\/#organization"},"image":{"@id":"https:\/\/bnftec.com\/ciberataques-setor-saude\/#primaryimage"},"thumbnailUrl":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/06\/ciberseguranca_realista.png","articleSection":["Sem categoria"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/bnftec.com\/ciberataques-setor-saude\/","url":"https:\/\/bnftec.com\/ciberataques-setor-saude\/","name":"Por que empresas de sa\u00fade s\u00e3o alvos frequentes de ciberataques? - BNF Cyber Security","isPartOf":{"@id":"https:\/\/bnftec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bnftec.com\/ciberataques-setor-saude\/#primaryimage"},"image":{"@id":"https:\/\/bnftec.com\/ciberataques-setor-saude\/#primaryimage"},"thumbnailUrl":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/06\/ciberseguranca_realista.png","datePublished":"2025-06-25T17:08:54+00:00","dateModified":"2025-07-29T10:10:38+00:00","description":"O setor sa\u00fade \u00e9 um alvo frequente de ciberataques. Aprenda como proteger informa\u00e7\u00f5es cr\u00edticas contra criminosos digitais.","breadcrumb":{"@id":"https:\/\/bnftec.com\/ciberataques-setor-saude\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bnftec.com\/ciberataques-setor-saude\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bnftec.com\/ciberataques-setor-saude\/#primaryimage","url":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/06\/ciberseguranca_realista.png","contentUrl":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/06\/ciberseguranca_realista.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/bnftec.com\/ciberataques-setor-saude\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/bnftec.com\/"},{"@type":"ListItem","position":2,"name":"Por que empresas de sa\u00fade s\u00e3o alvos frequentes de ciberataques?"}]},{"@type":"WebSite","@id":"https:\/\/bnftec.com\/#website","url":"https:\/\/bnftec.com\/","name":"BNF Cyber Security","description":"","publisher":{"@id":"https:\/\/bnftec.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bnftec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/bnftec.com\/#organization","name":"BNF Cyber Security","url":"https:\/\/bnftec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bnftec.com\/#\/schema\/logo\/image\/","url":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/07\/Modo_de_isolamento-1.png","contentUrl":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/07\/Modo_de_isolamento-1.png","width":222,"height":89,"caption":"BNF Cyber Security"},"image":{"@id":"https:\/\/bnftec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bnftec.com\/#\/schema\/person\/01d38ac69ac6d9f402e80e6c635a46a7","name":"vimedigital","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7d7dbe53eece634a2076988498bbac570d70dd2cc3b6816281e384e2799459c0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7d7dbe53eece634a2076988498bbac570d70dd2cc3b6816281e384e2799459c0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d7dbe53eece634a2076988498bbac570d70dd2cc3b6816281e384e2799459c0?s=96&d=mm&r=g","caption":"vimedigital"},"sameAs":["https:\/\/bnftec.com"],"url":"https:\/\/bnftec.com\/en\/author\/vimedigital\/"}]}},"_links":{"self":[{"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/posts\/69","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/comments?post=69"}],"version-history":[{"count":2,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/posts\/69\/revisions"}],"predecessor-version":[{"id":1917,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/posts\/69\/revisions\/1917"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/media\/1918"}],"wp:attachment":[{"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/media?parent=69"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/categories?post=69"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/tags?post=69"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}