{"id":74,"date":"2023-05-25T14:09:32","date_gmt":"2023-05-25T17:09:32","guid":{"rendered":"https:\/\/bnftec.com\/?p=74"},"modified":"2025-07-25T21:38:41","modified_gmt":"2025-07-26T00:38:41","slug":"pentest","status":"publish","type":"post","link":"https:\/\/bnftec.com\/en\/pentest\/","title":{"rendered":"Pentest: What it is, how it works and why your company needs it right now"},"content":{"rendered":"<p class=\"has-black-color has-text-color has-link-color wp-elements-70ee2c7afa973b33cbe458ca459613e8\">Cyber attacks happen every second and they don&#039;t care about the size of the company.<br>Waiting to be attacked before taking action can cost you <strong>data, money and reputation<\/strong>.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-0431f08493bed76f780ad64244ebc300\">This is where the <strong>Pentest<\/strong>, one of the most strategic practices in modern cybersecurity.<br>If your company deals with data \u2014 and they all do \u2014 it&#039;s time to understand why. <strong>you need a Pentest right now<\/strong>.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color has-medium-font-size wp-elements-e45a23cd8058ddd1cddfc745c20a05c4\"><strong>What is Pentest?<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-95dd4daf4ce7a5d05b38796e28595e03\">Pentest, or <strong>penetration test<\/strong>, is a <strong>controlled simulation of cyber attack<\/strong> made by specialized professionals.<br>The goal? <strong>Find vulnerabilities before criminals do.<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-11eb6b18b52e712e5e472ee8fbc87c87\">In practice, it&#039;s like hiring a <strong>\u201cgood hacker\u201d<\/strong> to try to break into your systems, identify weaknesses, and show you how you can better protect yourself.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color has-medium-font-size wp-elements-72dcdedcbde46b0b32de31f91afe7371\"><strong>How does a Pentest work?<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-f0d5f605ef990bbd1268eaa3a76272ed\">A Pentest follows <strong>well-defined steps, with methodology and ethics<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-black-color has-text-color has-link-color wp-elements-4c135e5e6fb5d9609953719cabc3bbdd\"><strong>Planning:<\/strong> definition of the scope and rules of the test.<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-7138096b3326dfc5141efcf6de3eefee\"><strong>Recognition:<\/strong> collecting information about the infrastructure.<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-d79a2de7cd3d2eb4406c32db7c1d7864\"><strong>Scanning and analysis:<\/strong> identification of flaws and vulnerabilities.<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-1841adc80b0278a47ac72a2ed1d981c0\"><strong>Exploration:<\/strong> controlled invasion attempts.<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-02355c89cd6b6e61b93daabcf9673046\"><strong>Report:<\/strong> technical and executive documentation with the vulnerabilities found, risks and correction recommendations.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-42a430f5663390facfcec7d3ceb5f50f\">This process can be done on different fronts:<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-e06d67b577e0091b1a06a4cb42ff19b9\"><strong>Application Pentest:<\/strong> focuses on systems, portals and applications used by the company.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-416bb354b63a541436881fabc0ff6906\"><strong>External Pentest:<\/strong> simulates attacks via the internet.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-bd82b13e0af862835ed17fa9f9922878\"><strong>Internal Pentest:<\/strong> simulates attacks from within the corporate network.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-c05c76cdc36b1364d0ffac03cb980b37\"><strong>Why does your company need a Pentest?<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-5503a8173f1defda6f182d89a205f921\">Why <strong>preventive security is cheaper, more effective and smarter<\/strong> than dealing with the consequences of an attack.<br>According to IBM, the <strong>average cost of a data breach in Brazil exceeded R$1.4 billion in 2024<\/strong>.<br>Investing in prevention is much cheaper than having to remedy it later.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-fcc0efd010c8c720ef07c1844ea7d26f\">With a Pentest, your company gains:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-black-color has-text-color has-link-color wp-elements-dab65c1015bbaafadb9383e612e15bd2\"><strong>Identifying real security breaches<\/strong><\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-69fba5015e5438f68b24085f55b3bdca\"><strong>Data leak prevention<\/strong><\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-615a4478b008836382f69d418efa2458\"><strong>Reduction of financial and reputational risks<\/strong><\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-2aca25de76cf3a11fed7647f41135aaa\"><strong>Compliance with standards and audits<\/strong> (LGPD, ISO 27001, etc.)<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-d89251960c0777b6225c8d7f9d907495\"><strong>More trust from customers and partners<\/strong><\/li>\n<\/ul>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-3d009aada69f8300f752a369a393b7c9\">In a scenario where a simple attack can paralyze systems, lose data and generate millions in losses, Pentest becomes an investment <strong>essential<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color has-medium-font-size wp-elements-b51f2ebd93afd8039ba69ee2fbeeb3d1\"><strong>BNF helps you protect what really matters<\/strong><\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-93cf3ab4d02abb16d94be64f27b63505\">In the <strong>BNF Technology<\/strong>, we carry out <strong>Pentests with a consultative approach<\/strong>, focusing on the context of your operation and delivering practical results for your business.<br>You receive a <strong>clear report<\/strong>, with the actual vulnerabilities found and a <strong>objective action plan<\/strong> \u2014 no technical jargon without practical application.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color has-medium-font-size wp-elements-621da7beee79e86a470c8fd18ec42bc9\"><strong>Don&#039;t wait for the next attack<\/strong><\/h3>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-29c0937575658fe57c878a6f437615f8\"><strong>Schedule a personalized diagnosis with our experts now<\/strong><br>and discover how to protect your business with high-impact Pentests.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Cyber attacks happen every second and they don&#039;t care about the size of the company.<br \/>\nWaiting to be attacked before taking action can cost you data, money, and reputation.<\/p>","protected":false},"author":1,"featured_media":683,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_joinchat":[],"footnotes":""},"categories":[1],"tags":[],"class_list":["post-74","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sem-categoria"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Pentest: A Import\u00e2ncia da Seguran\u00e7a Cibern\u00e9tica<\/title>\n<meta name=\"description\" content=\"Entenda a import\u00e2ncia do Pentest para a seguran\u00e7a da sua empresa. Proteja dados e reputa\u00e7\u00e3o com testes de intrus\u00e3o eficazes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bnftec.com\/en\/pentest\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pentest: O que \u00e9, como funciona e por que sua empresa precisa agora mesmo\" \/>\n<meta property=\"og:description\" content=\"Entenda a import\u00e2ncia do Pentest para a seguran\u00e7a da sua empresa. Proteja dados e reputa\u00e7\u00e3o com testes de intrus\u00e3o eficazes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bnftec.com\/en\/pentest\/\" \/>\n<meta property=\"og:site_name\" content=\"BNF Cyber Security\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-25T17:09:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-26T00:38:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bnftec.com\/wp-content\/uploads\/2023\/05\/7bd75902672897bc04c686264ed710bbedb1b362-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1706\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"vimedigital\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"vimedigital\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/pentest\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/pentest\\\/\"},\"author\":{\"name\":\"vimedigital\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#\\\/schema\\\/person\\\/01d38ac69ac6d9f402e80e6c635a46a7\"},\"headline\":\"Pentest: O que \u00e9, como funciona e por que sua empresa precisa agora mesmo\",\"datePublished\":\"2023-05-25T17:09:32+00:00\",\"dateModified\":\"2025-07-26T00:38:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/pentest\\\/\"},\"wordCount\":455,\"publisher\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/pentest\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/7bd75902672897bc04c686264ed710bbedb1b362-scaled.jpg\",\"articleSection\":[\"Sem categoria\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/pentest\\\/\",\"url\":\"https:\\\/\\\/bnftec.com\\\/pentest\\\/\",\"name\":\"Pentest: A Import\u00e2ncia da Seguran\u00e7a Cibern\u00e9tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/pentest\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/pentest\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/7bd75902672897bc04c686264ed710bbedb1b362-scaled.jpg\",\"datePublished\":\"2023-05-25T17:09:32+00:00\",\"dateModified\":\"2025-07-26T00:38:41+00:00\",\"description\":\"Entenda a import\u00e2ncia do Pentest para a seguran\u00e7a da sua empresa. Proteja dados e reputa\u00e7\u00e3o com testes de intrus\u00e3o eficazes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/pentest\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bnftec.com\\\/pentest\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/pentest\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/7bd75902672897bc04c686264ed710bbedb1b362-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/7bd75902672897bc04c686264ed710bbedb1b362-scaled.jpg\",\"width\":2560,\"height\":1706},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/pentest\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/bnftec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pentest: O que \u00e9, como funciona e por que sua empresa precisa agora mesmo\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#website\",\"url\":\"https:\\\/\\\/bnftec.com\\\/\",\"name\":\"BNF Cyber Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bnftec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#organization\",\"name\":\"BNF Cyber Security\",\"url\":\"https:\\\/\\\/bnftec.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Modo_de_isolamento-1.png\",\"contentUrl\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Modo_de_isolamento-1.png\",\"width\":222,\"height\":89,\"caption\":\"BNF Cyber Security\"},\"image\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#\\\/schema\\\/person\\\/01d38ac69ac6d9f402e80e6c635a46a7\",\"name\":\"vimedigital\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d7dbe53eece634a2076988498bbac570d70dd2cc3b6816281e384e2799459c0?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d7dbe53eece634a2076988498bbac570d70dd2cc3b6816281e384e2799459c0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d7dbe53eece634a2076988498bbac570d70dd2cc3b6816281e384e2799459c0?s=96&d=mm&r=g\",\"caption\":\"vimedigital\"},\"sameAs\":[\"https:\\\/\\\/bnftec.com\"],\"url\":\"https:\\\/\\\/bnftec.com\\\/en\\\/author\\\/vimedigital\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Pentest: A Import\u00e2ncia da Seguran\u00e7a Cibern\u00e9tica","description":"Entenda a import\u00e2ncia do Pentest para a seguran\u00e7a da sua empresa. Proteja dados e reputa\u00e7\u00e3o com testes de intrus\u00e3o eficazes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bnftec.com\/en\/pentest\/","og_locale":"en_US","og_type":"article","og_title":"Pentest: O que \u00e9, como funciona e por que sua empresa precisa agora mesmo","og_description":"Entenda a import\u00e2ncia do Pentest para a seguran\u00e7a da sua empresa. Proteja dados e reputa\u00e7\u00e3o com testes de intrus\u00e3o eficazes.","og_url":"https:\/\/bnftec.com\/en\/pentest\/","og_site_name":"BNF Cyber Security","article_published_time":"2023-05-25T17:09:32+00:00","article_modified_time":"2025-07-26T00:38:41+00:00","og_image":[{"width":2560,"height":1706,"url":"https:\/\/bnftec.com\/wp-content\/uploads\/2023\/05\/7bd75902672897bc04c686264ed710bbedb1b362-scaled.jpg","type":"image\/jpeg"}],"author":"vimedigital","twitter_card":"summary_large_image","twitter_misc":{"Written by":"vimedigital","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bnftec.com\/pentest\/#article","isPartOf":{"@id":"https:\/\/bnftec.com\/pentest\/"},"author":{"name":"vimedigital","@id":"https:\/\/bnftec.com\/#\/schema\/person\/01d38ac69ac6d9f402e80e6c635a46a7"},"headline":"Pentest: O que \u00e9, como funciona e por que sua empresa precisa agora mesmo","datePublished":"2023-05-25T17:09:32+00:00","dateModified":"2025-07-26T00:38:41+00:00","mainEntityOfPage":{"@id":"https:\/\/bnftec.com\/pentest\/"},"wordCount":455,"publisher":{"@id":"https:\/\/bnftec.com\/#organization"},"image":{"@id":"https:\/\/bnftec.com\/pentest\/#primaryimage"},"thumbnailUrl":"https:\/\/bnftec.com\/wp-content\/uploads\/2023\/05\/7bd75902672897bc04c686264ed710bbedb1b362-scaled.jpg","articleSection":["Sem categoria"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/bnftec.com\/pentest\/","url":"https:\/\/bnftec.com\/pentest\/","name":"Pentest: A Import\u00e2ncia da Seguran\u00e7a Cibern\u00e9tica","isPartOf":{"@id":"https:\/\/bnftec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bnftec.com\/pentest\/#primaryimage"},"image":{"@id":"https:\/\/bnftec.com\/pentest\/#primaryimage"},"thumbnailUrl":"https:\/\/bnftec.com\/wp-content\/uploads\/2023\/05\/7bd75902672897bc04c686264ed710bbedb1b362-scaled.jpg","datePublished":"2023-05-25T17:09:32+00:00","dateModified":"2025-07-26T00:38:41+00:00","description":"Entenda a import\u00e2ncia do Pentest para a seguran\u00e7a da sua empresa. Proteja dados e reputa\u00e7\u00e3o com testes de intrus\u00e3o eficazes.","breadcrumb":{"@id":"https:\/\/bnftec.com\/pentest\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bnftec.com\/pentest\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bnftec.com\/pentest\/#primaryimage","url":"https:\/\/bnftec.com\/wp-content\/uploads\/2023\/05\/7bd75902672897bc04c686264ed710bbedb1b362-scaled.jpg","contentUrl":"https:\/\/bnftec.com\/wp-content\/uploads\/2023\/05\/7bd75902672897bc04c686264ed710bbedb1b362-scaled.jpg","width":2560,"height":1706},{"@type":"BreadcrumbList","@id":"https:\/\/bnftec.com\/pentest\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/bnftec.com\/"},{"@type":"ListItem","position":2,"name":"Pentest: O que \u00e9, como funciona e por que sua empresa precisa agora mesmo"}]},{"@type":"WebSite","@id":"https:\/\/bnftec.com\/#website","url":"https:\/\/bnftec.com\/","name":"BNF Cyber Security","description":"","publisher":{"@id":"https:\/\/bnftec.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bnftec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/bnftec.com\/#organization","name":"BNF Cyber Security","url":"https:\/\/bnftec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bnftec.com\/#\/schema\/logo\/image\/","url":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/07\/Modo_de_isolamento-1.png","contentUrl":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/07\/Modo_de_isolamento-1.png","width":222,"height":89,"caption":"BNF Cyber Security"},"image":{"@id":"https:\/\/bnftec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bnftec.com\/#\/schema\/person\/01d38ac69ac6d9f402e80e6c635a46a7","name":"vimedigital","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7d7dbe53eece634a2076988498bbac570d70dd2cc3b6816281e384e2799459c0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7d7dbe53eece634a2076988498bbac570d70dd2cc3b6816281e384e2799459c0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d7dbe53eece634a2076988498bbac570d70dd2cc3b6816281e384e2799459c0?s=96&d=mm&r=g","caption":"vimedigital"},"sameAs":["https:\/\/bnftec.com"],"url":"https:\/\/bnftec.com\/en\/author\/vimedigital\/"}]}},"_links":{"self":[{"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/posts\/74","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/comments?post=74"}],"version-history":[{"count":0,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/posts\/74\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/media\/683"}],"wp:attachment":[{"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/media?parent=74"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/categories?post=74"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/tags?post=74"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}