{"id":2015,"date":"2025-12-03T11:36:47","date_gmt":"2025-12-03T14:36:47","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2015"},"modified":"2025-12-03T11:36:47","modified_gmt":"2025-12-03T14:36:47","slug":"cybersecurity-in-healthcare-a-challenge-for-data-sharing","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/","title":{"rendered":"A ciberseguran\u00e7a na \u00e1rea da sa\u00fade: um desafio para o compartilhamento de dados"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">A tecnologia da informa\u00e7\u00e3o \u00e9 capaz de transformar v\u00e1rios processos, sendo cada vez mais usada para torn\u00e1-los mais \u00e1geis e eficazes. Assim, n\u00e3o \u00e9 nenhuma novidade que a tecnologia tamb\u00e9m ocupe um espa\u00e7o cada vez maior na \u00e1rea da  sa\u00fade, como nos registros de dados dos pacientes em prontu\u00e1rios e laudos eletr\u00f4nicos.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mais recentemente, h\u00e1 uma demanda pela \"portabilidade de dados\", ou seja, para que os dados dos pacientes sejam digitalizados para facilitar a migra\u00e7\u00e3o entre planos de sa\u00fade. A ideia \u00e9 que os dados estejam dispon\u00edveis a qualquer institui\u00e7\u00e3o que realize um atendimento.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Por\u00e9m, o desenvolvimento de sistemas de informa\u00e7\u00e3o nem sempre andou no mesmo ritmo para todas as institui\u00e7\u00f5es, o que se manifesta em problemas t\u00e9cnicos para esse compartilhamento. Nem todos os sistemas \"conversam\" entre si.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00c9 bastante prov\u00e1vel que essa mudan\u00e7a ocorra nos pr\u00f3ximos anos por meio de bases de dados padronizadas por entidades regulat\u00f3rias ou solu\u00e7\u00f5es criadas por organiza\u00e7\u00f5es especializadas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Isso significa que os dados sempre estar\u00e3o em um formato digital, mesmo que sua coleta inicial seja estritamente \"anal\u00f3gica\". Como consequ\u00eancia disso, a seguran\u00e7a dos sistemas de informa\u00e7\u00e3o das institui\u00e7\u00f5es de sa\u00fade se tornar\u00e1 cada vez mais relevante.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">A contribui\u00e7\u00e3o do colaborador<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">A integra\u00e7\u00e3o dos sistemas digitais de sa\u00fade significa que diversos dados essenciais para atender os pacientes estar\u00e3o dispon\u00edveis digitalmente, como prescri\u00e7\u00f5es, alergias, procedimentos anteriores, medica\u00e7\u00f5es de uso cont\u00ednuo, entre outros.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Al\u00e9m disso, hospitais, cl\u00ednicas e planos de sa\u00fade tamb\u00e9m s\u00e3o organiza\u00e7\u00f5es que dependem de departamentos administrativos e, como em qualquer outra organiza\u00e7\u00e3o moderna, esses departamentos j\u00e1 adaptaram (ou est\u00e3o adaptando) suas rotinas aos canais digitais.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Entretanto, conforme o trabalho di\u00e1rio se integra \u00e0 tecnologia, precisamos ter a consci\u00eancia de que eles tamb\u00e9m ficam sujeitos aos riscos decorrentes de falhas, ataques e incidentes ligados \u00e0 seguran\u00e7a digital.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Como muitos dispositivos est\u00e3o conectados, qualquer colaborador pode acabar cometendo erros ou sendo enganado por um invasor para realizar uma a\u00e7\u00e3o que leve a um incidente. Phishing e malware s\u00e3o exemplos desse cen\u00e1rio. Portanto, conhecer as t\u00e1ticas dos invasores e saber como evitar esses ataques \u00e9 uma forma de contribuir com a seguran\u00e7a da institui\u00e7\u00e3o e dos pacientes.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">O compartilhamento e a privacidade<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Embora os dados da sa\u00fade devam ser preferencialmente padronizados e disponibilizados em favor dos pacientes, o direito \u00e0 intimidade e \u00e0 privacidade das informa\u00e7\u00f5es tamb\u00e9m precisa ser resguardado.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">J\u00e1 existem casos em que criminosos usam dados de exames e procedimentos para enganar o paciente. Eles se passam por representantes de hospitais para cobrar valores por servi\u00e7os quitados, cobertos pelo plano de sa\u00fade ou prestados pelo SUS. Hoje, esses golpes dependem de uma invas\u00e3o dos sistemas que guardam dados de sa\u00fade \u2013 muitas vezes por meio de ataques contra os colaboradores das institui\u00e7\u00f5es \u2013, mas esses casos podem se agravar conforme a integra\u00e7\u00e3o dos dados evolui.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Como sociedade, ainda estamos descobrindo o caminho para chegar no ponto certo, mas n\u00e3o podemos perder de vista os benef\u00edcios que essas mudan\u00e7as podem trazer. A lei brasileira, por exemplo, j\u00e1 prev\u00ea a autoriza\u00e7\u00e3o para o compartilhamento em benef\u00edcio do paciente.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Todavia, \u00e9 preciso que tenhamos consci\u00eancia sobre o direito \u00e0 privacidade e sobre a necessidade de se atentar a situa\u00e7\u00f5es que podem colocar esse direito em risco, principalmente quando n\u00e3o \u00e9 poss\u00edvel validar a autenticidade de um pedido de informa\u00e7\u00e3o.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A evolu\u00e7\u00e3o das plataformas de compartilhamento e armazenamento de dados de pacientes aumentar\u00e1 o fluxo de informa\u00e7\u00f5es, o que significa que ser\u00e1 necess\u00e1rio tomar um cuidado maior com esses dados. A seguran\u00e7a da informa\u00e7\u00e3o, seja atrav\u00e9s dos especialistas da \u00e1rea ou <a href=\"https:\/\/hackerrangers.siteup.dev\/pt\/gamification\/ciberatitudes-como-medir-mudanca-de-comportamento\/\">da contribui\u00e7\u00e3o de cada colaborador na preven\u00e7\u00e3o de riscos<\/a>, ser\u00e1 sempre um pilar de apoio para garantir que essa infraestrutura possa se manter confi\u00e1vel e acess\u00edvel.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Information technology can transform many processes and is being used more regularly to improve agility and effectiveness. So it&#8217;s no surprise that technology is also playing an increasingly important role in the healthcare sector, such as when registering patient data in medical records and electronic reports. More recently, there has been a demand for &#8220;data [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2019,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[64,80],"class_list":["post-2015","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity","tag-healthcare"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity in healthcare: a challenge for data sharing | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Information technology can transform many processes and is being used more regularly to improve agility and effectiveness. So it&#039;s no surprise that\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in healthcare: a challenge for data sharing | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Information technology can transform many processes and is being used more regularly to improve agility and effectiveness. So it&#039;s no surprise that\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-03T14:36:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Cybersecurity in healthcare: a challenge for data sharing\",\"datePublished\":\"2025-12-03T14:36:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/\"},\"wordCount\":576,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png\",\"keywords\":[\"cybersecurity\",\"healthcare\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/\",\"name\":\"Cybersecurity in healthcare: a challenge for data sharing | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png\",\"datePublished\":\"2025-12-03T14:36:47+00:00\",\"description\":\"Information technology can transform many processes and is being used more regularly to improve agility and effectiveness. So it's no surprise that\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png\",\"width\":1500,\"height\":1000,\"caption\":\"cybersecurity healthcare ()\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity in healthcare: a challenge for data sharing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity in healthcare: a challenge for data sharing | Hacker Rangers","description":"Information technology can transform many processes and is being used more regularly to improve agility and effectiveness. So it's no surprise that","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Cybersecurity in healthcare: a challenge for data sharing | Hacker Rangers","og_description":"Information technology can transform many processes and is being used more regularly to improve agility and effectiveness. So it's no surprise that","og_url":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-03T14:36:47+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Cybersecurity in healthcare: a challenge for data sharing","datePublished":"2025-12-03T14:36:47+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/"},"wordCount":576,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png","keywords":["cybersecurity","healthcare"],"articleSection":["Cybersecurity"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/","url":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/","name":"Cybersecurity in healthcare: a challenge for data sharing | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png","datePublished":"2025-12-03T14:36:47+00:00","description":"Information technology can transform many processes and is being used more regularly to improve agility and effectiveness. So it's no surprise that","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png","width":1500,"height":1000,"caption":"cybersecurity healthcare ()"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity in healthcare: a challenge for data sharing"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2015","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/comments?post=2015"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2015\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media\/2019"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media?parent=2015"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/categories?post=2015"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/tags?post=2015"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}