{"id":2075,"date":"2025-12-05T17:35:23","date_gmt":"2025-12-05T20:35:23","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2075"},"modified":"2025-12-05T17:35:23","modified_gmt":"2025-12-05T20:35:23","slug":"the-role-of-hr-in-cybersecurity-awareness-programs","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/","title":{"rendered":"O papel do RH nos programas de conscientiza\u00e7\u00e3o em ciberseguran\u00e7a"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Em muitas organiza\u00e7\u00f5es, a iniciativa de realizar um programa de conscientiza\u00e7\u00e3o em ciberseguran\u00e7a parte do departamento de tecnologia da informa\u00e7\u00e3o (TI) ou da equipe respons\u00e1vel pela seguran\u00e7a corporativa. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Contudo, ensinar boas pr\u00e1ticas sobre seguran\u00e7a e manter os colaboradores informados sobre amea\u00e7as \u00e9, em \u00faltima an\u00e1lise, uma quest\u00e3o humana e isso significa que a \u00e1rea de Recursos Humanos tem muito a contribuir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Pesquisas sugerem que mais de 90% dos ataques cibern\u00e9ticos s\u00e3o viabilizados por uma falha humana, como um clique ou uma intera\u00e7\u00e3o indevida com um atacante. Apesar da preponder\u00e2ncia do fator humano no risco cibern\u00e9tico, h\u00e1 algumas quest\u00f5es que dificultam a compreens\u00e3o do problema.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Uma delas \u00e9 que os riscos decorrentes da tecnologia raramente s\u00e3o t\u00e3o intuitivos quanto outros riscos ocupacionais. A maioria das pessoas entende o risco de uma queda, de um ru\u00eddo muito elevado ou de uma instala\u00e7\u00e3o el\u00e9trica prec\u00e1ria. Por\u00e9m, nem sempre existe a mesma percep\u00e7\u00e3o sobre o risco intang\u00edvel de abrir um anexo ou clicar em um link. Como muitos riscos do mundo online s\u00e3o provocados por cibercriminosos, o perigo s\u00f3 fica evidente quando conhecemos a mentalidade do invasor.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Quanto maior for a compreens\u00e3o sobre os ataques, mais vis\u00edveis ficar\u00e3o a relev\u00e2ncia do fator humano na ciberseguran\u00e7a e o valor das contribui\u00e7\u00f5es do departamento de RH, que acompanha toda a trajet\u00f3ria do colaborador.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Como o RH pode contribuir?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Um dos principais objetivos do programa de conscientiza\u00e7\u00e3o em seguran\u00e7a \u00e9 influenciar a cultura da empresa. <a href=\"https:\/\/hackerrangers.siteup.dev\/pt\/gamification\/ciberatitudes-como-medir-mudanca-de-comportamento\/\">Quando o colaborador compreende que ser\u00e1 valorizado por agir de forma respons\u00e1vel<\/a> durante seu trabalho, \u00e9 mais prov\u00e1vel que ele se preocupe com os riscos ou preju\u00edzos que suas atitudes podem desencadear.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Cultura<\/span><\/h2>\n<p><b>O RH \u00e9 o primeiro ponto de contato de um colaborador <\/b><span style=\"font-weight: 400;\">com a empresa e, normalmente, tamb\u00e9m o \u00faltimo. Sendo assim, a postura do RH na comunica\u00e7\u00e3o com candidatos e novos colaboradores j\u00e1 apresenta aspectos da cultura da organiza\u00e7\u00e3o.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00c9 importante lembrar que o RH tamb\u00e9m guarda os dados pessoais dos colaboradores. Demonstrar consci\u00eancia sobre essa responsabilidade \u00e9 uma das formas de expressar o valor da seguran\u00e7a e da privacidade.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Os benef\u00edcios concedidos pela empresa: plano de sa\u00fade, clubes, vale-refei\u00e7\u00e3o, entre outros, muitas vezes est\u00e3o atrelados a plataformas digitais e est\u00e3o na mira de golpistas, o que significa que os colaboradores devem ser orientados a us\u00e1-los com seguran\u00e7a. A situa\u00e7\u00e3o inversa ocorre quando o colaborador sai da empresa. Nesse caso, \u00e9 necess\u00e1rio garantir que ele n\u00e3o esteja levando dados sens\u00edveis.<\/span><\/p>\n<p><b>A regulamenta\u00e7\u00e3o exige cuidados com a seguran\u00e7a.<\/b><span style=\"font-weight: 400;\"> A Lei Geral de Prote\u00e7\u00e3o de Dados (LGPD) e outras regras brasileiras e internacionais preveem puni\u00e7\u00f5es para as empresas que violarem dados pessoais. Se a fun\u00e7\u00e3o do colaborador envolver dados protegidos, \u00e9 importante que ele conhe\u00e7a as regras aplic\u00e1veis, como o c\u00f3digo de \u00e9tica, desde o primeiro dia de trabalho.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Caso a empresa ainda n\u00e3o tenha adequado seus c\u00f3digos de conduta, \u00e9 importante que o RH contribua para atualizar esses documentos e colabore com o departamento de seguran\u00e7a para garantir que todos estejam cientes de suas responsabilidades.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Alcance e integra\u00e7\u00e3o<\/span><\/h2>\n<p><b>O RH pode fortalecer a continuidade da conscientiza\u00e7\u00e3o em seguran\u00e7a. <\/b><span style=\"font-weight: 400;\">\u00a0Para que o programa de conscientiza\u00e7\u00e3o n\u00e3o fique isolado e restrito a um \u00fanico momento ou iniciativa, o departamento de RH pode cooperar com o departamento de TI para incluir treinamentos de seguran\u00e7a, atividades ou discuss\u00f5es dentro de outros encontros e campanhas do RH.\u00a0<\/span><\/p>\n<p><b>O RH \u00e9 mais experiente que o departamento de TI para alcan\u00e7ar as pessoas. <\/b><span style=\"font-weight: 400;\">H\u00e1 colaboradores que trabalham remotamente ou que frequentemente est\u00e3o fora do escrit\u00f3rio e n\u00e3o t\u00eam acesso frequente ao canal utilizado pelo programa de conscientiza\u00e7\u00e3o. O RH muitas vezes j\u00e1 estabeleceu meios para manter contato com esses colaboradores e pode compartilhar essa experi\u00eancia para ampliar o alcance da iniciativa.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">A vis\u00e3o humana na ciberseguran\u00e7a<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Cada empresa ou organiza\u00e7\u00e3o tem seus pr\u00f3prios desafios. \u00c9 importante que seja estabelecido um canal de coopera\u00e7\u00e3o constante entre a \u00e1rea de recursos humanos e a seguran\u00e7a digital ou TI para que ambos compreendam as necessidades um do outro.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Assim como profissionais de RH est\u00e3o aos poucos se sensibilizando sobre o fator humano na ciberseguran\u00e7a, os departamentos de TI e seguran\u00e7a tamb\u00e9m n\u00e3o t\u00eam todas as respostas, principalmente quando as particularidades de cada empresa entram na equa\u00e7\u00e3o.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Desde que seja compreendida a import\u00e2ncia de olharmos para o colaborador como um aliado na tarefa de proteger a empresa, o RH tem muito a contribuir para tornar os programas de conscientiza\u00e7\u00e3o mais humanos.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>At many organizations, implementing a cybersecurity awareness program comes from the information technology (IT) department or the team responsible for corporate security. But teaching best security practices and keeping employees informed about threats is ultimately a human issue \u2013 and that means Human Resources has a lot to contribute. Research suggests that more than 90% [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2077,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[46],"tags":[66,64,96,97,98],"class_list":["post-2075","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-awareness","tag-awareness","tag-cybersecurity","tag-cybersecurity-awareness-program","tag-hr","tag-human-resources"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The role of HR in cybersecurity awareness programs | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"See how HR enhances cybersecurity awareness programs through culture-building, training integration, and a human-centered security approach.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The role of HR in cybersecurity awareness programs | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"See how HR enhances cybersecurity awareness programs through culture-building, training integration, and a human-centered security approach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-05T20:35:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"The role of HR in cybersecurity awareness programs\",\"datePublished\":\"2025-12-05T20:35:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/\"},\"wordCount\":716,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png\",\"keywords\":[\"awareness\",\"cybersecurity\",\"cybersecurity awareness program\",\"HR\",\"Human Resources\"],\"articleSection\":[\"Awareness\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/\",\"name\":\"The role of HR in cybersecurity awareness programs | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png\",\"datePublished\":\"2025-12-05T20:35:23+00:00\",\"description\":\"See how HR enhances cybersecurity awareness programs through culture-building, training integration, and a human-centered security approach.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png\",\"width\":1500,\"height\":1000,\"caption\":\"HR cybersecurity awareness programs\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The role of HR in cybersecurity awareness programs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The role of HR in cybersecurity awareness programs | Hacker Rangers","description":"See how HR enhances cybersecurity awareness programs through culture-building, training integration, and a human-centered security approach.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"The role of HR in cybersecurity awareness programs | Hacker Rangers","og_description":"See how HR enhances cybersecurity awareness programs through culture-building, training integration, and a human-centered security approach.","og_url":"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-05T20:35:23+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"The role of HR in cybersecurity awareness programs","datePublished":"2025-12-05T20:35:23+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/"},"wordCount":716,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png","keywords":["awareness","cybersecurity","cybersecurity awareness program","HR","Human Resources"],"articleSection":["Awareness"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/","url":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/","name":"The role of HR in cybersecurity awareness programs | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png","datePublished":"2025-12-05T20:35:23+00:00","description":"See how HR enhances cybersecurity awareness programs through culture-building, training integration, and a human-centered security approach.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png","width":1500,"height":1000,"caption":"HR cybersecurity awareness programs"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"The role of HR in cybersecurity awareness programs"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/comments?post=2075"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2075\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media\/2077"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media?parent=2075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/categories?post=2075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/tags?post=2075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}