{"id":64230,"date":"2021-04-08T14:36:46","date_gmt":"2021-04-08T14:36:46","guid":{"rendered":"https:\/\/www.42gears.com\/?p=64230"},"modified":"2021-04-08T14:36:47","modified_gmt":"2021-04-08T14:36:47","slug":"security-threats-demand-next-generation-endpoint-protection","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/","title":{"rendered":"Security Threats Demand Next-Generation Endpoint Protection"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-style-default\"><a href=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/04\/Endpoint-security-in-action.jpg\"><img decoding=\"async\" width=\"850\" height=\"290\" src=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/04\/Endpoint-security-in-action.jpg\" alt=\"Endpoint security in action\" class=\"wp-image-64246\" title=\"Unified Endpoint security in action\" srcset=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/04\/Endpoint-security-in-action.jpg 850w, https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/04\/Endpoint-security-in-action-300x102.jpg 300w, https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/04\/Endpoint-security-in-action-768x262.jpg 768w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/><\/a><\/figure>\n\n\n\n<p class=\"text-justify\">Endpoint security is a key concern for keeping an office safe. It is not the only concern, but it is among the things that you need to focus on first. This means it is worth taking the time to learn more about it.<\/p>\n\n\n\n<p class=\"text-justify\">As you may know, an endpoint is any business technology that shoppers and employees use directly. This is distinct from the central computing resources that admins use to manage your company&#8217;s devices. Endpoint security is the protection of these endpoints &#8211; including phones, tablets, computers, VR headsets, and more.&nbsp;<\/p>\n\n\n\n<p class=\"text-justify\">Of course, if you run a business, it\u2019s not enough for endpoints to simply be safe. They also need to be reliable, useful, and easy-to-use. Read on to learn about the necessary components of a successful next-gen endpoint protection plan.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-endpoint-security\" style=\"font-size:24px\"><strong>Endpoint Security<\/strong><\/h2>\n\n\n\n<p class=\"text-justify\">As might be expected, it is very important for businesses to have some form of endpoint security. In practice, this requires an antivirus system that admins can deploy on many devices at once from a central console. Many companies offer security programs designed specifically for enterprises. Unlike consumer antivirus products, admins can manage these programs on many devices at once.<\/p>\n\n\n\n<p class=\"text-justify\">As noted by<a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/security-awareness\/endpoint.html\" class=\"broken_link\"> McAfee<\/a>, enterprise endpoint security software implements many useful safeguards. These measures can protect files via encryption, prevent malicious programs from taking effect, and much more. That said, reckless device use can put sensitive corporate data at risk in other ways. Therefore, achieving comprehensive endpoint security requires a few more components as well.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-endpoint-management\" style=\"font-size:24px\"><strong>Endpoint Management<\/strong><\/h2>\n\n\n\n<p class=\"text-justify\">While endpoint security software can lessen the impact of reckless device use, it is ideal to prevent issues from occurring in the first place. This is where <a href=\"https:\/\/www.42gears.com\/solutions\/unified-endpoint-management-uem-solution\/\">Unified Endpoint Management<\/a>, or UEM, comes into play. Using a UEM solution, you can manage the way work-owned devices function. For example, you can control what apps devices can use, and when. As a result, it will be more difficult for employees to download malicious software by mistake.&nbsp;<\/p>\n\n\n\n<p class=\"text-justify\">Plus, if data theft risks arise, UEM software can be helpful. As an example of how this works in action, UEM software can mandate a complex password on each device. That way, even if someone stole a device, they would not be able to easily access sensitive data. Plus, admins can monitor device status in real time using UEM software. This includes the ability to locate devices on a map remotely. As a result, endpoint management software is an essential part of ensuring device security.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-personnel-improvements\" style=\"font-size:24px\"><strong>Personnel Improvements<\/strong><\/h2>\n\n\n\n<p class=\"text-justify\">If something goes wrong in spite of your efforts to ensure endpoint security, it\u2019s essential to have a chain of command for resolving the issue at hand. If each person involved has clearly-defined responsibilities, each individual becomes culpable for any security lapses. In turn, this motivates employees to be accountable.&nbsp;<\/p>\n\n\n\n<p class=\"text-justify\">A good way to facilitate these improvements is to obtain a well-regarded certification like the<a href=\"https:\/\/www.42gears.com\/blog\/iso27001-2013certification\/\"> IEC 27001:2013<\/a>. This attests that a given business meets software- and personnel- based security standards. More broadly, it assures that everyone involved knows their role and can carry it out.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-suremdm-part-of-a-strong-next-gen-solution\" style=\"font-size:24px\"><strong>SureMDM &#8211; Part of A Strong Next-Gen Solution<\/strong><\/h2>\n\n\n\n<p class=\"text-justify\">If you are interested in improving endpoint security, you need a unified endpoint management software solution that can keep every device in your office safe.<a href=\"https:\/\/www.42gears.com\/products\/mobile-device-management\/\"> SureMDM by 42Gears<\/a> supports a huge range of devices, ensuring that every endpoint (be it a phone, a smartwatch, or a VR headset) is managed. Together with the other components mentioned above, it is a major part of a stellar next-gen endpoint security solution.\u00a0<\/p>\n\n\n\n<div style=\"background-image: url('https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/04\/CTA-5.jpg'); background-position: left; padding: 40px; border-radius: 5px; margin-top: 16px; background-size: cover;\">\n<h2 style=\"font-size: 22px; color: #000; margin-top: 0px;\">Manage Endpoints with SureMDM by 42Gears. <\/h2>\n<p style=\"margin-top: 32px; display: inline-block;\"><a href=\"https:\/\/suremdm.42gears.com\/console\/?registration=true&amp;uem=true&amp;_ga=2.36020512.1868202010.1612092914-333004276.1610528833\" style=\"min-width: 148px; height: 48px; padding: 0 12px; text-align: center; display: inline-block; background-color: #ffffff; color: #427ab7; line-height: 48px; border-radius: 5px; letter-spacing: 1px; font-size: 12px; font-weight: bold; transition: all 0.5s; margin-bottom: 0px;\" target=\"_black\" rel=\"noopener noreferrer\">Start Free Trial<\/a>\n<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Endpoint security is a key concern for keeping an office safe. It is not the only concern, but it is among the things that you need to focus on first. This means it is worth taking the time to learn more about it. As you may know, an endpoint is any business technology that shoppers&hellip;<\/p>\n","protected":false},"author":7,"featured_media":64231,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-64230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Endpoint Security: How to Protect Endpoints Better | 42Gears<\/title>\n<meta name=\"description\" content=\"Endpoint security is the first step in keeping your business safe. Learn how to make the right choices to ensure your endpoints stay secure with 42Gears.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Threats Demand Next-Generation Endpoint Protection\" \/>\n<meta property=\"og:description\" content=\"Endpoint security is the first step in keeping your business safe. Learn how to make the right choices to ensure your endpoints stay secure with 42Gears.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-08T14:36:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-08T14:36:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/04\/featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"538\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"42Gears Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"42Gears Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/\"},\"author\":{\"name\":\"42Gears Team\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\"},\"headline\":\"Security Threats Demand Next-Generation Endpoint Protection\",\"datePublished\":\"2021-04-08T14:36:46+00:00\",\"dateModified\":\"2021-04-08T14:36:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/\"},\"wordCount\":607,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/04\/featured.jpg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/\",\"url\":\"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/\",\"name\":\"Endpoint Security: How to Protect Endpoints Better | 42Gears\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/04\/featured.jpg\",\"datePublished\":\"2021-04-08T14:36:46+00:00\",\"dateModified\":\"2021-04-08T14:36:47+00:00\",\"description\":\"Endpoint security is the first step in keeping your business safe. Learn how to make the right choices to ensure your endpoints stay secure with 42Gears.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/#primaryimage\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/04\/featured.jpg\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/04\/featured.jpg\",\"width\":1000,\"height\":538,\"caption\":\"Endpoint security in action\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/pt-br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Threats Demand Next-Generation Endpoint Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\",\"name\":\"42Gears Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"caption\":\"42Gears Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Endpoint Security: How to Protect Endpoints Better | 42Gears","description":"Endpoint security is the first step in keeping your business safe. Learn how to make the right choices to ensure your endpoints stay secure with 42Gears.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/","og_locale":"pt_BR","og_type":"article","og_title":"Security Threats Demand Next-Generation Endpoint Protection","og_description":"Endpoint security is the first step in keeping your business safe. Learn how to make the right choices to ensure your endpoints stay secure with 42Gears.","og_url":"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2021-04-08T14:36:46+00:00","article_modified_time":"2021-04-08T14:36:47+00:00","og_image":[{"width":1000,"height":538,"url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/04\/featured.jpg","type":"image\/jpeg"}],"author":"42Gears Team","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"42Gears Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/"},"author":{"name":"42Gears Team","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d"},"headline":"Security Threats Demand Next-Generation Endpoint Protection","datePublished":"2021-04-08T14:36:46+00:00","dateModified":"2021-04-08T14:36:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/"},"wordCount":607,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/04\/featured.jpg","articleSection":["Uncategorized"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/","url":"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/","name":"Endpoint Security: How to Protect Endpoints Better | 42Gears","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/04\/featured.jpg","datePublished":"2021-04-08T14:36:46+00:00","dateModified":"2021-04-08T14:36:47+00:00","description":"Endpoint security is the first step in keeping your business safe. Learn how to make the right choices to ensure your endpoints stay secure with 42Gears.","breadcrumb":{"@id":"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/#primaryimage","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/04\/featured.jpg","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/04\/featured.jpg","width":1000,"height":538,"caption":"Endpoint security in action"},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/pt-br\/blog\/security-threats-demand-next-generation-endpoint-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/pt-br\/"},{"@type":"ListItem","position":2,"name":"Security Threats Demand Next-Generation Endpoint Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d","name":"42Gears Team","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","caption":"42Gears Team"}}]}},"author_meta":{"ID":"7","user_nicename":"42gears","user_email":"42gears@gmail.com","user_registered":"2015-07-15 04:55:37","display_name":"42Gears Team","first_name":"42Gears","last_name":"Team"},"featured_image_url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/04\/featured.jpg","_links":{"self":[{"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/posts\/64230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/comments?post=64230"}],"version-history":[{"count":5,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/posts\/64230\/revisions"}],"predecessor-version":[{"id":64260,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/posts\/64230\/revisions\/64260"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/media\/64231"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/media?parent=64230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/categories?post=64230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/tags?post=64230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}