{"id":7622,"date":"2017-02-08T20:14:39","date_gmt":"2017-02-08T20:14:39","guid":{"rendered":"http:\/\/blog.nsfocusglobal.com\/?p=363"},"modified":"2017-02-08T20:14:39","modified_gmt":"2017-02-08T20:14:39","slug":"understanding-ransomware-an-overview","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/understanding-ransomware-an-overview\/","title":{"rendered":"Understanding Ransomware: An Overview"},"content":{"rendered":"<p><strong><em>Author: Stephen Gates,\u00a0Chief Research Intelligence Analyst<\/em><\/strong><\/p>\n<h4><strong>Ransomware: The Human Touch<\/strong><\/h4>\n<p>As a security professional, I often get asked about the latest threats. Most consumers don\u2019t understand the difference between viruses, worms, Trojans, spyware, adware, scareware, malvertising, phishing, etc. Sometimes, even those of us in the field see it all as malware. Basically, it\u2019s all malicious code.<\/p>\n<p>And then there\u2019s Ransomware. For many people this one stands out, because even without knowing the technical details, they understand this strain of attack\u2014they need a ransom to prevent their information from being stolen and misused.<\/p>\n<p>So for all those concerned, here\u2019s a short primer on the realities of Ransomware. Users are right to be concerned, but there are key aspects that need greater examination.<\/p>\n<p>First, a user computer protected by a firewall <em>cannot<\/em> become infected by Ransomware. Thanks to Stateful Packet Inspection functionality, firewalls block <em>all<\/em> unsolicited inbound traffic. This means that it takes a human being to cause or initiate an infection.<\/p>\n<p>Now, let\u2019s acknowledge that all operating systems, applications, computing devices and even us humans have undiscovered vulnerabilities. Hackers and researchers alike spend countless hours looking for new ways to exploit them. Computer exploits are typically pre-packaged applications cleverly created to take advantage of known, and previously unknown, vulnerabilities. Researchers share these findings with the security community to protect unwitting victims, while hackers share their findings with other criminals.<\/p>\n<p>One simple way of getting infected by Ransomware is unknowingly going to a malicious website. Phishing attacks are very successful; victims often report they clicked on a link in an email, social media site, popup, etc. This is when the process of infection begins. When a user clicks on a link, it redirects the browser to a malicious website where attackers have pre-installed an exploit pack. Some exploit packs are bought and sold through underground hacking sites; some can be had for free.<\/p>\n<p>When you click on a link, the malicious website instantly knows which browser you\u2019re using, which version it is, the media player with it, and many other attributes. That helps the site identify the best exploits to send you\u2014basically, the ones that can do the most harm.<\/p>\n<p>An exploit often includes additional code called remote code execution<em>.<\/em> This code often allows the attacker to gain remote access to your system, even while it\u2019s protected by firewalls. The code can also instruct your computer to download additional malicious software\u2014a key logger, an exploit pack, botnet command and control software, and even the dreaded Ransomware.<\/p>\n<p>And remember, this is all happening <em>behind<\/em> the firewalls. The human activity allowed the entry.<\/p>\n<p>Once your computer is compromised, the attacker begins moving laterally. The attacker exploits and compromises nearby computers, servers, databases, logging systems and even other security technologies. While the virus is inside the computer, it can install Ransomware not just on your machine but others that are similarly compromised. And since it\u2019s happening behind the firewall, security personnel overlook it.<\/p>\n<p>Another infection strain behind Ransomware is the dreaded Trojan. Remember the classic story behind this name? The people of Troy thought they were getting a gift from the defeated Greek soldiers; instead, it allowed Greek solders to get inside the city gates and cause mayhem. That\u2019s how the Trojan virus performs too. Let\u2019s say you\u2019re surfing the Internet and a pop-up window shows up, telling you about some cool free software. You click, you get malware, and it features Ransomware.<\/p>\n<p>Another tactic functions as \u2018scareware.\u2019 Again, you\u2019re online and a popup window shows up. In this case, it says the computer is infected, or the anti-virus software is out of date, or the media player needs updating. \u00a0You click the link, and. . .you can guess the rest.<\/p>\n<p>For the record, even tech-savvy pros working in security can fall for some these scams. Yes, I\u2019m talking about me. I fell for the media player update tactic a few years ago, and it took me days to get rid of the malware. I hope this helps one critical aspect of Ransomware: We\u2019re bringing it on ourselves. Good security software does a lot, but the human touch is vital too.<\/p>\n<h4><strong>Avoiding Ransomware<\/strong><\/h4>\n<p>Business and consumers are all looking for ways to protect themselves from Ransomware.\u00a0 The first step involves education and training.\u00a0 Knowing how a computer becomes infected with malware, goes a long way to avoiding these infections.\u00a0 From the explanation above, the dreaded click is the catalyst that begins most infections.<\/p>\n<p>Avoid going to questionable websites.\u00a0 Remember, nothing is free.\u00a0 If a website provides loads of free pictures, free content, free applications, and free downloads, it\u2019s very likely the site is providing lots of free malware as well. \u00a0No one would buy a server, purchase internet access, build a website, and provide web content without having a way to make money from it.\u00a0 Remember, malware infections often result in someone profiting.<\/p>\n<p>Inspect every link <strong>before <\/strong>you click.\u00a0 Do you know where the link is going?\u00a0 Did the link come from someone who is reputable? Is the link misspelled? Is the link full of special characters?\u00a0 Is the link longer than what is normal? I saw one in an email the other day that was going to www.yhoo.com.\u00a0 Obviously the link did not come from Yahoo.<\/p>\n<h4><strong>Protection &amp; Recommendations<\/strong><\/h4>\n<p>I know we\u2019ve all heard it time and time again; update, update, update.\u00a0 This is always good advice.\u00a0 However, many people do not know what to update.\u00a0 Updating the operating system and all applications is not completely automated in many cases.\u00a0 I make a point to check for updates a least once a week for my operating systems, applications, browsers, media players, PDF reader, Java, and anti-virus. If you don\u2019t update and you\u2019re infected, then it\u2019s really your own fault.\u00a0 Drive-by downloads take advantage of those that don\u2019t update.<\/p>\n<p>Try to avoid using free Wi-Fi hotspots when traveling with your computer.\u00a0 Many of them are completely unsecured. If you do connect to these hotspots, insure that your computer firewall is blocking all incoming traffic. Remember when traveling, your computer is no longer protected by your corporate firewalls.\u00a0 If you\u2019re not sure if your computer firewall is configured correctly, talk with a security professional or spend the time to insure it is.\u00a0 Often, malware will attempt to disable your computer firewall, or open up holes you\u2019re not aware of.<\/p>\n<p>Avoid using computers in hotel lobbies, libraries, of any other places that have free computer access. \u00a0If you log into your email, airline website, or corporate network from a hotel computer, how do you insure that your login and password are not being captured by the hotel computer &#8211; or the hackers that are running it.<\/p>\n<p>Use strong passwords on everything.\u00a0 My passwords are huge.\u00a0 They are often the length of a short sentence with special characters, capital and lower case letters, and numbers.\u00a0 The longer a password, the longer it takes to crack it. \u00a0Never write your password down on a sticky note, and tape it to your computer.<\/p>\n<p>Create and secure a restoration image of your new computer when you first purchase it; hopefully before you ever connect to the Internet. This will insure you have a default image of your computer if it ever becomes unusable. \u00a0I save my restoration images to an external hard drive and store the drive in a safe.<\/p>\n<p>Backup your systems daily.\u00a0 I use a cloud service that continuously backs up my computer when anything changes.\u00a0 The process runs in the background and in most cases does not affect performance.\u00a0 If my computer became infected with Ransomware, I would reinstall the restoration image and download my files and applications from the cloud.\u00a0 The process would take a few hours, but I won\u2019t have to pay the alternative.<\/p>\n<p>Finally, if you are a victim of Ransomware, contact your local FBI office.\u00a0 Their job is to help investigate these types of crimes.\u00a0 The information they can gain from you, may make their job easier when tracking down these perpetrators.\u00a0 The FBI is interested in finding <em>patterns of criminal activity<\/em> that help in their investigations.\u00a0 Your problem may actually help with an ongoing analysis.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author: Stephen Gates,\u00a0Chief Research Intelligence Analyst Ransomware: The Human Touch As a security professional, I often get asked about the latest threats. Most consumers don\u2019t understand the difference between viruses, worms, Trojans, spyware, adware, scareware, malvertising, phishing, etc. Sometimes, even those of us in the field see it all as malware. Basically, it\u2019s all malicious [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7807,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[7,15],"tags":[],"class_list":["post-7622","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","category-research-reports"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Understanding Ransomware: An Overview - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Ransomware: An Overview - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Author: Stephen Gates,\u00a0Chief Research Intelligence Analyst Ransomware: The Human Touch As a security professional, I often get asked about the latest\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/understanding-ransomware-an-overview\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-08T20:14:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/02\/Lock-On-A-Keyboard.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Understanding Ransomware: An Overview - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Author: Stephen Gates,\u00a0Chief Research Intelligence Analyst Ransomware: The Human Touch As a security professional, I often get asked about the latest\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/02\/Lock-On-A-Keyboard.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/understanding-ransomware-an-overview\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/understanding-ransomware-an-overview\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Understanding Ransomware: An Overview\",\"datePublished\":\"2017-02-08T20:14:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/understanding-ransomware-an-overview\\\/\"},\"wordCount\":1385,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/understanding-ransomware-an-overview\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2017\\\/02\\\/Lock-On-A-Keyboard.jpg\",\"articleSection\":[\"Global Events\",\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/understanding-ransomware-an-overview\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/understanding-ransomware-an-overview\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/understanding-ransomware-an-overview\\\/\",\"name\":\"Understanding Ransomware: An Overview - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/understanding-ransomware-an-overview\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/understanding-ransomware-an-overview\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2017\\\/02\\\/Lock-On-A-Keyboard.jpg\",\"datePublished\":\"2017-02-08T20:14:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/understanding-ransomware-an-overview\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/understanding-ransomware-an-overview\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/understanding-ransomware-an-overview\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2017\\\/02\\\/Lock-On-A-Keyboard.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2017\\\/02\\\/Lock-On-A-Keyboard.jpg\",\"width\":1000,\"height\":667,\"caption\":\"Padlock and chain on computer keyboard.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/understanding-ransomware-an-overview\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Ransomware: An Overview\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding Ransomware: An Overview - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Understanding Ransomware: An Overview - NSFOCUS","og_description":"Author: Stephen Gates,\u00a0Chief Research Intelligence Analyst Ransomware: The Human Touch As a security professional, I often get asked about the latest","og_url":"https:\/\/nsfocusglobal.com\/understanding-ransomware-an-overview\/","og_site_name":"NSFOCUS","article_published_time":"2017-02-08T20:14:39+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/02\/Lock-On-A-Keyboard.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Understanding Ransomware: An Overview - NSFOCUS","twitter_description":"Author: Stephen Gates,\u00a0Chief Research Intelligence Analyst Ransomware: The Human Touch As a security professional, I often get asked about the latest","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/02\/Lock-On-A-Keyboard.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/understanding-ransomware-an-overview\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/understanding-ransomware-an-overview\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Understanding Ransomware: An Overview","datePublished":"2017-02-08T20:14:39+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/understanding-ransomware-an-overview\/"},"wordCount":1385,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/understanding-ransomware-an-overview\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/02\/Lock-On-A-Keyboard.jpg","articleSection":["Global Events","Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/understanding-ransomware-an-overview\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/understanding-ransomware-an-overview\/","url":"https:\/\/nsfocusglobal.com\/understanding-ransomware-an-overview\/","name":"Understanding Ransomware: An Overview - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/understanding-ransomware-an-overview\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/understanding-ransomware-an-overview\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/02\/Lock-On-A-Keyboard.jpg","datePublished":"2017-02-08T20:14:39+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/understanding-ransomware-an-overview\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/understanding-ransomware-an-overview\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/understanding-ransomware-an-overview\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/02\/Lock-On-A-Keyboard.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/02\/Lock-On-A-Keyboard.jpg","width":1000,"height":667,"caption":"Padlock and chain on computer keyboard."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/understanding-ransomware-an-overview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Understanding Ransomware: An Overview"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/7622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=7622"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/7622\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/7807"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=7622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=7622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=7622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}