{"id":5721,"date":"2024-10-14T18:29:54","date_gmt":"2024-10-14T21:29:54","guid":{"rendered":"https:\/\/peers.com.br\/how-we-work\/cybersecurity\/"},"modified":"2025-02-23T14:25:55","modified_gmt":"2025-02-23T17:25:55","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/peers-old.htc.inf.br\/en\/how-we-work\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Turn cybersecurity into a strategy for continuity and growth, protecting critical data and ensuring operational resilience. Digital security to safeguard today and prepare for the future. <\/p>\n","protected":false},"author":53,"featured_media":0,"parent":5719,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-5721","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>- Cybersecurity<\/title>\n<meta name=\"description\" content=\"Ciberseguran\u00e7a: mais que tecnologia, um pilar estrat\u00e9gico para os neg\u00f3cio.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/peers-old.htc.inf.br\/en\/how-we-work\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"- Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Ciberseguran\u00e7a: mais que tecnologia, um pilar estrat\u00e9gico para os neg\u00f3cio.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/peers-old.htc.inf.br\/en\/how-we-work\/cybersecurity\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-23T17:25:55+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/peers-old.htc.inf.br\/en\/how-we-work\/cybersecurity\/\",\"url\":\"https:\/\/peers-old.htc.inf.br\/en\/how-we-work\/cybersecurity\/\",\"name\":\"- Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/peers-old.htc.inf.br\/en\/#website\"},\"datePublished\":\"2024-10-14T21:29:54+00:00\",\"dateModified\":\"2025-02-23T17:25:55+00:00\",\"description\":\"Ciberseguran\u00e7a: mais que tecnologia, um pilar estrat\u00e9gico para os neg\u00f3cio.\",\"breadcrumb\":{\"@id\":\"https:\/\/peers-old.htc.inf.br\/en\/how-we-work\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/peers-old.htc.inf.br\/en\/how-we-work\/cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/peers-old.htc.inf.br\/en\/how-we-work\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/peers-old.htc.inf.br\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How we work\",\"item\":\"https:\/\/peers-old.htc.inf.br\/en\/how-we-work\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/peers-old.htc.inf.br\/en\/#website\",\"url\":\"https:\/\/peers-old.htc.inf.br\/en\/\",\"name\":\"\",\"description\":\"A experi\u00eancia \u00e9 o que fica\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/peers-old.htc.inf.br\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"- Cybersecurity","description":"Ciberseguran\u00e7a: mais que tecnologia, um pilar estrat\u00e9gico para os neg\u00f3cio.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/peers-old.htc.inf.br\/en\/how-we-work\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"- Cybersecurity","og_description":"Ciberseguran\u00e7a: mais que tecnologia, um pilar estrat\u00e9gico para os neg\u00f3cio.","og_url":"https:\/\/peers-old.htc.inf.br\/en\/how-we-work\/cybersecurity\/","article_modified_time":"2025-02-23T17:25:55+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/peers-old.htc.inf.br\/en\/how-we-work\/cybersecurity\/","url":"https:\/\/peers-old.htc.inf.br\/en\/how-we-work\/cybersecurity\/","name":"- Cybersecurity","isPartOf":{"@id":"https:\/\/peers-old.htc.inf.br\/en\/#website"},"datePublished":"2024-10-14T21:29:54+00:00","dateModified":"2025-02-23T17:25:55+00:00","description":"Ciberseguran\u00e7a: mais que tecnologia, um pilar estrat\u00e9gico para os neg\u00f3cio.","breadcrumb":{"@id":"https:\/\/peers-old.htc.inf.br\/en\/how-we-work\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/peers-old.htc.inf.br\/en\/how-we-work\/cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/peers-old.htc.inf.br\/en\/how-we-work\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/peers-old.htc.inf.br\/en\/"},{"@type":"ListItem","position":2,"name":"How we work","item":"https:\/\/peers-old.htc.inf.br\/en\/how-we-work\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/peers-old.htc.inf.br\/en\/#website","url":"https:\/\/peers-old.htc.inf.br\/en\/","name":"","description":"A experi\u00eancia \u00e9 o que fica","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/peers-old.htc.inf.br\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/peers-old.htc.inf.br\/en\/wp-json\/wp\/v2\/pages\/5721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/peers-old.htc.inf.br\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/peers-old.htc.inf.br\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/peers-old.htc.inf.br\/en\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/peers-old.htc.inf.br\/en\/wp-json\/wp\/v2\/comments?post=5721"}],"version-history":[{"count":0,"href":"https:\/\/peers-old.htc.inf.br\/en\/wp-json\/wp\/v2\/pages\/5721\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/peers-old.htc.inf.br\/en\/wp-json\/wp\/v2\/pages\/5719"}],"wp:attachment":[{"href":"https:\/\/peers-old.htc.inf.br\/en\/wp-json\/wp\/v2\/media?parent=5721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}