{"id":7279,"date":"2025-01-08T00:24:00","date_gmt":"2025-01-07T23:24:00","guid":{"rendered":"https:\/\/www.metrica-global.com\/claves-de-ciberseguridad-para-2025\/"},"modified":"2025-07-30T11:47:40","modified_gmt":"2025-07-30T09:47:40","slug":"claves-de-ciberseguridad-para-2025","status":"publish","type":"post","link":"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/","title":{"rendered":"Chaves da ciberseguran\u00e7a para 2025"},"content":{"rendered":"\r\n<p data-start=\"98\" data-end=\"483\">A ciberseguran\u00e7a est\u00e1 em constante evolu\u00e7\u00e3o e, com a chegada de 2025, organiza\u00e7\u00f5es, governos e utilizadores enfrentar\u00e3o um cen\u00e1rio de amea\u00e7as mais sofisticado do que nunca. A transforma\u00e7\u00e3o digital, a ado\u00e7\u00e3o de ferramentas de intelig\u00eancia artificial (IA) e a crescente conectividade global abrem novas oportunidades, mas tamb\u00e9m criam vulnerabilidades que devemos enfrentar com urg\u00eancia.<\/p>\r\n<p data-start=\"485\" data-end=\"732\">Antecipar tend\u00eancias \u00e9 essencial para refor\u00e7ar a prote\u00e7\u00e3o e construir um ambiente digital mais seguro. A seguir, partilhamos as <strong data-start=\"613\" data-end=\"653\">5 chaves da ciberseguran\u00e7a para 2025<\/strong> que os especialistas consideram cruciais para enfrentar os desafios do futuro.<\/p>\r\n<hr data-start=\"734\" data-end=\"737\" \/>\r\n<h3 data-section-id=\"1sxwyqw\" data-start=\"739\" data-end=\"802\">1. Engenharia social potenciada por intelig\u00eancia artificial<\/h3>\r\n<p data-start=\"804\" data-end=\"1085\">A engenharia social continua a ser uma das ferramentas favoritas dos cibercriminosos, mas em 2025 atingir\u00e1 um novo patamar gra\u00e7as \u00e0 <strong data-start=\"936\" data-end=\"953\">IA generativa<\/strong>. Ataques como o <em data-start=\"970\" data-end=\"979\">vishing<\/em> (fraude por voz) tornar-se-\u00e3o mais realistas ao simular sotaques, dialetos e padr\u00f5es de fala espec\u00edficos.<\/p>\r\n<p data-start=\"1087\" data-end=\"1261\">Esta evolu\u00e7\u00e3o tornar\u00e1 ainda mais dif\u00edcil detetar fraudes, representando um risco significativo para a privacidade e a seguran\u00e7a de dados em contextos pessoais e empresariais.<\/p>\r\n<hr data-start=\"1263\" data-end=\"1266\" \/>\r\n<h3 data-section-id=\"wirmm8\" data-start=\"1268\" data-end=\"1303\">2. Aumento das amea\u00e7as internas<\/h3>\r\n<p data-start=\"1305\" data-end=\"1584\">Nem todas as amea\u00e7as v\u00eam do exterior. Em 2025, os <strong data-start=\"1355\" data-end=\"1374\">riscos internos<\/strong> continuar\u00e3o a crescer. Os atacantes procurar\u00e3o infiltrar-se atrav\u00e9s de colaboradores comprometidos, prestadores maliciosos ou explorando fragilidades em momentos sens\u00edveis, como processos de fus\u00e3o e aquisi\u00e7\u00e3o.<\/p>\r\n<p data-start=\"1586\" data-end=\"1749\">Uma vez dentro da organiza\u00e7\u00e3o, os criminosos usar\u00e3o acessos leg\u00edtimos para contornar medidas tradicionais como firewalls ou VPN, podendo causar danos devastadores.<\/p>\r\n<hr data-start=\"1751\" data-end=\"1754\" \/>\r\n<h3 data-section-id=\"1ly14eo\" data-start=\"1756\" data-end=\"1810\">3. Regula\u00e7\u00f5es fragmentadas que dificultam a defesa<\/h3>\r\n<p data-start=\"1812\" data-end=\"2023\">Em todo o mundo, est\u00e3o a ser implementadas <strong data-start=\"1855\" data-end=\"1925\">novas regulamenta\u00e7\u00f5es sobre ciberseguran\u00e7a, IA e prote\u00e7\u00e3o de dados<\/strong>. No entanto, a <strong data-start=\"1941\" data-end=\"1980\">falta de harmoniza\u00e7\u00e3o internacional<\/strong> poder\u00e1 fragilizar as defesas das empresas.<\/p>\r\n<p data-start=\"2025\" data-end=\"2226\">Em vez de se focarem exclusivamente na mitiga\u00e7\u00e3o de riscos, as organiza\u00e7\u00f5es ter\u00e3o de alocar mais recursos ao cumprimento legal, desviando esfor\u00e7os de \u00e1reas cr\u00edticas como a dete\u00e7\u00e3o e resposta a amea\u00e7as.<\/p>\r\n<hr data-start=\"2228\" data-end=\"2231\" \/>\r\n<h3 data-section-id=\"ofye5a\" data-start=\"2233\" data-end=\"2309\">4. Evolu\u00e7\u00e3o do phishing: ataques que contornam a autentica\u00e7\u00e3o multifator<\/h3>\r\n<p data-start=\"2311\" data-end=\"2462\">O <em data-start=\"2313\" data-end=\"2323\">phishing<\/em> continua a ser uma das formas de ataque mais eficazes, e em 2025, t\u00e9cnicas como o <strong data-start=\"2406\" data-end=\"2440\">Adversary-in-the-Middle (AiTM)<\/strong> elevar\u00e3o essa amea\u00e7a.<\/p>\r\n<p data-start=\"2464\" data-end=\"2764\">Com kits de phishing avan\u00e7ados, potenciados por IA, os atacantes conseguir\u00e3o <strong data-start=\"2541\" data-end=\"2598\">ultrapassar sistemas de autentica\u00e7\u00e3o multifator (MFA)<\/strong> e lan\u00e7ar campanhas em larga escala. A resposta passa pela ado\u00e7\u00e3o de normas mais robustas como o <strong data-start=\"2695\" data-end=\"2704\">FIDO2<\/strong>, dentro de arquiteturas de <strong data-start=\"2732\" data-end=\"2763\">confian\u00e7a zero (zero trust)<\/strong>.<\/p>\r\n<hr data-start=\"2766\" data-end=\"2769\" \/>\r\n<h3 data-section-id=\"1iu0hu1\" data-start=\"2771\" data-end=\"2825\">5. Ransomware sem encripta\u00e7\u00e3o: a amea\u00e7a silenciosa<\/h3>\r\n<p data-start=\"2827\" data-end=\"3024\">Veremos uma nova abordagem ao <strong data-start=\"2857\" data-end=\"2871\">ransomware<\/strong>: em vez de encriptar sistemas, os atacantes <strong data-start=\"2916\" data-end=\"2964\">furtar\u00e3o dados sem causar bloqueios vis\u00edveis<\/strong>, evitando assim alertas medi\u00e1ticos ou a\u00e7\u00e3o das autoridades.<\/p>\r\n<p data-start=\"3026\" data-end=\"3220\">Este \u201cperfil discreto\u201d permite exigir resgates sob o pretexto de \u201cservi\u00e7os de auditoria\u201d, explorando vulnerabilidades sem interromper opera\u00e7\u00f5es \u2014 tornando-se mais dif\u00edceis de detetar e combater.<\/p>\r\n<hr data-start=\"3222\" data-end=\"3225\" \/>\r\n<h3 data-section-id=\"paowha\" data-start=\"3227\" data-end=\"3276\">O compromisso da METRICA com a ciberseguran\u00e7a<\/h3>\r\n<p data-start=\"3278\" data-end=\"3578\">Na METRICA, sabemos que o futuro da ciberseguran\u00e7a exige <strong data-start=\"3335\" data-end=\"3358\">adapta\u00e7\u00e3o constante<\/strong>. Estamos comprometidos com a <strong data-start=\"3388\" data-end=\"3420\">ado\u00e7\u00e3o das melhores pr\u00e1ticas<\/strong>, com a <strong data-start=\"3428\" data-end=\"3466\">promo\u00e7\u00e3o de estrat\u00e9gias inovadoras<\/strong> e com o <strong data-start=\"3475\" data-end=\"3514\">refor\u00e7o das nossas pr\u00f3prias defesas<\/strong> \u2014 contribuindo para um ambiente digital mais seguro para todos.<\/p>\r\n<p data-start=\"3580\" data-end=\"3816\">Convidamos-te a acompanhar estas tend\u00eancias e a descobrir, connosco, como construir um futuro mais protegido.<br data-start=\"3689\" data-end=\"3692\" \/>\ud83d\udcf2 <strong data-start=\"3695\" data-end=\"3726\">Segue-nos nas redes sociais<\/strong> para acederes a mais conte\u00fados relevantes sobre ciberseguran\u00e7a e outros temas essenciais.<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>A ciberseguran\u00e7a est\u00e1 em constante evolu\u00e7\u00e3o e, com a chegada de 2025, organiza\u00e7\u00f5es, governos e utilizadores enfrentar\u00e3o um cen\u00e1rio de amea\u00e7as mais sofisticado do que nunca. <\/p>\n","protected":false},"author":1,"featured_media":7280,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1472],"tags":[1474,1475,1351,1476,1247,1566,1478,1588,1173,1231,1513],"class_list":["post-7279","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-qualidade-pt","tag-ciberataque-pt","tag-ciberestafa-pt","tag-ciberseguridad-pt","tag-consejos-de-seguridad-pt","tag-inteligencia-artificial-pt","tag-malware-pt","tag-phishing-pt","tag-ransomware-pt","tag-sector-it-pt","tag-tecnologia-pt","tag-vishing-pt"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Chaves da ciberseguran\u00e7a para 2025 - METRICA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Chaves da ciberseguran\u00e7a para 2025 - METRICA\" \/>\n<meta property=\"og:description\" content=\"A ciberseguran\u00e7a est\u00e1 em constante evolu\u00e7\u00e3o e, com a chegada de 2025, organiza\u00e7\u00f5es, governos e utilizadores enfrentar\u00e3o um cen\u00e1rio de amea\u00e7as mais sofisticado do que nunca.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"METRICA\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-07T23:24:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-30T09:47:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-CIBER-25-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"955\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"desarrollo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"desarrollo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/\"},\"author\":{\"name\":\"desarrollo\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc\"},\"headline\":\"Chaves da ciberseguran\u00e7a para 2025\",\"datePublished\":\"2025-01-07T23:24:00+00:00\",\"dateModified\":\"2025-07-30T09:47:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/\"},\"wordCount\":584,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.metrica-global.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-CIBER-25-scaled-1.jpg\",\"keywords\":[\"Ciberataque\",\"Ciberestafa\",\"Ciberseguridad\",\"Consejos De Seguridad\",\"Inteligencia Artificial\",\"Malware\",\"Phishing\",\"Ransomware\",\"Sector IT\",\"Tecnolog\u00eda\",\"Vishing\"],\"articleSection\":[\"Qualidade\"],\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/\",\"url\":\"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/\",\"name\":\"Chaves da ciberseguran\u00e7a para 2025 - METRICA\",\"isPartOf\":{\"@id\":\"https:\/\/www.metrica-global.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-CIBER-25-scaled-1.jpg\",\"datePublished\":\"2025-01-07T23:24:00+00:00\",\"dateModified\":\"2025-07-30T09:47:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/#primaryimage\",\"url\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-CIBER-25-scaled-1.jpg\",\"contentUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-CIBER-25-scaled-1.jpg\",\"width\":2560,\"height\":955,\"caption\":\"BANNER CIBER 25 scaled 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.metrica-global.com\/pt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Chaves da ciberseguran\u00e7a para 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.metrica-global.com\/#website\",\"url\":\"https:\/\/www.metrica-global.com\/\",\"name\":\"METRICA\",\"description\":\"Servicios Globales IT\",\"publisher\":{\"@id\":\"https:\/\/www.metrica-global.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.metrica-global.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.metrica-global.com\/#organization\",\"name\":\"METRICA\",\"url\":\"https:\/\/www.metrica-global.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png\",\"contentUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png\",\"width\":332,\"height\":58,\"caption\":\"METRICA\"},\"image\":{\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc\",\"name\":\"desarrollo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g\",\"caption\":\"desarrollo\"},\"url\":\"https:\/\/www.metrica-global.com\/pt\/author\/desarrollo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Chaves da ciberseguran\u00e7a para 2025 - METRICA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/","og_locale":"pt_PT","og_type":"article","og_title":"Chaves da ciberseguran\u00e7a para 2025 - METRICA","og_description":"A ciberseguran\u00e7a est\u00e1 em constante evolu\u00e7\u00e3o e, com a chegada de 2025, organiza\u00e7\u00f5es, governos e utilizadores enfrentar\u00e3o um cen\u00e1rio de amea\u00e7as mais sofisticado do que nunca.","og_url":"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/","og_site_name":"METRICA","article_published_time":"2025-01-07T23:24:00+00:00","article_modified_time":"2025-07-30T09:47:40+00:00","og_image":[{"width":2560,"height":955,"url":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-CIBER-25-scaled-1.jpg","type":"image\/jpeg"}],"author":"desarrollo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"desarrollo","Est. reading time":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/#article","isPartOf":{"@id":"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/"},"author":{"name":"desarrollo","@id":"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc"},"headline":"Chaves da ciberseguran\u00e7a para 2025","datePublished":"2025-01-07T23:24:00+00:00","dateModified":"2025-07-30T09:47:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/"},"wordCount":584,"commentCount":0,"publisher":{"@id":"https:\/\/www.metrica-global.com\/#organization"},"image":{"@id":"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-CIBER-25-scaled-1.jpg","keywords":["Ciberataque","Ciberestafa","Ciberseguridad","Consejos De Seguridad","Inteligencia Artificial","Malware","Phishing","Ransomware","Sector IT","Tecnolog\u00eda","Vishing"],"articleSection":["Qualidade"],"inLanguage":"pt-PT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/","url":"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/","name":"Chaves da ciberseguran\u00e7a para 2025 - METRICA","isPartOf":{"@id":"https:\/\/www.metrica-global.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-CIBER-25-scaled-1.jpg","datePublished":"2025-01-07T23:24:00+00:00","dateModified":"2025-07-30T09:47:40+00:00","breadcrumb":{"@id":"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/#primaryimage","url":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-CIBER-25-scaled-1.jpg","contentUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-CIBER-25-scaled-1.jpg","width":2560,"height":955,"caption":"BANNER CIBER 25 scaled 1"},{"@type":"BreadcrumbList","@id":"https:\/\/www.metrica-global.com\/pt\/claves-de-ciberseguridad-para-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.metrica-global.com\/pt\/"},{"@type":"ListItem","position":2,"name":"Chaves da ciberseguran\u00e7a para 2025"}]},{"@type":"WebSite","@id":"https:\/\/www.metrica-global.com\/#website","url":"https:\/\/www.metrica-global.com\/","name":"METRICA","description":"Servicios Globales IT","publisher":{"@id":"https:\/\/www.metrica-global.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.metrica-global.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/www.metrica-global.com\/#organization","name":"METRICA","url":"https:\/\/www.metrica-global.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png","contentUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png","width":332,"height":58,"caption":"METRICA"},"image":{"@id":"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc","name":"desarrollo","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.metrica-global.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g","caption":"desarrollo"},"url":"https:\/\/www.metrica-global.com\/pt\/author\/desarrollo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/posts\/7279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/comments?post=7279"}],"version-history":[{"count":2,"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/posts\/7279\/revisions"}],"predecessor-version":[{"id":12471,"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/posts\/7279\/revisions\/12471"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/media\/7280"}],"wp:attachment":[{"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/media?parent=7279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/categories?post=7279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/tags?post=7279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}