{"id":3712,"date":"2023-03-25T14:03:01","date_gmt":"2023-03-25T14:03:01","guid":{"rendered":"https:\/\/tecnologia.vamtam.com\/?page_id=3712"},"modified":"2024-02-23T14:41:59","modified_gmt":"2024-02-23T17:41:59","slug":"resposta-e-contencao","status":"publish","type":"page","link":"https:\/\/www.ogasec.com\/index.php\/solucoes\/resposta-e-contencao\/","title":{"rendered":"Resposta e Conten\u00e7\u00e3o"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3712\" class=\"elementor elementor-3712\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b9acce5 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"b9acce5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0f29aef\" data-id=\"0f29aef\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65f229a animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"65f229a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_tablet&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Resposta e Conten\u00e7\u00e3o:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9d614af elementor-section-content-middle elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9d614af\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-332c6d3c\" data-id=\"332c6d3c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-14b66f00 elementor-widget elementor-widget-heading\" data-id=\"14b66f00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Resposta e Conten\u00e7\u00e3o<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a83405e elementor-widget elementor-widget-text-editor\" data-id=\"1a83405e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A abordagem \u00e0 Resposta e Conten\u00e7\u00e3o constitui uma preocupa\u00e7\u00e3o global, demandando esfor\u00e7os constantes para manter-se atualizado diante das mais recentes amea\u00e7as e pr\u00e1ticas de seguran\u00e7a.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-533cb909 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"533cb909\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2693a6a1\" data-id=\"2693a6a1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21b3c355 elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"21b3c355\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-check-box\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAn\u00e1lise e conten\u00e7\u00e3o de malware\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tA an\u00e1lise e conten\u00e7\u00e3o de malware envolvem o exame e a compreens\u00e3o do software malicioso para mitigar seus efeitos nocivos e evitar sua propaga\u00e7\u00e3o entre sistemas.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e896035 elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"7e896035\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-check-box\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tLimpeza de ambiente\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tNo contexto da ciberseguran\u00e7a, a limpeza ambiental refere-se ao processo de remo\u00e7\u00e3o de malware e outros artefactos maliciosos de um sistema ou rede infetada para restaurar a seguran\u00e7a e a funcionalidade.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1df3feb elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"1df3feb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-check-box\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPesquisa e Bloqueio de identidades vazadas\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tEnvolve detectar e prevenir o uso de identidades pessoais ou corporativas que foram expostas em viola\u00e7\u00f5es de dados, para proteger contra acesso n\u00e3o autorizado e fraude.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7095c833\" data-id=\"7095c833\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4925071e elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"4925071e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-check-box\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAn\u00e1lise de logs e protocolos\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAtuamos no diagn\u00f3stico e exame de logs de sistema e protocolos de rede para identificar, compreender e mitigar amea\u00e7as, anomalias ou viola\u00e7\u00f5es de seguran\u00e7a em um ambiente digital.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7909ff17 elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"7909ff17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-check-box\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tTake-down de sites externos\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tNosso time atua no processo de remover ou desabilitar legalmente o acesso a sites que hospedam conte\u00fado malicioso, praticam atividades ilegais ou infringem propriedade intelectual.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe6e797 elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"fe6e797\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-check-box\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tGest\u00e3o de sala de crise\/guerra\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tIremos coordenar e gerenciar a resposta a incidentes de seguran\u00e7a cr\u00edticos em um espa\u00e7o dedicado, focando na tomada de decis\u00f5es estrat\u00e9gicas e comunica\u00e7\u00e3o para mitigar amea\u00e7as.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-26223137\" data-id=\"26223137\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e7ad13f elementor-widget elementor-widget-spacer\" data-id=\"3e7ad13f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d5d1375 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d5d1375\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9577952\" data-id=\"9577952\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6e1dff18 elementor-widget elementor-widget-spacer\" data-id=\"6e1dff18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-52440eab\" data-id=\"52440eab\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9dc2ff6 elementor-widget elementor-widget-heading\" data-id=\"9dc2ff6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Resposta e Conten\u00e7\u00e3o<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3de46850 elementor-widget elementor-widget-text-editor\" data-id=\"3de46850\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Numa era em que as amea\u00e7as cibern\u00e9ticas s\u00e3o maiores do que nunca, estar \u00e0 frente dos mais recentes desafios de seguran\u00e7a n\u00e3o \u00e9 apenas uma op\u00e7\u00e3o: \u00e9 uma necessidade. A nossa abordagem abrangente \u00e0 resposta e \u00e0 conten\u00e7\u00e3o \u00e9 uma prova do nosso compromisso com a resili\u00eancia da ciberseguran\u00e7a global. Desde a an\u00e1lise e conten\u00e7\u00e3o aprofundadas de malware, garantindo que o software malicioso n\u00e3o seja apenas compreendido, mas tamb\u00e9m neutralizado, at\u00e9 a limpeza ambiental, onde livramos meticulosamente seus sistemas e redes de entidades prejudiciais, nos dedicamos a restaurar e fortalecer sua integridade digital.<\/p><p>Mas nossos esfor\u00e7os n\u00e3o param por a\u00ed. Com o problema generalizado de identidades vazadas, pesquisamos e bloqueamos proativamente tentativas de explorar informa\u00e7\u00f5es pessoais ou corporativas, protegendo sua identidade contra acesso n\u00e3o autorizado e fraude. Atrav\u00e9s de rigorosa an\u00e1lise de logs e protocolos, investigamos o cerne de suas opera\u00e7\u00f5es digitais, identificando e abordando quaisquer amea\u00e7as ou anomalias de seguran\u00e7a que possam comprometer suas opera\u00e7\u00f5es.<\/p><p>Al\u00e9m disso, diante de sites externos maliciosos, nossa equipe \u00e9 adepta da execu\u00e7\u00e3o de Take-downs, removendo ou desabilitando legalmente o acesso a plataformas que hospedam conte\u00fado malicioso ou praticam atividades ilegais. E quando ocorrem crises, nossos recursos de gerenciamento de crises\/salas de guerra garantem que voc\u00ea esteja preparado para responder com tomada de decis\u00f5es estrat\u00e9gicas e comunica\u00e7\u00e3o eficaz.<\/p><p>O cen\u00e1rio digital est\u00e1 repleto de desafios, mas com a nossa experi\u00eancia, voc\u00ea nunca est\u00e1 sozinho. Entre em contato com um de nossos consultores especializados hoje mesmo e deixe-nos capacit\u00e1-lo com as ferramentas e estrat\u00e9gias para n\u00e3o apenas sobreviver, mas tamb\u00e9m prosperar diante das adversidades cibern\u00e9ticas. Sua seguran\u00e7a \u00e9 nossa prioridade. Vamos proteger juntos o seu futuro digital.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Resposta e Conten\u00e7\u00e3o \u00e9 uma preocupa\u00e7\u00e3o global e envolve esfor\u00e7os cont\u00ednuos para se manter atualizado em rela\u00e7\u00e3o \u00e0s \u00faltimas amea\u00e7as e pr\u00e1ticas de seguran\u00e7a. <\/p>\n","protected":false},"author":3,"featured_media":0,"parent":465,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"class_list":["post-3712","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.ogasec.com\/index.php\/wp-json\/wp\/v2\/pages\/3712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ogasec.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ogasec.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ogasec.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ogasec.com\/index.php\/wp-json\/wp\/v2\/comments?post=3712"}],"version-history":[{"count":15,"href":"https:\/\/www.ogasec.com\/index.php\/wp-json\/wp\/v2\/pages\/3712\/revisions"}],"predecessor-version":[{"id":991411,"href":"https:\/\/www.ogasec.com\/index.php\/wp-json\/wp\/v2\/pages\/3712\/revisions\/991411"}],"up":[{"embeddable":true,"href":"https:\/\/www.ogasec.com\/index.php\/wp-json\/wp\/v2\/pages\/465"}],"wp:attachment":[{"href":"https:\/\/www.ogasec.com\/index.php\/wp-json\/wp\/v2\/media?parent=3712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}