{"id":17659,"date":"2022-11-22T09:54:46","date_gmt":"2022-11-22T12:54:46","guid":{"rendered":"https:\/\/www.neomind.com.br\/?p=17659"},"modified":"2022-11-24T15:12:54","modified_gmt":"2022-11-24T18:12:54","slug":"5-tips-to-reduce-it-risks","status":"publish","type":"post","link":"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/","title":{"rendered":"5 tips to reduce IT risks"},"content":{"rendered":"\n<p>Many organizations depend critically on their information and communication systems development. In general, such systems exist to help the corporation\u2019s evolutionary process by ensuring that automated operations and strategic measures are taken when necessary.<\/p>\n\n\n\n<p>Yet, even technologies so beneficial to the organization must be used wisely and with caution. The rampant adoption and mismanagement of technologies already in use can lead the company to truly chaotic scenarios, as pointed out by <a href=\"https:\/\/link.springer.com\/article\/10.1057\/dbm.2009.6\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Ekinci, Sharma, and Stone (2009)<\/a>.<\/p>\n\n\n\n<p>Thus, considering that IT risk management is a vast field of study, with this article I want to present, even if in a summarized and simplified way, five steps to reduce IT risks in enterprise environments.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are IT risks?<\/h2>\n\n\n\n<p>IT risks can essentially be seen by the formula <em>Risk = vulnerability * threat<\/em>. In other words, risk can be assessed according to the fragility\/vulnerability of the system in question in relation to the level of threats it faces.<\/p>\n\n\n\n<p>Therefore, when the number of vulnerabilities or the number of threats is sufficiently small (approaching 0), the risk will be reduced and tend to be lower. Translating, if there are no threats to a system, then the number of vulnerabilities does not change the risk involved and vice versa.<\/p>\n\n\n\n<p>Still, in business environments, we also talk about risk levels, since risk alone does not show us the need for investments in IT security and management. The risk level is obtained by evaluating the losses involved if the risk occurs. For simplicity, we have the formula: <em>Risk Level= risk * asset value * consequences<\/em>, where consequences are the negative points of the occurrence of the risk. This indicator is very important for organizations to better distribute investments in information security since it is possible to &#8220;weigh&#8221; the risks and losses involved, and thus focus on points of greater interest.<\/p>\n\n\n\n<p>Among IT risks are <em>software\/hardware<\/em> failure, human error, viruses, malicious attacks, and natural causes such as fire, for example. In addition, the theft of confidential information can cause huge losses, which has become one of the biggest reasons for major investments in IT management and information security. When it comes to risks with the use of IT, the idea is to minimize them as much as possible so that they do not occur and, still, know and prepare for the various scenarios.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to reduce IT risks?<\/h2>\n\n\n\n<p>The following are five of the seven steps cited by <a href=\"http:\/\/www.tradeready.ca\/author\/chris-blood-rojas\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Blood-Rojas (2017)<\/a> in his article on technology risk reduction.<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><strong>Identify key risks and assess their likelihood and impact<\/strong><strong><\/strong><\/li><\/ol>\n\n\n\n<p>It is common to hire IT specialists in this process. Companies seek to identify areas of greatest concern, in addition to assessing the probability of a risk&#8217;s occurrence, as well as its possible impacts. This stage includes risks whose impact, should they occur, is very high and critically influences the organization&#8217;s survival. The objective here is to identify the chances of a risk occurring, minimize them, and create action plans, both to avoid the risk and to deal with a pessimistic scenario.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Analyze information security threats<\/strong><\/li><\/ul>\n\n\n\n<p>The organization must identify security vulnerabilities, whether they are related to external attacks or even from within the company itself. In addition, the minimum security requirements should be reviewed in some areas, such as access and control of the systems used, transaction authorization, and data integrity. Finally, a sequence of tests is also important, in order to pinpoint possible vulnerabilities and verify the functioning of <em>backup<\/em> systems.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Analyze the risk of software or hardware failure<\/strong><\/li><\/ul>\n\n\n\n<p>Organizations must consider the risk of hardware and\/or software failure in order to identify the consequences and procedures in cases where failure occurs. From time to time it is important to check how stable the equipment and technologies used are.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Check the risks of hiring third parties<\/strong><\/li><\/ul>\n\n\n\n<p>Hiring third parties is a very common process in organizations, and it is important to be very cautious when hiring outsourced companies. Thus, it is recommended to evaluate the service provision, as well as the principles of the contracted company, so that the organization&#8217;s security and risk reduction policies are not compromised.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Measuring Impact<\/strong><\/li><\/ul>\n\n\n\n<p>If your organization had sensitive information stolen, for example, what kind of impact would it suffer? The impact calculation can be seen as the damage caused by the occurrence of a risk. Furthermore, it helps in the decision of implementing IT management policies. According to the losses involved, you can choose IT security and management policies that best fit your scenarios.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">In conclusion<\/h2>\n\n\n\n<p>Fusion Platform can be an important ally in IT management, especially for its <a href=\"https:\/\/www.neomind.com.br\/en\/fusion-platform\/?ref=blog\" target=\"_blank\" rel=\"noreferrer noopener\">Analytics<\/a> module, which can accurately represent both the risk and the risk level involved in its analysis.<\/p>\n\n\n\n<p>Thus, it is possible for those responsible to have greater precision when distributing investments in information security and managing to reduce the IT risk scenario. In addition, Fusion can also be used as a tool by the IT manager, since it will be possible to open support calls, for example.<\/p>\n\n\n\n<p><strong>To learn more about the Fusion Platform, <\/strong><a href=\"https:\/\/www.neomind.com.br\/en\/?ref=blog\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>visit our website<\/strong><\/a><strong>.<\/strong><\/p>\n\n\n\n<p><br><strong>References<\/strong><br><a href=\"http:\/\/www.tradeready.ca\/2017\/topics\/researchdevelopment\/7-steps-minimize-technological-risk\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Trade Ready,<\/a>\u00a0<a href=\"https:\/\/link.springer.com\/article\/10.1057\/dbm.2009.6\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Springe<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Poor technology management can lead your company to chaotic scenarios. We have separated five steps to help your organization stay away from IT risks.<\/p>\n","protected":false},"author":34,"featured_media":17664,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[358],"tags":[296,331],"class_list":["post-17659","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation-it","tag-automation","tag-process"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 tips to reduce IT risks - Neomind<\/title>\n<meta name=\"description\" content=\"Poor technology management can lead your company to chaotic scenarios. We have separated five steps to help your organization stay away from IT risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 tips to reduce IT risks\" \/>\n<meta property=\"og:description\" content=\"Poor technology management can lead your company to chaotic scenarios. We have separated five steps to help your organization stay away from IT risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"Neomind\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/neomindsocial\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-22T12:54:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-24T18:12:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2022\/11\/5-tips-to-redyce-it-risks-social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adnei Donatti\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adnei Donatti\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/\"},\"author\":{\"name\":\"Adnei Donatti\",\"@id\":\"https:\/\/www.neomind.com.br\/#\/schema\/person\/77a5236608c65879f12982aca2869fd3\"},\"headline\":\"5 tips to reduce IT risks\",\"datePublished\":\"2022-11-22T12:54:46+00:00\",\"dateModified\":\"2022-11-24T18:12:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/\"},\"wordCount\":839,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.neomind.com.br\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2022\/11\/5-tips-to-reduce-IT-risks.jpg\",\"keywords\":[\"automation\",\"process\"],\"articleSection\":[\"Innovation &amp; IT\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/\",\"url\":\"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/\",\"name\":\"5 tips to reduce IT risks - Neomind\",\"isPartOf\":{\"@id\":\"https:\/\/www.neomind.com.br\/#website\"},\"about\":{\"@id\":\"https:\/\/www.neomind.com.br\/#organization\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2022\/11\/5-tips-to-reduce-IT-risks.jpg\",\"datePublished\":\"2022-11-22T12:54:46+00:00\",\"dateModified\":\"2022-11-24T18:12:54+00:00\",\"description\":\"Poor technology management can lead your company to chaotic scenarios. We have separated five steps to help your organization stay away from IT risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/#primaryimage\",\"url\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2022\/11\/5-tips-to-reduce-IT-risks.jpg\",\"contentUrl\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2022\/11\/5-tips-to-reduce-IT-risks.jpg\",\"width\":770,\"height\":205},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.neomind.com.br\/#website\",\"url\":\"https:\/\/www.neomind.com.br\/\",\"name\":\"Neomind\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.neomind.com.br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.neomind.com.br\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.neomind.com.br\/#organization\",\"name\":\"Neomind\",\"url\":\"https:\/\/www.neomind.com.br\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.neomind.com.br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2018\/04\/logo-neomind-vertical.png\",\"contentUrl\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2018\/04\/logo-neomind-vertical.png\",\"width\":1280,\"height\":713,\"caption\":\"Neomind\"},\"image\":{\"@id\":\"https:\/\/www.neomind.com.br\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/neomindsocial\",\"https:\/\/www.instagram.com\/neomind.solutions\/\",\"https:\/\/www.linkedin.com\/company\/neomind\/\",\"https:\/\/www.youtube.com\/NeomindSocial\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.neomind.com.br\/#\/schema\/person\/77a5236608c65879f12982aca2869fd3\",\"name\":\"Adnei Donatti\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.neomind.com.br\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0e6ecd314128f5ad469c8ab3bdef64e745346b685312acdb3d31eec583678a00?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0e6ecd314128f5ad469c8ab3bdef64e745346b685312acdb3d31eec583678a00?s=96&d=mm&r=g\",\"caption\":\"Adnei Donatti\"},\"description\":\"Ocupou o cargo de desenvolvedor Full Stack na equipe de inova\u00e7\u00e3o da Neomind h\u00e1 um ano. Formado em An\u00e1lise e Desenvolvimento de Sistemas e mestrando em Computa\u00e7\u00e3o Aplicada pela Universidade do Estado de Santa Catarina (UDESC).\",\"url\":\"https:\/\/www.neomind.com.br\/en\/blog\/author\/adnei-donatti\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 tips to reduce IT risks - Neomind","description":"Poor technology management can lead your company to chaotic scenarios. We have separated five steps to help your organization stay away from IT risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/","og_locale":"en_US","og_type":"article","og_title":"5 tips to reduce IT risks","og_description":"Poor technology management can lead your company to chaotic scenarios. We have separated five steps to help your organization stay away from IT risks.","og_url":"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/","og_site_name":"Neomind","article_publisher":"https:\/\/www.facebook.com\/neomindsocial","article_published_time":"2022-11-22T12:54:46+00:00","article_modified_time":"2022-11-24T18:12:54+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2022\/11\/5-tips-to-redyce-it-risks-social.jpg","type":"image\/jpeg"}],"author":"Adnei Donatti","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adnei Donatti","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/#article","isPartOf":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/"},"author":{"name":"Adnei Donatti","@id":"https:\/\/www.neomind.com.br\/#\/schema\/person\/77a5236608c65879f12982aca2869fd3"},"headline":"5 tips to reduce IT risks","datePublished":"2022-11-22T12:54:46+00:00","dateModified":"2022-11-24T18:12:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/"},"wordCount":839,"commentCount":0,"publisher":{"@id":"https:\/\/www.neomind.com.br\/#organization"},"image":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2022\/11\/5-tips-to-reduce-IT-risks.jpg","keywords":["automation","process"],"articleSection":["Innovation &amp; IT"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/","url":"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/","name":"5 tips to reduce IT risks - Neomind","isPartOf":{"@id":"https:\/\/www.neomind.com.br\/#website"},"about":{"@id":"https:\/\/www.neomind.com.br\/#organization"},"primaryImageOfPage":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/#primaryimage"},"image":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2022\/11\/5-tips-to-reduce-IT-risks.jpg","datePublished":"2022-11-22T12:54:46+00:00","dateModified":"2022-11-24T18:12:54+00:00","description":"Poor technology management can lead your company to chaotic scenarios. We have separated five steps to help your organization stay away from IT risks.","breadcrumb":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/#primaryimage","url":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2022\/11\/5-tips-to-reduce-IT-risks.jpg","contentUrl":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2022\/11\/5-tips-to-reduce-IT-risks.jpg","width":770,"height":205},{"@type":"BreadcrumbList","@id":"https:\/\/www.neomind.com.br\/en\/blog\/5-tips-to-reduce-it-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio"}]},{"@type":"WebSite","@id":"https:\/\/www.neomind.com.br\/#website","url":"https:\/\/www.neomind.com.br\/","name":"Neomind","description":"","publisher":{"@id":"https:\/\/www.neomind.com.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.neomind.com.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.neomind.com.br\/#organization","name":"Neomind","url":"https:\/\/www.neomind.com.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.neomind.com.br\/#\/schema\/logo\/image\/","url":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2018\/04\/logo-neomind-vertical.png","contentUrl":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2018\/04\/logo-neomind-vertical.png","width":1280,"height":713,"caption":"Neomind"},"image":{"@id":"https:\/\/www.neomind.com.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/neomindsocial","https:\/\/www.instagram.com\/neomind.solutions\/","https:\/\/www.linkedin.com\/company\/neomind\/","https:\/\/www.youtube.com\/NeomindSocial\/"]},{"@type":"Person","@id":"https:\/\/www.neomind.com.br\/#\/schema\/person\/77a5236608c65879f12982aca2869fd3","name":"Adnei Donatti","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.neomind.com.br\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0e6ecd314128f5ad469c8ab3bdef64e745346b685312acdb3d31eec583678a00?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0e6ecd314128f5ad469c8ab3bdef64e745346b685312acdb3d31eec583678a00?s=96&d=mm&r=g","caption":"Adnei Donatti"},"description":"Ocupou o cargo de desenvolvedor Full Stack na equipe de inova\u00e7\u00e3o da Neomind h\u00e1 um ano. Formado em An\u00e1lise e Desenvolvimento de Sistemas e mestrando em Computa\u00e7\u00e3o Aplicada pela Universidade do Estado de Santa Catarina (UDESC).","url":"https:\/\/www.neomind.com.br\/en\/blog\/author\/adnei-donatti\/"}]}},"_links":{"self":[{"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/posts\/17659","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/comments?post=17659"}],"version-history":[{"count":4,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/posts\/17659\/revisions"}],"predecessor-version":[{"id":17707,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/posts\/17659\/revisions\/17707"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/media\/17664"}],"wp:attachment":[{"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/media?parent=17659"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/categories?post=17659"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/tags?post=17659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}