{"version":"1.0","provider_name":"Insside EN","provider_url":"https:\/\/www.insside.net\/en","author_name":"INSSIDE","author_url":"https:\/\/www.insside.net\/en\/author\/cruiz\/","title":"Business Cyber Risks: How to Avoid Them? - Insside EN","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"kt7pX6OlTB\"><a href=\"https:\/\/www.insside.net\/en\/business-cyber-risks-how-to-avoid-them\/\">Business Cyber Risks: How to Avoid Them?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.insside.net\/en\/business-cyber-risks-how-to-avoid-them\/embed\/#?secret=kt7pX6OlTB\" width=\"600\" height=\"338\" title=\"&#8220;Business Cyber Risks: How to Avoid Them?&#8221; &#8212; Insside EN\" data-secret=\"kt7pX6OlTB\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.insside.net\/en\/wp-content\/uploads\/sites\/9\/2024\/06\/hand-holding-cloud-system-with-data-protection-1-scaled.jpg","thumbnail_width":2560,"thumbnail_height":1706,"description":"In today\u2019s digital world, businesses face a variety of cyber risks that can compromise their security and operations. No company is entirely free from risks, leading to uncertainty and potentially negative impacts on their functionality. Therefore, it is essential to identify potential risks and create strategies to avoid or reduce their impact. Types of Cyber [...]"}