{"version":"1.0","provider_name":"Collaboris","provider_url":"https:\/\/www.collaboris.com","title":"A Beginner\u2019s Guide to Information Security Policies","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"BAj3EJ1MZp\"><a href=\"https:\/\/www.collaboris.com\/information-security-policies-beginners-guide\/\">A Beginner\u2019s Guide to Information Security Policies<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.collaboris.com\/information-security-policies-beginners-guide\/embed\/#?secret=BAj3EJ1MZp\" width=\"600\" height=\"338\" title=\"&#8220;A Beginner\u2019s Guide to Information Security Policies&#8221; &#8212; Collaboris\" data-secret=\"BAj3EJ1MZp\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.collaboris.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2022\/10\/A-beginners-guide-to-information-security-policies.png","thumbnail_width":1112,"thumbnail_height":582,"description":"Information Security Policies are a set of guidelines that help businesses to protect their customers\u2019 and employees\u2019 data. These policies are in place to ensure that the company is not violating any legal or ethical regulations. They also provide a framework for the company to make sure that they are prepared for any security breaches."}