{"version":"1.0","provider_name":"Sap Technology","provider_url":"https:\/\/saptechnology.com.pl\/en\/","author_name":"admin","author_url":"https:\/\/saptechnology.com.pl\/en\/author\/admin\/","title":"IT security - Sap Technology","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"1Agfk6J695\"><a href=\"https:\/\/saptechnology.com.pl\/en\/it-security\/\">IT security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/saptechnology.com.pl\/en\/it-security\/embed\/#?secret=1Agfk6J695\" width=\"600\" height=\"338\" title=\"&#8220;IT security&#8221; &#8212; Sap Technology\" data-secret=\"1Agfk6J695\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/saptechnology.com.pl\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/saptechnology.com.pl\/wp-content\/uploads\/2023\/10\/IT-security-scaled.jpg","thumbnail_width":2560,"thumbnail_height":1707,"description":"An IT security service is a set of measures and technologies aimed at protecting an organization\u2019s information systems and data from threats, including hacking, viruses, attacks, data leaks and other types of cyber threats. This service includes auditing and analyzing vulnerabilities, developing security policies, implementing security measures, and monitoring the system for possible attacks. The [&hellip;]"}