<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>The Codest</provider_name><provider_url>https://thecodest.co/es/</provider_url><author_name>thecodest</author_name><title>IT Audits and Cybersecurity</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="KSzBmC3g2K"&gt;&lt;a href="https://thecodest.co/es/blog/it-audits-and-cybersecurity/"&gt;Auditor&#xED;as inform&#xE1;ticas y ciberseguridad&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://thecodest.co/es/blog/it-audits-and-cybersecurity/embed/#?secret=KSzBmC3g2K" width="600" height="338" title=""Auditor&#xED;as inform&#xE1;ticas y ciberseguridad" - The Codest" data-secret="KSzBmC3g2K" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://thecodest.co/wp/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;</html><thumbnail_url>https://thecodest.co/app/uploads/2024/05/it_audit_vs_cybersecurity__the_differences.png</thumbnail_url><thumbnail_width>960</thumbnail_width><thumbnail_height>540</thumbnail_height><description>In today's digital world, the importance of security and risk management cannot be ignored. For CEOs, CTOs, and Delivery Managers, understanding IT audits and cybersecurity is crucial for ensuring the protection and efficiency of their organisations.</description></oembed>
