{"version":"1.0","provider_name":"The Codest","provider_url":"https:\/\/thecodest.co\/es\/","author_name":"thecodest","title":"IT Audits and Cybersecurity","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"jaBMbzcNVo\"><a href=\"https:\/\/thecodest.co\/es\/blog\/it-audits-and-cybersecurity\/\">Auditor\u00edas inform\u00e1ticas y ciberseguridad<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/thecodest.co\/es\/blog\/it-audits-and-cybersecurity\/embed\/#?secret=jaBMbzcNVo\" width=\"600\" height=\"338\" title=\"&quot;Auditor\u00edas inform\u00e1ticas y ciberseguridad&quot; - The Codest\" data-secret=\"jaBMbzcNVo\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/thecodest.co\/wp\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>","thumbnail_url":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/it_audit_vs_cybersecurity__the_differences.png","thumbnail_width":960,"thumbnail_height":540,"description":"In today's digital world, the importance of security and risk management cannot be ignored. For CEOs, CTOs, and Delivery Managers, understanding IT audits and cybersecurity is crucial for ensuring the protection and efficiency of their organisations."}