{"version":"1.0","provider_name":"The Codest","provider_url":"https:\/\/thecodest.co\/is\/","author_name":"thecodest","title":"IT Audits and Cybersecurity","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"GqxG6CASoG\"><a href=\"https:\/\/thecodest.co\/is\/blog\/it-audits-and-cybersecurity\/\">Uppl\u00fdsingat\u00e6knisko\u00f0anir og net\u00f6ryggi<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/thecodest.co\/is\/blog\/it-audits-and-cybersecurity\/embed\/#?secret=GqxG6CASoG\" width=\"600\" height=\"338\" title=\"\u201cUppl\u00fdsingat\u00e6knisko\u00f0anir og net\u00f6ryggi\u201d \u2014 The Codest\" data-secret=\"GqxG6CASoG\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/thecodest.co\/wp\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>","thumbnail_url":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/it_audit_vs_cybersecurity__the_differences.png","thumbnail_width":960,"thumbnail_height":540,"description":"In today's digital world, the importance of security and risk management cannot be ignored. For CEOs, CTOs, and Delivery Managers, understanding IT audits and cybersecurity is crucial for ensuring the protection and efficiency of their organisations."}