{"version":"1.0","provider_name":"CyberForces","provider_url":"https:\/\/cyberforces.com\/en","author_name":"Katarzyna W\u00f3jcik","author_url":"https:\/\/cyberforces.com\/en\/author\/katarzyna-wojcik","title":"IT Security Audit \u2013 comprehensive protection for your business - CyberForces","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"vsf45olfN5\"><a href=\"https:\/\/cyberforces.com\/en\/it-security-audit-comprehensive-protection-for-your-business\">IT Security Audit \u2013 comprehensive protection for your business<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cyberforces.com\/en\/it-security-audit-comprehensive-protection-for-your-business\/embed#?secret=vsf45olfN5\" width=\"600\" height=\"338\" title=\"&#8220;IT Security Audit \u2013 comprehensive protection for your business&#8221; &#8212; CyberForces\" data-secret=\"vsf45olfN5\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/cyberforces.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Audyt-bezpieczenstwa-IT-1200x675-pl.webp?wsr","thumbnail_width":1200,"thumbnail_height":675,"description":"Table of contents: What is an IT security audit? Types of IT audits and their significance How does an IT audit work? Example process When should you consider an IT audit? IT audit \u2013 should you conduct it yourself? Key benefits of performing an IT audit What is an IT security audit? An IT security [&hellip;]"}