{"version":"1.0","provider_name":"TransNumerik\u202f","provider_url":"https:\/\/transnumerik.com\/en","author_name":"Herv\u00e9 KACOU","author_url":"https:\/\/transnumerik.com\/en\/author\/herve-kacoutransnumerik-com\/","title":"Cybers\u00e9curit\u00e9 - TransNumerik","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"M7HvE6cpt7\"><a href=\"https:\/\/transnumerik.com\/en\/article-des-bonnes-pratiques-en-cybersecurite\/\">Cybersecurity<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/transnumerik.com\/en\/article-des-bonnes-pratiques-en-cybersecurite\/embed\/#?secret=M7HvE6cpt7\" width=\"600\" height=\"338\" title=\"&#8220;Cybers\u00e9curit\u00e9&#8221; &#8212; TransNumerik\" data-secret=\"M7HvE6cpt7\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/transnumerik.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>","thumbnail_url":"https:\/\/i0.wp.com\/transnumerik.com\/wp-content\/uploads\/2024\/06\/Bonne-pratique-954-x-636-px-954-x-636-px-2.jpg?fit=954%2C636&ssl=1","thumbnail_width":954,"thumbnail_height":636,"description":"Aujourd'hui, la cybers\u00e9curit\u00e9 est plus cruciale que jamais, avec les menaces en constante \u00e9volution telles que le phishing, les attaques par force brute et bien d'autres. Face \u00e0 cette r\u00e9alit\u00e9, nous vous proposons un ensemble de ressources pour renforcer la s\u00e9curit\u00e9 de vos syst\u00e8mes informatiques et prot\u00e9ger vos donn\u00e9es sensibles."}