{"version":"1.0","provider_name":"TalentSprint","provider_url":"https:\/\/talentsprint.com\/blog","author_name":"admin","author_url":"https:\/\/talentsprint.com\/blog\/author\/admin\/","title":"Top 5 Challenges to the Adoption of Cyber Security - TalentSprint","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"vuoDUapnoD\"><a href=\"https:\/\/talentsprint.com\/blog\/top-5-challenges-to-the-adoption-of-cyber-security\/\">Top 5 Challenges to the Adoption of Cyber Security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/talentsprint.com\/blog\/top-5-challenges-to-the-adoption-of-cyber-security\/embed\/#?secret=vuoDUapnoD\" width=\"600\" height=\"338\" title=\"&#8220;Top 5 Challenges to the Adoption of Cyber Security&#8221; &#8212; TalentSprint\" data-secret=\"vuoDUapnoD\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/talentsprint.com\/blog\/wp-content\/uploads\/2023\/09\/TS-blog.webp","thumbnail_width":1140,"thumbnail_height":760,"description":"Cyber security is like any other security \u2013 you don\u2019t realize its importance unless you need it. In the digitized world, it will be safe to say that every company is a tech-based company. Even if it doesn\u2019t sell technology-based products or services, it uses technology to run and manage the business. In fact, with [&hellip;]"}