{"version":"1.0","provider_name":"3R - second hand electronics","provider_url":"https:\/\/3r.com.pl\/en\/","author_name":"marketing","author_url":"https:\/\/3r.com.pl\/en\/author\/marketing\/","title":"Bezpiecze\u0144stwo danych \u2013 zagro\u017cenia cz.1 | 3R - second hand electronics","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"roF1pbNWE5\"><a href=\"https:\/\/3r.com.pl\/en\/blog-en\/bezpieczenstwo-danych-zagrozenia-cz-1\/\">Bezpiecze\u0144stwo danych \u2013 zagro\u017cenia cz.1<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/3r.com.pl\/en\/blog-en\/bezpieczenstwo-danych-zagrozenia-cz-1\/embed\/#?secret=roF1pbNWE5\" width=\"600\" height=\"338\" title=\"&#8220;Bezpiecze\u0144stwo danych \u2013 zagro\u017cenia cz.1&#8221; &#8212; 3R - second hand electronics\" data-secret=\"roF1pbNWE5\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/3r.com.pl\/wp-content\/uploads\/photo-1529775983207-b68e16037a7f.jpg","thumbnail_width":634,"thumbnail_height":951,"description":"Najnowsze badania Wed\u0142ug Risk Based Security 8 miliard\u00f3w rekord\u00f3w zosta\u0142o zagro\u017conych przez 5 207 narusze\u0144 danych w 2017 r. \u015arednie naruszenie kosztuje oko\u0142o 2,69 miliona euro, wed\u0142ug globalnych bada\u0144 przeprowadzonych przez Ponemon Institute \u201eGlobal Overview\u201d. Na t\u0119 kwot\u0119 sk\u0142adaj\u0105 si\u0119 op\u0142aty za obron\u0119 prawn\u0105, kary za nieprzestrzeganie przepis\u00f3w, koszty powiadamiania o naruszeniu danych, straty w [&hellip;]"}