
{"version":"1.0","provider_name":"Insights on Software, Strategy &amp; Scale | BizBrolly Blog","provider_url":"https:\/\/bizbrolly.com\/blog","author_name":"admin","author_url":"https:\/\/bizbrolly.com\/blog\/author\/admin\/","title":"Decoding the differences: Cyber Security vs. Information security","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"aS4QWabEuJ\"><a href=\"https:\/\/bizbrolly.com\/blog\/decoding-the-differences-cyber-security-vs-information-security\/\">Decoding the differences: Cyber Security vs. Information security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/bizbrolly.com\/blog\/decoding-the-differences-cyber-security-vs-information-security\/embed\/#?secret=aS4QWabEuJ\" width=\"600\" height=\"338\" title=\"&#8220;Decoding the differences: Cyber Security vs. Information security&#8221; &#8212; Insights on Software, Strategy &amp; Scale | BizBrolly Blog\" data-secret=\"aS4QWabEuJ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/bizbrolly.com\/blog\/wp-content\/uploads\/2023\/06\/Decoding-the-differences-Cyber-Security-vs.-Information-security.jpg","thumbnail_width":500,"thumbnail_height":395,"description":"Cyber security refers to the protection of computer systems, networks, and electronic data from unauthorized access, theft, and damage. It focuses on safeguarding the digital realm against cyber threats such as hacking, malware, ransomware, and phishing attacks."}