{"version":"1.0","provider_name":"Sage Advice Maroc","provider_url":"https:\/\/www.sage.com\/fr-ma\/blog","author_name":"Celine Bayle","author_url":"https:\/\/www.sage.com\/fr-ma\/blog\/author\/celinebayle1\/","title":"Cyber-s\u00e9curit\u00e9 : les 3 nouveaux d\u00e9fis","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"hAW2pWbEco\"><a href=\"https:\/\/www.sage.com\/fr-ma\/blog\/cyber-securite-les-3-nouveaux-defis\/\">Cyber-s\u00e9curit\u00e9 : les 3 nouveaux d\u00e9fis<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.sage.com\/fr-ma\/blog\/cyber-securite-les-3-nouveaux-defis\/embed\/#?secret=hAW2pWbEco\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Cyber-s\u00e9curit\u00e9 : les 3 nouveaux d\u00e9fis\u00a0\u00bb &#8212; Sage Advice Maroc\" data-secret=\"hAW2pWbEco\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.sage.com\/fr-ma\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.sage.com\/fr-ma\/blog\/wp-content\/uploads\/sites\/23\/2020\/04\/Joburg_Colleague_Photo_196.28249.jpg","thumbnail_width":1910,"thumbnail_height":1275,"description":"Le besoin de cyber-s\u00e9curit\u00e9 n\u2019est pas n\u00e9 avec la pand\u00e9mie. En effet, c\u2019est bien la transformation digitale des entreprises qui induit de nouvelles exigences pour la s\u00e9curit\u00e9 du fonctionnement des organisations. Au passage, c\u2019est aussi ce mouvement entam\u00e9 hier vers davantage de vitesse, de collaboration et de mobilit\u00e9 qui permet aujourd\u2019hui la r\u00e9activit\u00e9 des entreprises [&hellip;]"}