{"version":"1.0","provider_name":"Novvor Chile","provider_url":"https:\/\/novvor.com\/es-cl","author_name":"Adler N.","author_url":"https:\/\/novvor.com\/es-cl\/blog\/author\/adler-n\/","title":"Complimentary Ransomware Vulnerability Assessment","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ieTW6qpWtO\"><a href=\"https:\/\/novvor.com\/es-cl\/blog\/2023\/01\/23\/complimentary-ransomware-vulnerability-assessment\/\">Complimentary Ransomware Vulnerability Assessment<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/novvor.com\/es-cl\/blog\/2023\/01\/23\/complimentary-ransomware-vulnerability-assessment\/embed\/#?secret=ieTW6qpWtO\" width=\"600\" height=\"338\" title=\"\u00abComplimentary Ransomware Vulnerability Assessment\u00bb \u2014 Novvor Chile\" data-secret=\"ieTW6qpWtO\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/novvor.com\/es-cl\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/mld5ajx0udys.i.optimole.com\/cb:_1Uj.32318\/w:auto\/h:auto\/q:mauto\/g:sm\/f:best\/id:46a51d56a95331276a0b13453f397a3c\/https:\/\/novvor.com\/es-cl\/vmware-bg1_6.jpg","thumbnail_width":2400,"thumbnail_height":800,"description":"Is your business protected against ransomware attacks with cloud-based disaster recovery (DR)? Schedule a complimentary Ransomware Vulnerability Assessment with NEUVOR's cyber-security and DR experts. They can evaluate your organization's risk of ransomware attack and advise you on cloud DR services to keep your data and systems safe from an attack. Comment to share your thoughts on ransomware and DR."}