{"version":"1.0","provider_name":"Urolime Blogs","provider_url":"https:\/\/www.urolime.com\/blogs","author_name":"Urolime Technologies","author_url":"https:\/\/www.urolime.com\/blogs\/author\/blogadmin\/","title":"How to keep your cloud infrastructure secure? - Urolime Blogs","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"2nm5PENrxo\"><a href=\"https:\/\/www.urolime.com\/blogs\/how-to-keep-your-cloud-infrastructure-secure\/\">How to keep your cloud infrastructure secure?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.urolime.com\/blogs\/how-to-keep-your-cloud-infrastructure-secure\/embed\/#?secret=2nm5PENrxo\" width=\"600\" height=\"338\" title=\"&#8220;How to keep your cloud infrastructure secure?&#8221; &#8212; Urolime Blogs\" data-secret=\"2nm5PENrxo\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2020\/06\/URO-BLOG-20.png","thumbnail_width":768,"thumbnail_height":432,"description":"One of the cloud\u2019s benefits is quick and easy access provisioning which can be used as an advantage to avoid data leakage if appropriate guard rails and user training are provided in place."}