{"version":"1.0","provider_name":"Retarus Corporate Blog - EN","provider_url":"https:\/\/www.retarus.com\/blog\/en","title":"Hidden costs make data breaches really costly","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ukCmhyn8gG\"><a href=\"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/\">Hidden costs make data breaches really costly<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.retarus.com\/blog\/en\/hidden-costs-make-data-breaches-really-costly\/embed\/#?secret=ukCmhyn8gG\" width=\"600\" height=\"338\" title=\"&#8220;Hidden costs make data breaches really costly&#8221; &#8212; Retarus Corporate Blog - EN\" data-secret=\"ukCmhyn8gG\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.retarus.com\/blog\/en\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2018\/07\/pepi-stojanovski-509192-unsplash.jpg","thumbnail_width":1280,"thumbnail_height":720,"description":"In 2018, IBM and the Ponemon Institute have once again been investigating how costly data breaches can become for companies \u2013 and now, for the first time, they have also taken \u201cmega breaches\u201d into consideration."}