{"version":"1.0","provider_name":"HostPark","provider_url":"https:\/\/hostpark.ua\/en\/","author_name":"\u0412\u043e\u0432\u043a \u0410\u043d\u0434\u0440\u0456\u0439","author_url":"https:\/\/hostpark.ua\/en\/author\/wovkwork\/","title":"Comprehensive information security system \u2013 what is it?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"N4t5DD82lJ\"><a href=\"https:\/\/hostpark.ua\/en\/news-en\/comprehensive-information-security-system-what-is-it\/\">Comprehensive information security system \u2013 what is it?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/hostpark.ua\/en\/news-en\/comprehensive-information-security-system-what-is-it\/embed\/#?secret=N4t5DD82lJ\" width=\"600\" height=\"338\" title=\"&#8220;Comprehensive information security system \u2013 what is it?&#8221; &#8212; HostPark\" data-secret=\"N4t5DD82lJ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/hostpark.ua\/wp-content\/uploads\/2025\/08\/systema-zahystu-informacii.webp","thumbnail_width":1192,"thumbnail_height":597,"description":"Information protection for businesses using CISS \u2705Learn what an integrated information security system is, how it works, and what advantages it offers \u2705Your guide to the world of cybersecurity at hostpark.ua"}