{"version":"1.0","provider_name":"IEG Connection","provider_url":"https:\/\/ieg.com.br\/blog","title":"IEG Connection | A Import\u00e2ncia da Seguran\u00e7a da Informa\u00e7\u00e3o no CSC","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"3tMHe2WuWa\"><a href=\"https:\/\/ieg.com.br\/blog\/a-importancia-da-seguranca-da-informacao-no-csc\/\">A Import\u00e2ncia da Seguran\u00e7a da Informa\u00e7\u00e3o no CSC<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/ieg.com.br\/blog\/a-importancia-da-seguranca-da-informacao-no-csc\/embed\/#?secret=3tMHe2WuWa\" width=\"600\" height=\"338\" title=\"&#8220;A Import\u00e2ncia da Seguran\u00e7a da Informa\u00e7\u00e3o no CSC&#8221; &#8212; IEG Connection\" data-secret=\"3tMHe2WuWa\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/ieg.com.br\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/ieg.com.br\/blog\/wp-content\/uploads\/2021\/10\/seguranca-da-informacao-csc-Capa-Blog.png","thumbnail_width":1362,"thumbnail_height":780,"description":"Os Centros de Servi\u00e7os Compartilhados (CSCs) tornaram-se uma ferramenta abrangente e flex\u00edvel para as empresas, sendo a principal plataforma de uso para organiza\u00e7\u00f5es que possuem um grande n\u00famero de funcion\u00e1rios. Os CSCs lidam com informa\u00e7\u00f5es diversas e, muitas vezes, dados sens\u00edveis. De acordo com pesquisa da Deloitte, 88% das organiza\u00e7\u00f5es possuem fun\u00e7\u00f5es de Finan\u00e7as dentro [&hellip;]"}