{"version":"1.0","provider_name":"TechTonic Times","provider_url":"https:\/\/www.abrahamsconsulting.com\/blog","title":"The\u00a02022 Thales Data Threat Report - Global Edition - TechTonic Times","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"b2z8pvNzyy\"><a href=\"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/\">The\u00a02022 Thales Data Threat Report &#8211; Global Edition<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.abrahamsconsulting.com\/blog\/the-2022-thales-data-threat-report-global-edition\/embed\/#?secret=b2z8pvNzyy\" width=\"600\" height=\"338\" title=\"&#8220;The\u00a02022 Thales Data Threat Report &#8211; Global Edition&#8221; &#8212; TechTonic Times\" data-secret=\"b2z8pvNzyy\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.abrahamsconsulting.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/04\/maxresdefault-768x432.jpg","thumbnail_width":600,"thumbnail_height":338,"description":"Chances are that over the last couple of years, the pandemic, accelerating cloud adoption, ever-increasing ransomware attacks and other cyberthreats have forced your organization to re-evaluate your IT infrastructure and cybersecurity posture. Watch this brief @Thales video for an overview of what nearly 2,800 of your industry-peers around the world had to say about the negative impact of data sprawl, security breaches, increasingly complex security threats and remote working on their organization's data security.  We'd love to hear from you, so drop us a comment and let us know your biggest operational or security challenge."}