{"version":"1.0","provider_name":"KDAN Blog","provider_url":"https:\/\/www.kdan.com\/blog","author_name":"KDAN","author_url":"https:\/\/www.kdan.com\/blog\/author\/kdanmobile","title":"Information Security Governance: Key Steps for Protecting Your Business","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"itjslohTaL\"><a href=\"https:\/\/www.kdan.com\/blog\/information-security-governance\">Information Security Governance: Key Steps for Protecting Your Business<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.kdan.com\/blog\/information-security-governance\/embed#?secret=itjslohTaL\" width=\"600\" height=\"338\" title=\"&#8220;Information Security Governance: Key Steps for Protecting Your Business&#8221; &#8212; KDAN Blog\" data-secret=\"itjslohTaL\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.kdan.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.kdan.com\/blog\/wp-content\/uploads\/2025\/01\/flyd-mT7lXZPjk7U-unsplash-1024x683.jpg","thumbnail_width":1024,"thumbnail_height":683,"description":"Information security governance is the framework organizations use to manage and protect their information assets. It involves creating policies, procedures, and strategies to safeguard the confidentiality, integrity, and availability of data. Read more to learn about how KDAN protects your information."}