{"version":"1.0","provider_name":"Computer.Com","provider_url":"https:\/\/computer.com","title":"Compliance - Computer.Com","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"BTzaYcMs8Y\"><a href=\"https:\/\/computer.com\/secure-infrastructure\/\">Compliance<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/computer.com\/secure-infrastructure\/embed\/#?secret=BTzaYcMs8Y\" width=\"600\" height=\"338\" title=\"&#8220;Compliance&#8221; &#8212; Computer.Com\" data-secret=\"BTzaYcMs8Y\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","description":"Secure Infrastructure and Compliance Using modern methods, we provide reliable, multi-level protection for any information. Our infrastructure meets global security requirements, and our certificates confirm this. Compliance with international safety standards PCI DSS The payment card industry data security standard. This protocol establishes requirements for organizations that store, process, and transfer data from Visa, Mastercard, &hellip;  Read More &raquo;","thumbnail_url":"https:\/\/computer.com\/wp-content\/uploads\/2023\/08\/Illustration-light-1.png"}