<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Why Security</provider_name><provider_url>https://www.whysecurity.it/en/</provider_url><author_name>whysecWP</author_name><author_url>https://www.whysecurity.it/en/author/whysecwp/</author_url><title>Strategic Advisory/Consulting - Why Security</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="yCHE51pZtq"&gt;&lt;a href="https://www.whysecurity.it/en/strategic-advisory-consulting/"&gt;Strategic Advisory/Consulting&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.whysecurity.it/en/strategic-advisory-consulting/embed/#?secret=yCHE51pZtq" width="600" height="338" title="&#x201C;Strategic Advisory/Consulting&#x201D; &#x2014; Why Security" data-secret="yCHE51pZtq" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.whysecurity.it/wp-content/uploads/2021/09/iStock-1166272744-e1630580359932-1.jpg</thumbnail_url><thumbnail_width>1264</thumbnail_width><thumbnail_height>368</thumbnail_height><description>[vc_row full_width=&#x201D;stretch_row&#x201D; css_animation=&#x201D;bounceInDown&#x201D; gradient_colors=&#x201D;%5B%7B%7D%5D&#x201D; css=&#x201D;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#x201D;][vc_column][vc_custom_heading text=&#x201D;Strategic consulting for IT management&#x201D; font_container=&#x201D;tag:h2|font_size:44px|text_align:center|color:%23000000&#x2033; google_fonts=&#x201D;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#x201D;][common_title title=&#x201D;&#x201D; show_decor=&#x201D;true&#x201D;][vc_column_text css_animation=&#x201D;fadeInRight&#x201D;]Business data and information are not all the same. There is information that IS AND MUST REMAIN STRICTLY CONFIDENTIAL, without the possibility of any access even to system administrators. Although the legislation clearly speaks of how system [&hellip;]</description></oembed>
