{"version":"1.0","provider_name":"Kennedia IT Solutions","provider_url":"https:\/\/kennedia.net\/staging1","author_name":"admin","author_url":"https:\/\/kennedia.net\/staging1\/author\/administrator\/","title":"- Kennedia IT Solutions","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"kxrzKbrxx9\"><a href=\"https:\/\/kennedia.net\/staging1\/portfolio\/537-2\/\"><\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/kennedia.net\/staging1\/portfolio\/537-2\/embed\/#?secret=kxrzKbrxx9\" width=\"600\" height=\"338\" title=\"&#8220;&#8221; &#8212; Kennedia IT Solutions\" data-secret=\"kxrzKbrxx9\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/kennedia.net\/staging1\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/kennedia.net\/staging1\/wp-content\/uploads\/2015\/06\/securitymanagement.png","thumbnail_width":400,"thumbnail_height":286,"description":"This site is designed to provide Security management services and gudance to professionals identify organization&#8217;s assets (including information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.An organisation uses such security management procedures as information classification,and rate system vulnerabilities so that they can implement effective controls. Technology Used: [&hellip;]"}