{"version":"1.0","provider_name":"Information Security Blog - 7Security","provider_url":"https:\/\/www.7sec.com\/blog","author_name":"madmin","author_url":"https:\/\/www.7sec.com\/blog\/author\/madmin\/","title":"Team Development, Internal Audit & Control 101 - Information Security Blog - 7Security","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"WpJzz8zEnX\"><a href=\"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/\">Team Development, Internal Audit &#038; Control 101<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/embed\/#?secret=WpJzz8zEnX\" width=\"600\" height=\"338\" title=\"&#8220;Team Development, Internal Audit &#038; Control 101&#8221; &#8212; Information Security Blog - 7Security\" data-secret=\"WpJzz8zEnX\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.7sec.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"The development of a company\u2019s employees is of major importance. Ultimately, progress and growth are what everyone\u2019s after, but in order for that to happen, processes, workflow, and ethnicity must be all under control. In order to create a secure operations environment, an organization needs to build its structure and staff it in line with &hellip; Continue reading \"\"","thumbnail_url":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2018\/04\/team.png"}