{"version":"1.0","provider_name":"Information Security Blog - 7Security","provider_url":"https:\/\/www.7sec.com\/blog","author_name":"madmin","author_url":"https:\/\/www.7sec.com\/blog\/author\/madmin\/","title":"What is an Independent Audit Good For? - Information Security Blog - 7Security","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"stPWilaAXl\"><a href=\"https:\/\/www.7sec.com\/blog\/what-is-an-independent-audit-good-for\/\">What is an Independent Audit Good For?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.7sec.com\/blog\/what-is-an-independent-audit-good-for\/embed\/#?secret=stPWilaAXl\" width=\"600\" height=\"338\" title=\"&#8220;What is an Independent Audit Good For?&#8221; &#8212; Information Security Blog - 7Security\" data-secret=\"stPWilaAXl\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.7sec.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"The audit of Information Security is a comprehensive assessment, which is allowed, in order to assess the current condition of Information Security in the business and to plan timely actions in order to increase the level of security. The audit of Information Security is conducted when a current necessity of independent assessment of the condition &hellip; Continue reading \"\"","thumbnail_url":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2021\/04\/audit2-300x209-1-300x209.png"}