{"version":"1.0","provider_name":"Hosteko Blog","provider_url":"https:\/\/hosteko.com\/blog","author_name":"Risa Y","author_url":"https:\/\/hosteko.com\/blog\/author\/risa","title":"Pengertian, Metode, dan Cara Menghindari Data Breach - Hosteko Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"3IyUhlyd2c\"><a href=\"https:\/\/hosteko.com\/blog\/pengertian-metode-dan-cara-menghindari-data-breach\">Pengertian, Metode, dan Cara Menghindari Data Breach<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/hosteko.com\/blog\/pengertian-metode-dan-cara-menghindari-data-breach\/embed#?secret=3IyUhlyd2c\" width=\"600\" height=\"338\" title=\"&#8220;Pengertian, Metode, dan Cara Menghindari Data Breach&#8221; &#8212; Hosteko Blog\" data-secret=\"3IyUhlyd2c\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/hosteko.com\/htk-blog\/wp-content\/uploads\/2023\/02\/Pengertian-Metode-dan-Cara-Menghindari-Data-Breach.png","thumbnail_width":2400,"thumbnail_height":1500,"description":"Data breach adalah salah satu bentuk kasus kejahatan siber di era digital seperti sekarang ini. Tidak berbeda jauh dengan kasus kejahatan di dunia nyata, tren kejahatan di dunia online juga sangat merugikan karena yang dibobol adalah sebuah sistem. Kasus data breach ini seringkali menyebabkan masalah jangka panjang yang merugikan pengguna hingga perusahaan besar sekali pun. [&hellip;]"}