{"version":"1.0","provider_name":"ILR","provider_url":"https:\/\/www.ilr.lu\/en\/","title":"Best practices","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"neCdz6FgFo\"><a href=\"https:\/\/www.ilr.lu\/en\/sectors\/niss\/securing-your-organization\/best-practices\/\">Best practices<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ilr.lu\/en\/sectors\/niss\/securing-your-organization\/best-practices\/embed\/#?secret=neCdz6FgFo\" width=\"600\" height=\"338\" title=\"&#8220;Best practices&#8221; &#8212; ILR\" data-secret=\"neCdz6FgFo\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.ilr.lu\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Securing your organization Best practices Imprimer Partager Partager cette page sur Facebook Partager cette page sur X(twitter) Partager cette page sur linkedin Partager cette page par mail Menu Aper\u00e7u du secteur NIS 2 Vue d&#039;ensemble P\u00e9rim\u00e8tre et champ d\u2019application Les mesures de s\u00e9curit\u00e9 sous NIS2 Le processus de notification d&#8217;incident sous NIS2 Sessions d\u2019informations Questions [&hellip;]","thumbnail_url":"https:\/\/www.ilr.lu\/wp-content\/uploads\/20945584-scaled.jpg"}