{"version":"1.0","provider_name":"Commvault - English - United States","provider_url":"https:\/\/www.commvault.com","author_name":"klisun","author_url":"https:\/\/www.commvault.com\/blogs\/author\/klisun","title":"eBook - Guide to Cyber Recovery Preparedness","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"1i2y04eJYA\"><a href=\"https:\/\/www.commvault.com\/resources\/ebook\/ebook-guide-to-cyber-recovery-preparedness\">eBook &#8211; Guide to Cyber Recovery Preparedness<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.commvault.com\/resources\/ebook\/ebook-guide-to-cyber-recovery-preparedness\/embed#?secret=1i2y04eJYA\" width=\"600\" height=\"338\" title=\"&#8220;eBook &#8211; Guide to Cyber Recovery Preparedness&#8221; &#8212; Commvault - English - United States\" data-secret=\"1i2y04eJYA\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Many organizations\u2019 security, IT, and operations teams have considered cyber recovery and disaster recovery to be the same. However, cyber recovery from recent incidents has revealed some unique curveballs compared to regular disaster recovery.","thumbnail_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","thumbnail_width":1200,"thumbnail_height":628}