{"version":"1.0","provider_name":"Nextlink \u535a\u5f18\u96f2\u7aef\u79d1\u6280","provider_url":"https:\/\/www.nextlink.cloud\/en\/","title":"Cloud Data Security - Nextlink \u535a\u5f18\u96f2\u7aef\u79d1\u6280","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"pvQi6WfY9D\"><a href=\"https:\/\/www.nextlink.cloud\/en\/aws-service\/aws_security\/\">Cloud Data Security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.nextlink.cloud\/en\/aws-service\/aws_security\/embed\/#?secret=pvQi6WfY9D\" width=\"600\" height=\"338\" title=\"&#8220;Cloud Data Security&#8221; &#8212; Nextlink \u535a\u5f18\u96f2\u7aef\u79d1\u6280\" data-secret=\"pvQi6WfY9D\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2020\/11\/digital-cloud-security-1920pex-1.jpg","thumbnail_width":1920,"thumbnail_height":1080,"description":"According to a report by Gartner, \"95% of cloud security issues stem from configuration errors due to human error\". Data security and regulatory compliance must be jointly maintained by the user and a cloud agent certified in data security. Nextlink is deeply knowledgeable about cloud infrastructure security and secure AWS architecture, and can call upon an elite MSP hosting team to safeguard your cloud environment so you can focus on your enterprise operations without worry."}