{"version":"1.0","provider_name":"Geci","provider_url":"https:\/\/www.geci.net\/en\/","author_name":"julie@admin","author_url":"https:\/\/www.geci.net\/en\/author\/julie@admin\/","title":"Consulting & Cybersecurity - Geci","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"r9G4a67mRh\"><a href=\"https:\/\/www.geci.net\/en\/activites\/consulting-cybersecurity\/\">Consulting &#038; Cybersecurity<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.geci.net\/en\/activites\/consulting-cybersecurity\/embed\/#?secret=r9G4a67mRh\" width=\"600\" height=\"338\" title=\"&#8220;Consulting &#038; Cybersecurity&#8221; &#8212; Geci\" data-secret=\"r9G4a67mRh\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.geci.net\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.geci.net\/wp-content\/uploads\/2024\/03\/montagne02.png","thumbnail_width":2160,"thumbnail_height":600,"description":"[vc_row content_placement=&#8221;bottom&#8221; el_class=&#8221;btns-activites&#8221;][vc_column width=&#8221;8\/12&#8243;][vc_btn title=&#8221;Services&#8221; css=&#8221;&#8221; link=&#8221;url:%23as&#8221;][vc_btn title=&#8221;Anti-cybercrime solutions&#8221; css=&#8221;&#8221; link=&#8221;url:%23ia&#8221;][vc_btn title=&#8221;Employee development&#8221; css=&#8221;&#8221; link=&#8221;url:%23devcol&#8221;][\/vc_column][vc_column width=&#8221;4\/12&#8243;][vc_single_image image=&#8221;1247&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;] Optimizing your digital transition To remain competitive, it is essential for businesses to incorporate digital into their operations, no matter which field they operate in. New technologies offer opportunities to improve operational efficiency [&hellip;]"}