{"version":"1.0","provider_name":"softwareglimpse.com","provider_url":"https:\/\/www.softwareglimpse.com\/es","author_name":"Lee M","author_url":"https:\/\/www.softwareglimpse.com\/es\/author\/wpx_admin\/","title":"Understanding CRM Security Compliance Standards - softwareglimpse.com","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"f6nN90o1dE\"><a href=\"https:\/\/www.softwareglimpse.com\/es\/understanding-crm-security-compliance-standards\/\">Comprender los est\u00e1ndares de cumplimiento de seguridad de CRM<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.softwareglimpse.com\/es\/understanding-crm-security-compliance-standards\/embed\/#?secret=f6nN90o1dE\" width=\"600\" height=\"338\" title=\"\u00abUnderstanding CRM Security Compliance Standards\u00bb \u2014 softwareglimpse.com\" data-secret=\"f6nN90o1dE\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.softwareglimpse.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>","thumbnail_url":"https:\/\/www.softwareglimpse.com\/wp-content\/uploads\/2023\/05\/CRM-security-compliance-1.png","thumbnail_width":512,"thumbnail_height":512,"description":"Looking for expert software reviews and guides? softwareglimpse.com has got you covered! Our latest Understanding CRM Security Compliance Standards offers comprehensive insights and step-by-step tutorials on the latest software tools and technologies. Whether you're a beginner or an advanced user, our blog provides valuable tips and tricks to help you streamline your workflow and achieve better results. Check out our Understanding CRM Security Compliance Standards now and take your skills to the next level!"}