<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>CICP-PCPOB</provider_name><provider_url>https://carleton.ca/cicp-pcpob</provider_url><author_name>cuthemeedtr5</author_name><author_url>https://carleton.ca/cicp-pcpob/author/cuthemeedtr5/</author_url><title>Ready or Not: Data suggests charities in Canada vulnerable to data security threats - CICP-PCPOB</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="yLtMRs7iWb"&gt;&lt;a href="https://carleton.ca/cicp-pcpob/2024/ready-or-not/"&gt;Ready or Not: Data suggests charities in Canada vulnerable to data security threats&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://carleton.ca/cicp-pcpob/2024/ready-or-not/embed/#?secret=yLtMRs7iWb" width="600" height="338" title="&#x201C;Ready or Not: Data suggests charities in Canada vulnerable to data security threats&#x201D; &#x2014; CICP-PCPOB" data-secret="yLtMRs7iWb" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://carleton.ca/cicp-pcpob/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://carleton.ca/cicp-pcpob/wp-content/uploads/sites/26/Blog-post-backgrounds-1-scaled.jpg</thumbnail_url><thumbnail_width>2560</thumbnail_width><thumbnail_height>1280</thumbnail_height><description>It&#x2019;s not uncommon these days to hear news of yet another private company, healthcare provider, government agency or individual experiencing some form of data security breach. These accounts often describe the shock, turmoil and deep sense of vulnerability that people at the receiving end of these incidents are dealing with, alongside the very real and [&hellip;]</description></oembed>
