<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Miller Thomson</provider_name><provider_url>https://www.millerthomson.com/en/</provider_url><author_name>Katherine Chan</author_name><author_url>https://www.millerthomson.com/en/author/chank/</author_url><title>Tactical and strategic steps for successful cyber incident preparedness | Miller Thomson</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="KStL0IxH15"&gt;&lt;a href="https://www.millerthomson.com/en/insights/cybersecurity/successful-cyber-incident-preparedness/"&gt;Tactical and strategic steps for successful cyber incident preparedness&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.millerthomson.com/en/insights/cybersecurity/successful-cyber-incident-preparedness/embed/#?secret=KStL0IxH15" width="600" height="338" title="&#x201C;Tactical and strategic steps for successful cyber incident preparedness&#x201D; &#x2014; Miller Thomson" data-secret="KStL0IxH15" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.millerthomson.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.millerthomson.com/wp-content/uploads/2024/10/Insights_Cybersecurity_Post-Image.jpg</thumbnail_url><thumbnail_width>1776</thumbnail_width><thumbnail_height>994</thumbnail_height><description>To kick-off this year&#x2019;s cyber awareness month, we wanted to present an article that would look back on the past year along with our experience counseling organizations, large and small across all sectors, through the ordeal of cyberattacks, data extortion scenarios and other data security incidents. The intention of this article is to set out [&hellip;]</description></oembed>
