{"version":"1.0","provider_name":"cxgenies malaysia","provider_url":"https:\/\/cxgenies.com\/my","title":"cxgenies | Security and Compliance","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"0zRR3YJer0\"><a href=\"https:\/\/cxgenies.com\/my\/security-and-compliance\/\">Security and Compliance<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cxgenies.com\/my\/security-and-compliance\/embed\/#?secret=0zRR3YJer0\" width=\"600\" height=\"338\" title=\"&#8220;Security and Compliance&#8221; &#8212; cxgenies malaysia\" data-secret=\"0zRR3YJer0\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","description":"Uncompromised Security &amp; Rigorous Compliance Multi-Factor Authentication (MFA) Adds an extra layer of security by requiring users to verify their identity through multiple steps. By combining something the user knows (password) with something they have (e.g., a smartphone or hardware token), MFA ensures only authorized personnel can access sensitive information. Role-Based Authentication Control access to [&hellip;]","thumbnail_url":"https:\/\/cxgenies.com\/en\/wp-content\/uploads\/sites\/2\/2024\/05\/SOC-2.png"}