{"version":"1.0","provider_name":"Blogs","provider_url":"https:\/\/www.tsfactory.com\/forums\/blogs","title":"Best Practices for Privileged User Monitoring - Blogs","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"bMqR3tPBaS\"><a href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/best-practices-for-privileged-user-monitoring\/\">Best Practices for Privileged User Monitoring<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.tsfactory.com\/forums\/blogs\/best-practices-for-privileged-user-monitoring\/embed\/#?secret=bMqR3tPBaS\" width=\"600\" height=\"338\" title=\"&#8220;Best Practices for Privileged User Monitoring&#8221; &#8212; Blogs\" data-secret=\"bMqR3tPBaS\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.tsfactory.com\/forums\/blogs\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2023\/09\/privilegedusermonitoring.jpg","thumbnail_width":1280,"thumbnail_height":853,"description":"Best Practices for Privileged User Monitoring Ensuring that everyone in your organization has the right amount of access to the database is paramount to success. But not everyone needs the same level of entitlement as an administrator account. To reduce the risk of data breaches, cyber attackers, and other security issues to protect these assets [&hellip;]"}