{"version":"1.0","provider_name":"Data Leaks, Breaches &amp; Hacks","provider_url":"https:\/\/www.dataleaklawyers.co.uk\/blog","author_name":"Author","author_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/maisie","title":"Introducing The Vicious Cycle Of Data Breach Fatigue","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"BJ4rLd6zle\"><a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/introducing-vicious-cycle-data-breach-fatigue\">Introducing the vicious cycle of data breach fatigue<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/introducing-vicious-cycle-data-breach-fatigue\/embed#?secret=BJ4rLd6zle\" width=\"600\" height=\"338\" title=\"&#8220;Introducing the vicious cycle of data breach fatigue&#8221; &#8212; Data Leaks, Breaches &amp; Hacks\" data-secret=\"BJ4rLd6zle\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/identity-theft-large-min.png","thumbnail_width":1200,"thumbnail_height":680,"description":"Are you sick and tired of hearing about data breaches? You could be suffering from 'data breach fatigue' and have become desensitised to companies and organisations lack of respect for cybersecurity and keeping your personal details safe."}