{"version":"1.0","provider_name":"SoftTweak Blog","provider_url":"https:\/\/www.softweak.com\/blog","author_name":"Rollins Duke","author_url":"https:\/\/www.softweak.com\/blog\/author\/rollinsduke\/","title":"Cyber Security - Overview and Ways to Fortify Cyber Attacks - SoftTweak Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ARBytDEdo4\"><a href=\"https:\/\/www.softweak.com\/blog\/cyber-security\/\">Cyber Security &#8211; Overview and Ways to Fortify Cyber Attacks<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.softweak.com\/blog\/cyber-security\/embed\/#?secret=ARBytDEdo4\" width=\"600\" height=\"338\" title=\"&#8220;Cyber Security &#8211; Overview and Ways to Fortify Cyber Attacks&#8221; &#8212; SoftTweak Blog\" data-secret=\"ARBytDEdo4\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.softweak.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.softweak.com\/blog\/wp-content\/uploads\/2020\/08\/cyber-security.jpg","thumbnail_width":600,"thumbnail_height":0,"description":"Due to an increase in the scale of Cyber Threats, it is essential for all users to defend various devices like computers, servers, electronic systems, networks, mobile devices, and other types of data from cyberattacks. To secure data from these..."}