{"version":"1.0","provider_name":"Cyber Connective Corporation","provider_url":"https:\/\/cyberconnective.ai\/staging","author_name":"admin","author_url":"https:\/\/cyberconnective.ai\/staging\/author\/admin\/","title":"Cybersecurity 101 &#8211; Cyber Connective Corporation","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"pQqUGZZMTx\"><a href=\"https:\/\/cyberconnective.ai\/staging\/cybersecurity-101\/\">Cybersecurity 101<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cyberconnective.ai\/staging\/cybersecurity-101\/embed\/#?secret=pQqUGZZMTx\" width=\"600\" height=\"338\" title=\"&#8220;Cybersecurity 101&#8221; &#8212; Cyber Connective Corporation\" data-secret=\"pQqUGZZMTx\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/cyberconnective.ai\/staging\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"http:\/\/cyberconnective.ai\/staging\/wp-content\/uploads\/2024\/11\/hacker-working-darkness-scaled.jpg","thumbnail_width":2560,"thumbnail_height":1440,"description":"Cybersecurity is an increasingly important concern for individuals and businesses of all sizes. As technology continues to advance and become more integrated into our daily lives, the risk of cyber attacks and data breaches grows. Fortunately, there are steps that individuals and businesses can take to protect themselves from these threats. One of the most [&hellip;]"}