{"version":"1.0","provider_name":"Kevin Edwards","provider_url":"https:\/\/edwardsnet.org","title":"Ransomware Business Cyber-Attack - Kevin Edwards","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"cva8BpdXoJ\"><a href=\"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/\">Ransomware Business Cyber-Attack<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/embed\/#?secret=cva8BpdXoJ\" width=\"600\" height=\"338\" title=\"&#8220;Ransomware Business Cyber-Attack&#8221; &#8212; Kevin Edwards\" data-secret=\"cva8BpdXoJ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/edwardsnet.org\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"These kinds of cyber attack are very simple to avoid in business and yet the basics of information security management have been ignored. To get the ball rolling just ask yourself these 2 simple questions: Why is our business critical\/sensitive information connected to the internet and is it really necessary? Why are the same computers [&hellip;]","thumbnail_url":"https:\/\/ichef.bbci.co.uk\/live-experience\/cps\/800\/cpsprodpb\/vivo\/live\/images\/2017\/5\/15\/1051b708-6fd1-413b-ac5c-901428c2494d.jpg"}