{"version":"1.0","provider_name":"","provider_url":"https:\/\/claritytg.com","title":"Cyber Threats We Can't Ignore -","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"XhwsZY8Tqw\"><a href=\"https:\/\/claritytg.com\/index.php\/2020\/06\/27\/cyber-threats-we-cant-ignore\/\">Cyber Threats We Can&#8217;t Ignore<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/claritytg.com\/index.php\/2020\/06\/27\/cyber-threats-we-cant-ignore\/embed\/#?secret=XhwsZY8Tqw\" width=\"600\" height=\"338\" title=\"&#8220;Cyber Threats We Can&#8217;t Ignore&#8221; &#8212; \" data-secret=\"XhwsZY8Tqw\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/claritytg.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"The spectrum of cyber threats looms larger than ever as if your business didn\u2019t have enough to worry about right now. While it may seem like big names bear the brunt of digital disturbance, the reality is far frightening. More than 40% of cyber threats are directed at small businesses according to the information provided by Verizon.","thumbnail_url":"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/06\/32.png"}