{"version":"1.0","provider_name":"JBlog.","provider_url":"https:\/\/jedok.com\/blog","author_name":"Evane Williams","author_url":"https:\/\/jedok.com\/blog\/author\/jedok\/","title":"How To Protect Yourself From Cyber Attacks","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"CCilrwj1zx\"><a href=\"https:\/\/jedok.com\/blog\/how-to-protect-yourself-from-cyber-attacks\/2022\/\">How To Protect Yourself From Cyber Attacks<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/jedok.com\/blog\/how-to-protect-yourself-from-cyber-attacks\/2022\/embed\/#?secret=CCilrwj1zx\" width=\"600\" height=\"338\" title=\"&#8220;How To Protect Yourself From Cyber Attacks&#8221; &#8212; JBlog.\" data-secret=\"CCilrwj1zx\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/jedok.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/jedok.com\/blog\/wp-content\/uploads\/2022\/07\/how-to-protect-yourself-from-cyber-attacks.jpg","thumbnail_width":1200,"thumbnail_height":675,"description":"The cyber-world is constantly changing, and so are the methods used to attack. One of the most common methods attackers use is ransomware, which locks your computer and demands money in order to release it. Here's how you can protect yourself from ransomware:"}