{"version":"1.0","provider_name":"TechSolutions, Inc.","provider_url":"https:\/\/www.techsolutionsinc.com","author_name":"TechSolutions","title":"Don\u2019t let hackers fool you with these tricks","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"VmJOSsLjfo\"><a href=\"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/\">Don\u2019t let hackers fool you with these tricks<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/embed\/#?secret=VmJOSsLjfo\" width=\"600\" height=\"338\" title=\"&#8220;Don\u2019t let hackers fool you with these tricks&#8221; &#8212; TechSolutions, Inc.\" data-secret=\"VmJOSsLjfo\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016August18_Security_C_PH.jpg","thumbnail_width":900,"thumbnail_height":300,"description":"The volume of malicious cyber attacks is increasing every year. Although many companies use the latest network security systems, they aren\u2019t immune to the hackers\u2019 favorite strategy \u2014 social engineering. Unlike malware, social engineering tricks people into volunteering sensitive data. Here\u2019s what you should know to protect your business. Phishing This is the most frequently [&hellip;]"}