{"version":"1.0","provider_name":"TechSolutions, Inc.","provider_url":"https:\/\/www.techsolutionsinc.com","author_name":"TechSolutions","title":"Consider the security risks of your software","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"0zh3fxheKN\"><a href=\"https:\/\/www.techsolutionsinc.com\/blog\/consider-the-security-risks-of-your-software\/\">Consider the security risks of your software<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.techsolutionsinc.com\/blog\/consider-the-security-risks-of-your-software\/embed\/#?secret=0zh3fxheKN\" width=\"600\" height=\"338\" title=\"&#8220;Consider the security risks of your software&#8221; &#8212; TechSolutions, Inc.\" data-secret=\"0zh3fxheKN\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/900px-img-iStock-503784056_A_PH.jpg","thumbnail_width":900,"thumbnail_height":300,"description":"Cybersecurity is an issue that hounds businesses of all types. Sometimes organizations invest in security software without realizing the risks that come with it. Here\u2019s why identifying threats before buying cybersecurity products is paramount. Uncover threats and vulnerabilities Every business should evaluate the current state of its cybersecurity by running a risk assessment. Doing so [&hellip;]"}