{"version":"1.0","provider_name":"TechSolutions, Inc.","provider_url":"https:\/\/www.techsolutionsinc.com","author_name":"TechSolutions","title":"Fighting ransomware with virtualization","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ntXvCEryUZ\"><a href=\"https:\/\/www.techsolutionsinc.com\/blog\/fighting-ransomware-with-virtualization\/\">Fighting ransomware with virtualization<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.techsolutionsinc.com\/blog\/fighting-ransomware-with-virtualization\/embed\/#?secret=ntXvCEryUZ\" width=\"600\" height=\"338\" title=\"&#8220;Fighting ransomware with virtualization&#8221; &#8212; TechSolutions, Inc.\" data-secret=\"ntXvCEryUZ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018February2Business_A_PH.jpg","thumbnail_width":900,"thumbnail_height":300,"description":"Ransomware takes your data hostage and demands a payment for its recovery. While it may seem like there\u2019s no other choice but to pay the ransom, you should never give in to the hacker\u2019s demands. Before the next wave of ransomware comes around, it\u2019s important to protect your business with virtual disaster recovery solutions. Virtual [&hellip;]"}