{"version":"1.0","provider_name":"Azzad Asset Management","provider_url":"https:\/\/intelliserver.net\/wordpress","author_name":"Azzad Asset Management","author_url":"https:\/\/intelliserver.net\/wordpress\/author\/azzadprod\/","title":"Top five cybersecurity tips - Azzad Asset Management","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"3vjpMX997D\"><a href=\"https:\/\/intelliserver.net\/wordpress\/fraud-protection\/top-five-cybersecurity-tips\/\">Top five cybersecurity tips<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/intelliserver.net\/wordpress\/fraud-protection\/top-five-cybersecurity-tips\/embed\/#?secret=3vjpMX997D\" width=\"600\" height=\"338\" title=\"&#8220;Top five cybersecurity tips&#8221; &#8212; Azzad Asset Management\" data-secret=\"3vjpMX997D\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/intelliserver.net\/wordpress\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Last month, a widespread ransomware attack, known as WannaCry, rapidly affected numerous organizations across over one hundred countries. As cyber threats continue to evolve, we must work together to ensure these criminals can\u2019t access your personal data or accounts. Here are 5 protective measures you can take to avoid becoming a victim. 1. Keep your [&hellip;]"}