{"version":"1.0","provider_name":"Learning Hub","provider_url":"https:\/\/clouddirect.net\/learning-hub","author_name":"Learning Hub","author_url":"https:\/\/clouddirect.net\/learning-hub","title":"Preparing your security for Hybrid Working","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ClATVwJaSj\"><a href=\"https:\/\/clouddirect.net\/learning-hub\/preparing-your-security-for-hybrid-working\/\">Preparing your security for Hybrid Working<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/clouddirect.net\/learning-hub\/preparing-your-security-for-hybrid-working\/embed\/#?secret=ClATVwJaSj\" width=\"600\" height=\"338\" title=\"&#8220;Preparing your security for Hybrid Working&#8221; &#8212; Learning Hub\" data-secret=\"ClATVwJaSj\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/clouddirect.net\/learning-hub\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/pexels-pixabay-60504.jpg","thumbnail_width":1144,"thumbnail_height":763,"description":"The past 2 years has fundamentally changed the way we work, and in many ways for the better. However, this change has also significantly impacted the business security landscape and left many vulnerable to a variety of cyber security threats. A Cyber Security Breaches research report released by the UK government found that the average [&hellip;]"}