{"version":"1.0","provider_name":"DownloadHungry Blog","provider_url":"https:\/\/downloadhungry.com\/blog","author_name":"Enayet@Mahrus","author_url":"https:\/\/downloadhungry.com\/blog\/author\/enayetmahrus\/","title":"9 Ways to Keep IT Systems Secure - DownloadHungry Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ZG7082enQK\"><a href=\"https:\/\/downloadhungry.com\/blog\/9-ways-to-keep-it-systems-secure\/\">9 Ways to Keep IT Systems Secure<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/downloadhungry.com\/blog\/9-ways-to-keep-it-systems-secure\/embed\/#?secret=ZG7082enQK\" width=\"600\" height=\"338\" title=\"&#8220;9 Ways to Keep IT Systems Secure&#8221; &#8212; DownloadHungry Blog\" data-secret=\"ZG7082enQK\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/downloadhungry.com\/blog\/wp-content\/uploads\/2017\/05\/IT-Systems-Secure.jpg","thumbnail_width":605,"thumbnail_height":384,"description":"Image Credit: Pixabay Protect with passwords Most cyber-attacks are possible because the passwords used by organisations and individuals aren\u2019t as strong as they need to be. Every single piece of electronic equipment should be kept safe behind completely unique codes, and every password used to access them should be unique to each individual who has [&hellip;]"}