{"version":"1.0","provider_name":"","provider_url":"https:\/\/www.99techpost.com","author_name":"99 Tech Post","author_url":"https:\/\/www.99techpost.com\/author\/admin\/","title":"The Cybersecurity Risks of Weak Firewall Configurations \u2013 and How to Fix Them -","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"5R6bzALWbY\"><a href=\"https:\/\/www.99techpost.com\/the-cybersecurity-risks-of-weak-firewall-configurations-and-how-to-fix\/\">The Cybersecurity Risks of Weak Firewall Configurations \u2013 and How to Fix Them<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.99techpost.com\/the-cybersecurity-risks-of-weak-firewall-configurations-and-how-to-fix\/embed\/#?secret=5R6bzALWbY\" width=\"600\" height=\"338\" title=\"&#8220;The Cybersecurity Risks of Weak Firewall Configurations \u2013 and How to Fix Them&#8221; &#8212; \" data-secret=\"5R6bzALWbY\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.99techpost.com\/wp-content\/uploads\/2021\/06\/Cyber-security.jpg","thumbnail_width":800,"thumbnail_height":500,"description":"In cybersecurity, firewalls are often the first line of defense for businesses and individuals alike. These security systems are designed to filter incoming and outgoing network traffic, blocking unauthorized access ... Read More"}