{"version":"1.0","provider_name":"ESET Eesti Blogi","provider_url":"https:\/\/blog.eset.ee\/et\/en\/","title":"Cybersecurity: 5 basic lessons for everyone","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"7hjWRehmWv\"><a href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/\">Cybersecurity: 5 basic lessons for everyone<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/embed\/#?secret=7hjWRehmWv\" width=\"600\" height=\"338\" title=\"&#8220;Cybersecurity: 5 basic lessons for everyone&#8221; &#8212; ESET Eesti Blogi\" data-secret=\"7hjWRehmWv\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/blog.eset.ee\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_382323871-1-623x410.jpg","thumbnail_width":623,"thumbnail_height":410,"description":"Recently we\u2019ve had the opportunity &nbsp;\u2013 quite a fun and interesting opportunity \u2013 to visit a number of information security and cybersecurity conferences. These conferences were flooded with relatively \u2018new\u2019 developments such as NextGen, the Internet of Things (IoT), IoT DDoS attacks, security intelligence platform, etc. The fact that some of these terms have become"}