{"version":"1.0","provider_name":"ValeurBit Infosec","provider_url":"https:\/\/valeurbit.com\/blog","author_name":"ValeurBit","author_url":"https:\/\/valeurbit.com\/blog\/author\/valeurbit\/","title":"Business At A Distance: How To Protect Infrastructure | ValeurBit Infosec","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"9FMRjuyx2c\"><a href=\"https:\/\/valeurbit.com\/blog\/business-at-a-distance-how-to-protect-infrastructure\/\">Business At A Distance: How To Protect Infrastructure<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/valeurbit.com\/blog\/business-at-a-distance-how-to-protect-infrastructure\/embed\/#?secret=9FMRjuyx2c\" width=\"600\" height=\"338\" title=\"&#8220;Business At A Distance: How To Protect Infrastructure&#8221; &#8212; ValeurBit Infosec\" data-secret=\"9FMRjuyx2c\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"In a period of general concern about the spread&nbsp;of the COVID-19 virus,&nbsp;many companies are moving employees to work remotely.&nbsp;Such measures are reasonable, because it helps to reduce the likelihood of infection of employees with coronavirus, but we must not forget about the risks to business associated with information security.&nbsp;We are talking about the appearance of..."}