{"version":"1.0","provider_name":"Cyber Resilience Blog","provider_url":"https:\/\/www.backupassist.com\/blog","author_name":"Mike Thompson","author_url":"https:\/\/www.backupassist.com\/blog\/author\/mikethompson","title":"WiFi Hacking Part 2 \u2013 how do I secure my WiFi and protect my business? - Cyber Resilience Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"u5lTHsRjjW\"><a href=\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi\">WiFi Hacking Part 2 \u2013 how do I secure my WiFi and protect my business?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi\/embed#?secret=u5lTHsRjjW\" width=\"600\" height=\"338\" title=\"&#8220;WiFi Hacking Part 2 \u2013 how do I secure my WiFi and protect my business?&#8221; &#8212; Cyber Resilience Blog\" data-secret=\"u5lTHsRjjW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.backupassist.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/11\/wifi-hacking\u2013why-it-is-such-a-big-threat-hero-1.jpg","thumbnail_width":1500,"thumbnail_height":697,"description":"If you read our WiFi hacking introduction last month, you\u2019ll know that WiFi has vulnerabilities that can be easily exploited and that it is difficult to know if you\u2019re being attacked. So what can you do to protect yourself?"}