<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Recon Technology</provider_name><provider_url>https://recontech.com.au</provider_url><author_name>Jonathan</author_name><author_url>https://recontech.com.au/author/Jonathan/</author_url><title>Working From Home - The Cyber Security Perspective - Part 1 - Recon Technology</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content"&gt;&lt;a href="https://recontech.com.au/working-from-home-the-cyber-security-perspective-part-1/"&gt;Working From Home &#x2013; The Cyber Security Perspective &#x2013; Part 1&lt;/a&gt;&lt;/blockquote&gt;
&lt;script type='text/javascript'&gt;
&lt;!--//--&gt;&lt;![CDATA[//&gt;&lt;!--
		/*! This file is auto-generated */
		!function(c,d){"use strict";var e=!1,n=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},!c.wp.receiveEmbedMessage)if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(t)if(t.secret||t.message||t.value)if(!/[^a-zA-Z0-9]/.test(t.secret)){for(var r,a,i,s=d.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),n=d.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),o=0;o&lt;n.length;o++)n[o].style.display="none";for(o=0;o&lt;s.length;o++)if(r=s[o],e.source===r.contentWindow){if(r.removeAttribute("style"),"height"===t.message){if(1e3&lt;(i=parseInt(t.value,10)))i=1e3;else if(~~i&lt;200)i=200;r.height=i}if("link"===t.message)if(a=d.createElement("a"),i=d.createElement("a"),a.href=r.getAttribute("src"),i.href=t.value,i.host===a.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener("message",c.wp.receiveEmbedMessage,!1),d.addEventListener("DOMContentLoaded",t,!1),c.addEventListener("load",t,!1);function t(){if(!n){n=!0;for(var e,t,r=-1!==navigator.appVersion.indexOf("MSIE 10"),a=!!navigator.userAgent.match(/Trident.*rv:11\./),i=d.querySelectorAll("iframe.wp-embedded-content"),s=0;s&lt;i.length;s++){if(!(e=i[s]).getAttribute("data-secret"))t=Math.random().toString(36).substr(2,10),e.src+="#?secret="+t,e.setAttribute("data-secret",t);if(r||a)(t=e.cloneNode(!0)).removeAttribute("security"),e.parentNode.replaceChild(t,e)}}}}(window,document);
//--&gt;&lt;!]]&gt;
&lt;/script&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://recontech.com.au/working-from-home-the-cyber-security-perspective-part-1/embed/" width="600" height="338" title="&#x201C;Working From Home &#x2013; The Cyber Security Perspective &#x2013; Part 1&#x201D; &#x2014; Recon Technology" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;</html><thumbnail_url>https://recontech.com.au/wp-content/uploads/2020/08/work-5071617_1920.jpg</thumbnail_url><thumbnail_width>766</thumbnail_width><thumbnail_height>504</thumbnail_height><description>Woohoo!!! COVID has granted many of us the opportunity to not go into the office and now we can do our work in our latest stylish pyjamas and only ever consider looking reasonable when there is a web conference. What are the cyber security implications of &#x201C;working from home&#x201D;? Many businesses are now dealing with [&hellip;]</description></oembed>
