{"version":"1.0","provider_name":"Activo","provider_url":"https:\/\/www.activo.ca","author_name":"Activo Team","author_url":"https:\/\/www.activo.ca\/blog\/author\/activo_admin\/","title":"3 Ways to Maximize the Security of Your Security Systems | Activo","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"DJIe992vD5\"><a href=\"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/\">3 Ways to Maximize the Security of Your Security Systems<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.activo.ca\/blog\/3-ways-to-maximize-the-security-of-your-security-systems\/embed\/#?secret=DJIe992vD5\" width=\"600\" height=\"338\" title=\"&#8220;3 Ways to Maximize the Security of Your Security Systems&#8221; &#8212; Activo\" data-secret=\"DJIe992vD5\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.activo.ca\/wp-content\/uploads\/2016\/10\/lock.png","thumbnail_width":720,"thumbnail_height":720,"description":"You have security cameras and a Video Management System (VMS) set up. Your doors are controlled, requiring validated credentials from anyone who wants to gain access. But what about the system itself? Is it secure? Whether it\u2019s a stranger hacking into a video monitor or accessing confidential emails, security is a major concern for companies [&hellip;]"}