<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>TechTonic Times</provider_name><provider_url>https://www.abrahamsconsulting.com/blog</provider_url><title>Brother Security Brochure - TechTonic Times</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="WNuhqjpGBc"&gt;&lt;a href="https://www.abrahamsconsulting.com/blog/brother-security-brochure/"&gt;Brother Security Brochure&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.abrahamsconsulting.com/blog/brother-security-brochure/embed/#?secret=WNuhqjpGBc" width="600" height="338" title="&#x201C;Brother Security Brochure&#x201D; &#x2014; TechTonic Times" data-secret="WNuhqjpGBc" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.abrahamsconsulting.com/blog/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.abrahamsconsulting.com/blog/wp-content/uploads/2025/09/brochure_Brother_Security_1_thumb.jpg</thumbnail_url><thumbnail_width>600</thumbnail_width><thumbnail_height>700</thumbnail_height><description>Device-level security is a foundational layer in any modern cybersecurity plan. Brother delivers robust protection built directly into its printers. These defenses help safeguard sensitive data, limit threats from internal misuse, and support regulatory compliance. Download the brochure for an in-depth look at Brother's security framework. @Brother for Business</description></oembed>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/


Served from: www.abrahamsconsulting.com @ 2026-04-26 11:19:54 by W3 Total Cache
-->