<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>TechTonic Times</provider_name><provider_url>https://www.abrahamsconsulting.com/blog</provider_url><title>Webroot Business Endpoint Protection - TechTonic Times</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="xdGQfXC5eC"&gt;&lt;a href="https://www.abrahamsconsulting.com/blog/webroot-business-endpoint-protection/"&gt;Webroot Business Endpoint Protection&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.abrahamsconsulting.com/blog/webroot-business-endpoint-protection/embed/#?secret=xdGQfXC5eC" width="600" height="338" title="&#x201C;Webroot Business Endpoint Protection&#x201D; &#x2014; TechTonic Times" data-secret="xdGQfXC5eC" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.abrahamsconsulting.com/blog/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.abrahamsconsulting.com/blog/wp-content/uploads/2023/04/in_Webroot_Business_EP_thumb.jpg</thumbnail_url><thumbnail_width>600</thumbnail_width><thumbnail_height>700</thumbnail_height><description>Cyberattacks on SMBs like yours are on the rise. With no end in sight. What can you do about it? Get Webroot Endpoint Protection. View this infographic to see why. Convinced? DM us to discuss putting Webroot Endpoint Protection to work in your SMB.</description></oembed>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/


Served from: www.abrahamsconsulting.com @ 2026-05-07 02:33:47 by W3 Total Cache
-->