{"version":"1.0","provider_name":"TechTonic Times","provider_url":"https:\/\/www.abrahamsconsulting.com\/blog","title":"Ransomware Protection & Recovery Offerings - TechTonic Times","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"5xg4SVC3Nj\"><a href=\"https:\/\/www.abrahamsconsulting.com\/blog\/ransomware-protection-recovery-offerings\/\">Ransomware Protection &#038; Recovery Offerings<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.abrahamsconsulting.com\/blog\/ransomware-protection-recovery-offerings\/embed\/#?secret=5xg4SVC3Nj\" width=\"600\" height=\"338\" title=\"&#8220;Ransomware Protection &#038; Recovery Offerings&#8221; &#8212; TechTonic Times\" data-secret=\"5xg4SVC3Nj\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.abrahamsconsulting.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/10\/commvault_ransomware_solution_offerings_thumb.jpg","thumbnail_width":595,"thumbnail_height":842,"description":"Put the malware merchants down for the count with Commvault ransomware and recovery tools. \ud83e\udd4a Commvault's multi-level protection and monitoring capabilities give you direct control of your data management against all malware, including ransomware. DM us when you are ready to take back your data security environment from cybercriminals."}