<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Advanced Technology</provider_name><provider_url>https://advancedtechnology.com.au</provider_url><author_name>Tenille Stulgies</author_name><author_url>https://advancedtechnology.com.au/author/tenille-stulgies/</author_url><title>Computer Security &amp; IT Defence &#x2013; Part 2 - Advanced Technology</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content"&gt;&lt;a href="https://advancedtechnology.com.au/computer-security/"&gt;Computer Security &amp; IT Defence &#x2013; Part 2&lt;/a&gt;&lt;/blockquote&gt;
&lt;script type='text/javascript'&gt;
&lt;!--//--&gt;&lt;![CDATA[//&gt;&lt;!--
		/*! This file is auto-generated */
		!function(d,l){"use strict";var e=!1,o=!1;if(l.querySelector)if(d.addEventListener)e=!0;if(d.wp=d.wp||{},!d.wp.receiveEmbedMessage)if(d.wp.receiveEmbedMessage=function(e){var t=e.data;if(t)if(t.secret||t.message||t.value)if(!/[^a-zA-Z0-9]/.test(t.secret)){var r,a,i,s,n,o=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),c=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]');for(r=0;r&lt;c.length;r++)c[r].style.display="none";for(r=0;r&lt;o.length;r++)if(a=o[r],e.source===a.contentWindow){if(a.removeAttribute("style"),"height"===t.message){if(1e3&lt;(i=parseInt(t.value,10)))i=1e3;else if(~~i&lt;200)i=200;a.height=i}if("link"===t.message)if(s=l.createElement("a"),n=l.createElement("a"),s.href=a.getAttribute("src"),n.href=t.value,n.host===s.host)if(l.activeElement===a)d.top.location.href=t.value}}},e)d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",t,!1),d.addEventListener("load",t,!1);function t(){if(!o){o=!0;var e,t,r,a,i=-1!==navigator.appVersion.indexOf("MSIE 10"),s=!!navigator.userAgent.match(/Trident.*rv:11\./),n=l.querySelectorAll("iframe.wp-embedded-content");for(t=0;t&lt;n.length;t++){if(!(r=n[t]).getAttribute("data-secret"))a=Math.random().toString(36).substr(2,10),r.src+="#?secret="+a,r.setAttribute("data-secret",a);if(i||s)(e=r.cloneNode(!0)).removeAttribute("security"),r.parentNode.replaceChild(e,r)}}}}(window,document);
//--&gt;&lt;!]]&gt;
&lt;/script&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://advancedtechnology.com.au/computer-security/embed/" width="600" height="338" title="&#x201C;Computer Security &amp; IT Defence &#x2013; Part 2&#x201D; &#x2014; Advanced Technology" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;</html><thumbnail_url>https://advancedtechnology.com.au/wp-content/uploads/2019/01/Computer-Security-IT-Defence-Part-2.jpg</thumbnail_url><thumbnail_width>1024</thumbnail_width><thumbnail_height>683</thumbnail_height><description>In October we spoke about the layers of physical security needed to defend your data and business integrity fully. Today we will look at to human aspects of network defences. Human error is responsible for around 95% of security incidences. Here are a few ways hackers can exploit human vulnerabilities: Guessing and solving passwords Tricking...</description></oembed>
