{"version":"1.0","provider_name":"MozDomains Blog","provider_url":"https:\/\/www.mozdomains.co.mz\/blog\/en","author_name":"Momed Jussub","author_url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/author\/momed-jussub\/","title":"Best Ways to Protect Your Website - MozDomains Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"xK3SHhojMt\"><a href=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/best-ways-to-protect-your-website\/\">Best Ways to Protect Your Website<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/best-ways-to-protect-your-website\/embed\/#?secret=xK3SHhojMt\" width=\"600\" height=\"338\" title=\"&#8220;Best Ways to Protect Your Website&#8221; &#8212; MozDomains Blog\" data-secret=\"xK3SHhojMt\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/Hack-Password-Tactics-Featured-670x335.jpg","thumbnail_width":670,"thumbnail_height":335,"description":"A cyber attack refers to a deliberate exploitation of technology-dependent enterprises, computer systems, and networks. In simple terms, it is an attack launched from one computer or more computers against another computer, multiple computers or networks. Cyber attacks are known to use malicious code to modify computer code, logic or data, resulting in troublesome consequences that can actually compromise data and lead to cybercrimes like identity and information theft. Hackers are always on the lookout for new ways to grab your most sensitive data through cyber attacks. Hence, it is essential for you to study and implement different ways that\u2026"}