{"version":"1.0","provider_name":"N-able","provider_url":"https:\/\/www.n-able.com\/es","title":"Threat Monitoring: Proactive Security Against Cyberthreats - N-able","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"jS4c79pX2Z\"><a href=\"https:\/\/www.n-able.com\/es\/blog\/threat-monitoring-proactive-security-against-cyberthreats\">Threat Monitoring: Proactive Security Against Cyberthreats<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.n-able.com\/es\/blog\/threat-monitoring-proactive-security-against-cyberthreats\/embed#?secret=jS4c79pX2Z\" width=\"600\" height=\"338\" title=\"\u00abThreat Monitoring: Proactive Security Against Cyberthreats\u00bb \u2014 N-able\" data-secret=\"jS4c79pX2Z\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.n-able.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Taking a reactive security stance is no longer enough in the current business climate. MSPs need to be guiding their customers to be more proactive. Mia Thompson looks at some of the options.","thumbnail_url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","thumbnail_width":1200,"thumbnail_height":630}