<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Icon IT - independent, unbiased IT advice</provider_name><provider_url>https://iconit.co.nz</provider_url><title>Case Study: Overcoming phishing with 2FA or MFA &ndash; Icon IT - independent, unbiased IT advice</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content"&gt;&lt;a href="https://iconit.co.nz/index.php/2020/11/08/case-study-overcoming-phishing-with-2fa-or-mfa/"&gt;Case Study: Overcoming phishing with 2FA or MFA&lt;/a&gt;&lt;/blockquote&gt;
&lt;script type='text/javascript'&gt;
&lt;!--//--&gt;&lt;![CDATA[//&gt;&lt;!--
		/*! This file is auto-generated */
		!function(d,l){"use strict";var e=!1,o=!1;if(l.querySelector)if(d.addEventListener)e=!0;if(d.wp=d.wp||{},!d.wp.receiveEmbedMessage)if(d.wp.receiveEmbedMessage=function(e){var t=e.data;if(t)if(t.secret||t.message||t.value)if(!/[^a-zA-Z0-9]/.test(t.secret)){var r,a,i,s,n,o=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),c=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]');for(r=0;r&lt;c.length;r++)c[r].style.display="none";for(r=0;r&lt;o.length;r++)if(a=o[r],e.source===a.contentWindow){if(a.removeAttribute("style"),"height"===t.message){if(1e3&lt;(i=parseInt(t.value,10)))i=1e3;else if(~~i&lt;200)i=200;a.height=i}if("link"===t.message)if(s=l.createElement("a"),n=l.createElement("a"),s.href=a.getAttribute("src"),n.href=t.value,n.host===s.host)if(l.activeElement===a)d.top.location.href=t.value}}},e)d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",t,!1),d.addEventListener("load",t,!1);function t(){if(!o){o=!0;var e,t,r,a,i=-1!==navigator.appVersion.indexOf("MSIE 10"),s=!!navigator.userAgent.match(/Trident.*rv:11\./),n=l.querySelectorAll("iframe.wp-embedded-content");for(t=0;t&lt;n.length;t++){if(!(r=n[t]).getAttribute("data-secret"))a=Math.random().toString(36).substr(2,10),r.src+="#?secret="+a,r.setAttribute("data-secret",a);if(i||s)(e=r.cloneNode(!0)).removeAttribute("security"),r.parentNode.replaceChild(e,r)}}}}(window,document);
//--&gt;&lt;!]]&gt;
&lt;/script&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://iconit.co.nz/index.php/2020/11/08/case-study-overcoming-phishing-with-2fa-or-mfa/embed/" width="600" height="338" title="&#x201C;Case Study: Overcoming phishing with 2FA or MFA&#x201D; &#x2014; Icon IT - independent, unbiased IT advice" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;</html><thumbnail_url>https://iconit.co.nz/wp-content/uploads/2020/11/pexels-cottonbro-5483071-scaled.jpg</thumbnail_url><thumbnail_width>2560</thumbnail_width><thumbnail_height>1707</thumbnail_height><description>One of Icon IT&#x2019;s clients was having an issue with phishing emails. Some of these suspicious emails were getting through their email systems without being blocked, and multiple times in one year, staff members would click on a link in an email when they shouldn&#x2019;t have, and then supplied their login name and password to...</description></oembed>
