{"id":4639,"date":"2021-01-15T09:06:27","date_gmt":"2021-01-15T17:06:27","guid":{"rendered":"https:\/\/cyberlock.com\/?page_id=4639"},"modified":"2024-06-03T16:23:18","modified_gmt":"2024-06-03T23:23:18","slug":"critical","status":"publish","type":"page","link":"https:\/\/cyberlock.com\/es\/critical\/","title":{"rendered":"Protecting Critical Infrastructure"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-enews-signup\">eNews Signup<\/h2>\n\n\n\n<p>Interested in receiving a special eNewsletter with more ideas on protecting critical infrastructure? Sign up <a href=\"https:\/\/cyberlock.com\/critical\/critical-enews-signup\/\">here<\/a>!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-white-papers\">White Papers<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<a href=\"\/wp-content\/uploads\/2021\/01\/Securing-Water-Utilities.pdf\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/01\/Securing-Water-Utilities-pdf-116x150.jpg\"><\/a>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<a href=\"\/wp-content\/uploads\/2021\/01\/Securing-Telecom-Infrastructure.pdf\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/01\/Securing-Telecom-Infrastructure-pdf-116x150.jpg\"><\/a>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<a href=\"\/wp-content\/uploads\/2021\/01\/Securing-Power-Facilities.pdf\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/01\/Securing-Power-Facilities-pdf-117x150.jpg\"><\/a>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<a href=\"\/wp-content\/uploads\/2021\/02\/Securing-Transportation-Infrastructure.pdf\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/02\/Securing-Transportation-Infrastructure-pdf-117x150.jpg\"><\/a>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<a href=\"\/wp-content\/uploads\/2021\/02\/Securing-Aviation-Facilities.pdf\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/02\/Securing-Aviation-Facilities-pdf-116x150.jpg\"><\/a>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<a href=\"\/wp-content\/uploads\/2021\/08\/Managing-Dynamic-Access.pdf\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/08\/Managing-Dynamic-Access-pdf-116x150.jpg\"><\/a>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-videos\">Videos<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"critical-vid\">\n\n<a id=\"69d99b3169b4a\" rel=\"wp-video-lightbox\" href=\"https:\/\/www.youtube.com\/watch?v=Cb8ERR4K1Jk&#038;rel=0&#038;width=640&#038;height=480\" title=\"\"><div class=\"wpvl_auto_thumb_box_wrapper\"><div class=\"wpvl_auto_thumb_box\"><img decoding=\"async\" src=\"https:\/\/img.youtube.com\/vi\/Cb8ERR4K1Jk\/0.jpg\" class=\"video_lightbox_auto_anchor_image\" alt=\"\" \/><div class=\"wpvl_auto_thumb_play\"><img decoding=\"async\" src=\"https:\/\/cyberlock.com\/wp-content\/plugins\/wp-video-lightbox\/images\/play.png\" class=\"wpvl_playbutton\" \/><\/div><\/div><\/div><\/a>    <script>\r\n    \/* <![CDATA[ *\/\r\n    jQuery(document).ready(function($){\r\n        $(function(){\r\n            var width = $(window).innerWidth();\r\n            var setwidth = parseFloat(640);\r\n            var ratio = parseFloat(0.75);\r\n            var height = parseFloat(480);\r\n            var link = 'https:\/\/www.youtube.com\/watch?v=Cb8ERR4K1Jk&amp;rel=0&amp;width=640&amp;height=480';\r\n            if(width < setwidth)\r\n            {\r\n                height = Math.floor(width * 0.75);\r\n                \/\/console.log(\"device width \"+width+\", set width \"+640+\", ratio \"+0.75+\", new height \"+ height);\r\n                var new_url = wpvl_paramReplace('width', link, width);\r\n                var new_url = wpvl_paramReplace('height', new_url, height);\r\n                $(\"a#69d99b3169b4a\").attr('href', new_url);\r\n                \/\/console.log(new_url);\r\n            }\r\n        });\r\n    });\r\n    \/* ]]> *\/\r\n    <\/script>\n\nCyberLock &#8211; Securing Critical Infrastructure\n<\/div>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"critical-vid\">\n\n<a id=\"69d99b3169b8c\" rel=\"wp-video-lightbox\" href=\"https:\/\/www.youtube.com\/watch?v=gkY6MjPSUZo&#038;rel=0&#038;width=640&#038;height=480\" title=\"\"><div class=\"wpvl_auto_thumb_box_wrapper\"><div class=\"wpvl_auto_thumb_box\"><img decoding=\"async\" src=\"https:\/\/img.youtube.com\/vi\/gkY6MjPSUZo\/0.jpg\" class=\"video_lightbox_auto_anchor_image\" alt=\"\" \/><div class=\"wpvl_auto_thumb_play\"><img decoding=\"async\" src=\"https:\/\/cyberlock.com\/wp-content\/plugins\/wp-video-lightbox\/images\/play.png\" class=\"wpvl_playbutton\" \/><\/div><\/div><\/div><\/a>    <script>\r\n    \/* <![CDATA[ *\/\r\n    jQuery(document).ready(function($){\r\n        $(function(){\r\n            var width = $(window).innerWidth();\r\n            var setwidth = parseFloat(640);\r\n            var ratio = parseFloat(0.75);\r\n            var height = parseFloat(480);\r\n            var link = 'https:\/\/www.youtube.com\/watch?v=gkY6MjPSUZo&amp;rel=0&amp;width=640&amp;height=480';\r\n            if(width < setwidth)\r\n            {\r\n                height = Math.floor(width * 0.75);\r\n                \/\/console.log(\"device width \"+width+\", set width \"+640+\", ratio \"+0.75+\", new height \"+ height);\r\n                var new_url = wpvl_paramReplace('width', link, width);\r\n                var new_url = wpvl_paramReplace('height', new_url, height);\r\n                $(\"a#69d99b3169b8c\").attr('href', new_url);\r\n                \/\/console.log(new_url);\r\n            }\r\n        });\r\n    });\r\n    \/* ]]> *\/\r\n    <\/script>\n\nCyberLock &#8211; Protecting Remote Sites with Automated Key Control\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"critical-vid\">\n\n<a id=\"69d99b3169bb3\" rel=\"wp-video-lightbox\" href=\"https:\/\/www.youtube.com\/watch?v=OOt1ChD-jJs&#038;rel=0&#038;width=640&#038;height=480\" title=\"\"><div class=\"wpvl_auto_thumb_box_wrapper\"><div class=\"wpvl_auto_thumb_box\"><img decoding=\"async\" src=\"https:\/\/img.youtube.com\/vi\/OOt1ChD-jJs\/0.jpg\" class=\"video_lightbox_auto_anchor_image\" alt=\"\" \/><div class=\"wpvl_auto_thumb_play\"><img decoding=\"async\" src=\"https:\/\/cyberlock.com\/wp-content\/plugins\/wp-video-lightbox\/images\/play.png\" class=\"wpvl_playbutton\" \/><\/div><\/div><\/div><\/a>    <script>\r\n    \/* <![CDATA[ *\/\r\n    jQuery(document).ready(function($){\r\n        $(function(){\r\n            var width = $(window).innerWidth();\r\n            var setwidth = parseFloat(640);\r\n            var ratio = parseFloat(0.75);\r\n            var height = parseFloat(480);\r\n            var link = 'https:\/\/www.youtube.com\/watch?v=OOt1ChD-jJs&amp;rel=0&amp;width=640&amp;height=480';\r\n            if(width < setwidth)\r\n            {\r\n                height = Math.floor(width * 0.75);\r\n                \/\/console.log(\"device width \"+width+\", set width \"+640+\", ratio \"+0.75+\", new height \"+ height);\r\n                var new_url = wpvl_paramReplace('width', link, width);\r\n                var new_url = wpvl_paramReplace('height', new_url, height);\r\n                $(\"a#69d99b3169bb3\").attr('href', new_url);\r\n                \/\/console.log(new_url);\r\n            }\r\n        });\r\n    });\r\n    \/* ]]> *\/\r\n    <\/script>\n\nCyberLock &#8211; A Networked Solution for Critical Infrastructure Security\n<\/div>\n<\/div>\n<\/div>\n\n\n<a href=\"https:\/\/cyberlock.com\/wp-content\/uploads\/2020\/11\/Critical-Infrastructure.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\" data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Critical-Infrastructure<\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>eNews Signup Interested in receiving a special eNewsletter with more ideas on protecting critical infrastructure? Sign up here! White Papers Videos CyberLock &#8211; Securing Critical Infrastructure CyberLock &#8211; Protecting Remote Sites with Automated Key Control CyberLock &#8211; A Networked Solution for Critical Infrastructure Security<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","advanced-sidebar-menu\/link-title":"","advanced-sidebar-menu\/exclude-page":false},"class_list":["post-4639","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberlock.com\/es\/wp-json\/wp\/v2\/pages\/4639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberlock.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberlock.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberlock.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberlock.com\/es\/wp-json\/wp\/v2\/comments?post=4639"}],"version-history":[{"count":22,"href":"https:\/\/cyberlock.com\/es\/wp-json\/wp\/v2\/pages\/4639\/revisions"}],"predecessor-version":[{"id":5640,"href":"https:\/\/cyberlock.com\/es\/wp-json\/wp\/v2\/pages\/4639\/revisions\/5640"}],"wp:attachment":[{"href":"https:\/\/cyberlock.com\/es\/wp-json\/wp\/v2\/media?parent=4639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}