{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/FZvMfFKdt2o9lYoFEU4g/WdpAtT0luNoNuHgFMb2z/tmitmXnnb.js"],
  "sourcesContent": ["// Generated by Framer (861d57e)\nexport default function metadata(params,activeLocale){return{breakpoints:[{hash:\"1va21mr\",mediaQuery:\"(min-width: 1200px)\"},{hash:\"1xsvw76\",mediaQuery:\"(min-width: 1200px) and (max-width: 1199px)\"},{hash:\"14j3yb0\",mediaQuery:\"(min-width: 768px) and (max-width: 1199px)\"},{hash:\"12s9xxj\",mediaQuery:\"(max-width: 767px)\"}],description:\"Shieldworkz\u2019s 2025 guide explores IoT security for OT operations. Learn to identify challenges, align with best practices, and protect your systems. Download now!\",elements:{auemUz2Si:\"hero\"},framerSearch:{index:true},robots:\"max-image-preview:large\",serializationId:\"framer-zPbPm\",socialImage:\"https://framerusercontent.com/assets/D75a9FvhAocmDbbwgh30bAWd0Q.jpg\",title:\"Importance of IoT Security in 2023\",viewport:\"width=device-width\"};}export const metadataVersion=1;\nexport const __FramerMetadata__ = {\"exports\":{\"default\":{\"type\":\"function\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"metadataVersion\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "AACe,SAARA,EAA0BC,EAAOC,EAAa,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,KAAK,UAAU,WAAW,qBAAqB,EAAE,CAAC,KAAK,UAAU,WAAW,6CAA6C,EAAE,CAAC,KAAK,UAAU,WAAW,4CAA4C,EAAE,CAAC,KAAK,UAAU,WAAW,oBAAoB,CAAC,EAAE,YAAY,0KAAqK,SAAS,CAAC,UAAU,MAAM,EAAE,aAAa,CAAC,MAAM,EAAI,EAAE,OAAO,0BAA0B,gBAAgB,eAAe,YAAY,sEAAsE,MAAM,qCAAqC,SAAS,oBAAoB,CAAE,CAAQ,IAAMC,EAAgB,EACrxBC,EAAqB,CAAC,QAAU,CAAC,QAAU,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,gBAAkB,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["metadata", "params", "activeLocale", "metadataVersion", "__FramerMetadata__"]
}
