[{"id":131,"title":"Preventing information leakage","votes":6,"type":"x","order":1,"pct":66.67,"resources":[]},{"id":132,"title":"Firewall considerations","votes":0,"type":"x","order":2,"pct":0,"resources":[]},{"id":133,"title":"Permissions ","votes":3,"type":"x","order":3,"pct":33.33,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350