{"type":"video","version":"1.0","html":"<iframe src=\"https://www.loom.com/embed/30b6d1645f2d4cbba6f6af837136d6a1\" frameborder=\"0\" width=\"1920\" height=\"1440\" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>","height":1440,"width":1920,"provider_name":"Loom","provider_url":"https://www.loom.com","thumbnail_height":1440,"thumbnail_width":1920,"thumbnail_url":"https://cdn.loom.com/sessions/thumbnails/30b6d1645f2d4cbba6f6af837136d6a1-00001.gif","duration":413,"title":"How to Protect your Users from Impersonation-Based Phishing Attacks"}