{"type":"video","version":"1.0","html":"<iframe src=\"https://www.loom.com/embed/69833566c0024455a754af3bd4fe168c\" frameborder=\"0\" width=\"1920\" height=\"1440\" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>","height":1440,"width":1920,"provider_name":"Loom","provider_url":"https://www.loom.com","thumbnail_height":1440,"thumbnail_width":1920,"thumbnail_url":"https://cdn.loom.com/sessions/thumbnails/69833566c0024455a754af3bd4fe168c-1716152707933.gif","duration":166.52,"title":"Cyber Security Conclusion - Onboarding Flowchart 3"}