{"type":"video","version":"1.0","html":"<iframe src=\"https://www.loom.com/embed/91378111ea3d448ea72257e5ca82645e\" frameborder=\"0\" width=\"1920\" height=\"1440\" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>","height":1440,"width":1920,"provider_name":"Loom","provider_url":"https://www.loom.com","thumbnail_height":1440,"thumbnail_width":1920,"thumbnail_url":"https://cdn.loom.com/sessions/thumbnails/91378111ea3d448ea72257e5ca82645e-99b67fd56be0c02f.gif","duration":234.756333,"title":"Protecting against social engineering with Intercom workflows"}