{"version":"1.0","provider_name":"GLOBIS Unlimited","provider_url":"https:\/\/globisunlimited.com\/jp","author_name":"GLOBIS Unlimited","author_url":"https:\/\/globisunlimited.com\/jp","title":"Cybersecurity... Basically - GLOBIS Unlimited","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"xchpWhKEZs\"><a href=\"https:\/\/globisunlimited.com\/jp\/course\/cybersecurity-basically\/\">Cybersecurity&#8230; Basically<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/globisunlimited.com\/jp\/course\/cybersecurity-basically\/embed\/#?secret=xchpWhKEZs\" width=\"600\" height=\"338\" title=\"&#8220;Cybersecurity&#8230; Basically&#8221; &#8212; GLOBIS Unlimited\" data-secret=\"xchpWhKEZs\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/globisunlimited.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>","thumbnail_url":"https:\/\/globisunlimited.com\/wp-content\/uploads\/2022\/12\/Globis.jpg","thumbnail_width":1910,"thumbnail_height":1000,"description":"Imagine your organization&#8217;s data as the treasure in a heist movie, locked within a vault of computers, codes, and encryption. The threat? Cybercriminals ready to breach your defenses. In this episode of \u201c\u2026Basically,\u201d GLOBIS Insights editor W. Tanner Kirk uncovers the essentials of cybersecurity, introducing the 5 C\u2019s of Cybersecurity and exploring the key measures needed to implement effective security strategies and ensure your business&#8217;s resilience against digital attacks."}