{"version":"1.0","provider_name":"BOXX Insurance USA","provider_url":"https:\/\/boxxinsurance.com\/us\/en\/","title":"Real Cybersecurity Examples & Best Practices to Protect Your US Business","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"rteGy9K4Ea\"><a href=\"https:\/\/boxxinsurance.com\/us\/en\/resources\/cyber-security-examples-and-best-practices\/\">Cybersecurity Examples and Best Practices<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/boxxinsurance.com\/us\/en\/resources\/cyber-security-examples-and-best-practices\/embed\/#?secret=rteGy9K4Ea\" width=\"600\" height=\"338\" title=\"&#8220;Cybersecurity Examples and Best Practices&#8221; &#8212; BOXX Insurance USA\" data-secret=\"rteGy9K4Ea\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/boxxinsurance.com\/us\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/boxxinsurance.com\/us\/wp-content\/uploads\/sites\/2\/2018\/06\/BOXX-Blog-180622.jpg","thumbnail_width":681,"thumbnail_height":670,"description":"Move beyond theory with real-world cyber security examples, including phishing attacks, malware infections and ransomware. BOXX Insurance's guide breaks down common threats and provides actionable best practices your business can implement today for robust malware protection and to prevent costly cyber attacks on your US operations."}