{"version":"1.0","provider_name":"WTM - Technology, Business, Finance, Digital Marketing","provider_url":"https:\/\/www.webtechmantra.com","author_name":"Web Tech Mantra","author_url":"https:\/\/www.webtechmantra.com\/author\/admin\/","title":"Insider threat risk assessments: What you should know","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"MSkgIV0iPr\"><a href=\"https:\/\/www.webtechmantra.com\/insider-threat-risk-assessments\/\">Insider threat risk assessments: What you should know<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.webtechmantra.com\/insider-threat-risk-assessments\/embed\/#?secret=MSkgIV0iPr\" width=\"600\" height=\"338\" title=\"&#8220;Insider threat risk assessments: What you should know&#8221; &#8212; WTM - Technology, Business, Finance, Digital Marketing\" data-secret=\"MSkgIV0iPr\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/Insider-threat-risk-assessments-What-you-should-know.jpg","thumbnail_width":1200,"thumbnail_height":629,"description":"Insider threats are a significant concern in the present day when firms increasingly depend on technology to store and handle confidential material. Staff, consultants, or other insiders with access to an organization's assets, data, or resources might create an insider threat."}