{"version":"1.0","provider_name":"Collaboris","provider_url":"https:\/\/www.collaboris.com","title":"Cybersecurity best practices : Social media security","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"NtfTo3zKqn\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\">Cybersecurity best practices : Social media security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/embed\/#?secret=NtfTo3zKqn\" width=\"600\" height=\"338\" title=\"&#8220;Cybersecurity best practices : Social media security&#8221; &#8212; Collaboris\" data-secret=\"NtfTo3zKqn\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.collaboris.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/07\/social-media-security-scaled.jpg","thumbnail_width":2560,"thumbnail_height":1440,"description":"Social media security refers to the measures taken to protect your personal information and keep it safe while using social media platforms like Facebook, Instagram, or Twitter. It involves things like setting strong passwords, being careful about what you share online, and being aware of potential scams or hackers trying to access your accounts. By practicing good social media security, you can help ensure that your personal information stays private and protected."}