{"version":"1.0","provider_name":"","provider_url":"https:\/\/www.securedenterprise.com\/us","title":"5 ways to detect a phishing email -","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"2XBTbtFC7c\"><a href=\"https:\/\/www.securedenterprise.com\/us\/5-ways-to-detect-a-phishing-email\/\">5 ways to detect a phishing email<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.securedenterprise.com\/us\/5-ways-to-detect-a-phishing-email\/embed\/#?secret=2XBTbtFC7c\" width=\"600\" height=\"338\" title=\"&#8220;5 ways to detect a phishing email&#8221; &#8212; \" data-secret=\"2XBTbtFC7c\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.securedenterprise.com\/us\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.securedenterprise.com\/us\/wp-content\/uploads\/2022\/07\/5-Reasons-To-Invest-in-Quality-AntiMalware-SE_5-Ways-To-Detect-Phishing-Emails-Large-SE-1024x260-1.png","thumbnail_width":1024,"thumbnail_height":260,"description":"One of the most common types of cyber-attacks is phishing. People still fall victim to these scams on a frequent basis. It is important to understand the signs and discover which emails can be trusted and which cannot. Many individuals and organisations fall victim to these attacks each year, these clues will help you in [&hellip;]"}