{"version":"1.0","provider_name":"V2Catalog","provider_url":"https:\/\/v2catalog.com\/zh\/","author_name":"tracylamv2","author_url":"https:\/\/v2catalog.com\/zh\/author\/tracylamv2\/","title":"10 Safe Browsing Practices for Better Web Protection - V2Catalog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"AJqB3BSclI\"><a href=\"https:\/\/v2catalog.com\/zh\/10-safe-browsing-practices-for-better-web-protection\/\">10 Safe Browsing Practices for Better Web Protection<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/v2catalog.com\/zh\/10-safe-browsing-practices-for-better-web-protection\/embed\/#?secret=AJqB3BSclI\" width=\"600\" height=\"338\" title=\"10 Safe Browsing Practices for Better Web Protection &#8212; V2Catalog\" data-secret=\"AJqB3BSclI\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/v2catalog.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>","thumbnail_url":"https:\/\/v2catalog.com\/wp-content\/uploads\/2024\/10\/left-Nordlayer.png","thumbnail_width":657,"thumbnail_height":214,"description":"Modern web security has evolved beyond simply avoiding &#8220;suspicious&#8221; links. Today\u2019s cyber threats seamlessly blend social engineering with automated exploits. To counter these, organizations must implement consistent browsing standards to shield their workforce and data. This guide outlines the most effective habits for secure internet usage and explains how modern security tools can enforce these [&hellip;]"}