{"version":"1.0","provider_name":"TechSolutions, Inc.","provider_url":"https:\/\/www.techsolutionsinc.com","author_name":"TechSolutions","title":"How to strengthen your BYOD security","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"DQlaXaXInu\"><a href=\"https:\/\/www.techsolutionsinc.com\/blog\/how-to-strengthen-your-byod-security\/\">How to strengthen your BYOD security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.techsolutionsinc.com\/blog\/how-to-strengthen-your-byod-security\/embed\/#?secret=DQlaXaXInu\" width=\"600\" height=\"338\" title=\"&#8220;How to strengthen your BYOD security&#8221; &#8212; TechSolutions, Inc.\" data-secret=\"DQlaXaXInu\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/Security_July07_B_PH.jpg","thumbnail_width":900,"thumbnail_height":300,"description":"Mobile technology has drastically changed the way we live. And just as many people have \u201ccut the cord\u201d in their homes and now rely on their smart devices, businesses are now adopting the bring your own device (BYOD) trend culture. But BYOD also opens your organization up to cybersecurity risks. Here\u2019s how you can improve [&hellip;]"}