{"id":78517,"date":"2024-05-27T15:32:33","date_gmt":"2024-05-27T07:32:33","guid":{"rendered":"https:\/\/version-2.com\/?p=78517"},"modified":"2024-05-21T15:35:10","modified_gmt":"2024-05-21T07:35:10","slug":"employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/05\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/","title":{"rendered":"Employee smartphones, a pack of risks in a pocket. How to minimize your business\u2019 attack surface"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"78517\" class=\"elementor elementor-78517\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/b2b-emtd2-2-thumb-250x250forreal.png\" width=\"250\" height=\"250\" \/><\/p><div><div id=\"content-c10566459\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><em>With proactive prevention, companies can mitigate threats from mobile devices before they can do wider harm.<\/em><\/p><p>When intelligence services were trying to infiltrate companies or institutions during World War II and the Cold War, they needed to come up with some very smart ideas. They disguised cameras as coat buttons, hid transceivers in suitcases, and even tried to create a robot dragonfly with a microphone!<\/p><p>Today, when people want to snoop and get around a company\u2019s defenses, they just need to get inside your employees\u2019 smartphones. Nearly everybody has one, and many are casual about their security. Though it\u2019s true that it is rare to see malware spreading from a phone to company laptops, a compromised phone is still a threat if it is connected to the company\u2019s internal network or when attackers steal an employee\u2019s credentials, sensitive corporate data, or banking information.<\/p><p>Considering how small those devices are, the threat landscape they create is disproportionally huge: A single phone contains several devices, such as a camera, microphone, and GPS tracker, but what is even more serious is that these components and many of the applications hosted on the phone can be abused to steal sensitive information from employees and to serve as an initial attack vector for cybercriminals to further harm a company.<\/p><p>Some businesses deal with this by using mobile device management (MDM), imposing strict rules on their corporate devices and allowing employees to use only a handful of apps. However, most businesses are either small or midsize, and their security may struggle to keep enforcement tight.<\/p><p>ESET researchers could write books about malware that threatens smartphones and its potential harm to businesses. That is why ESET, a global leader in cybersecurity, has introduced <a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/mobile-threat-defense\/\" target=\"_blank\" rel=\"noopener\">ESET Mobile Threat Defense<\/a> (EMTD) as a part of its latest B2B offering.\u00a0 To improve their prevention capabilities, users of ESET PROTECT Advanced and higher can now enjoy one free mobile device seat per one paid seat for other devices.<\/p><p>Shortly after the successful launch of the ESET\u2019s Mobile Threat Defense module, ESET was included in <a href=\"https:\/\/www.eset.com\/int\/about\/newsroom\/press-releases\/awards\/eset-included-among-notable-vendors-in-mobile-threat-defense-solutions-landscape-report\/\" target=\"_blank\" rel=\"noopener\">Forrester\u2019s Mobile Threat Defense (MTD) Solutions Landscape report, Q1 2024<\/a>. Forrester, a respected analyst firm, provides an overview of 16 vendors in the field, including ESET, which, in our opinion, makes ESET a valuable player in this established market.<\/p><\/div><div id=\"content-c10566479\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">What threats are out there?<\/h3><\/header><p>From the beginning of 2020 until the end of 2023, Android malware detected by ESET telemetry rose by 222%.<\/p><p>For example, last year, ESET researchers discovered two active campaigns targeting Android users distributed across several app stores and dedicated websites.<\/p><p>The threat actors patched the open-source <a href=\"https:\/\/signal.org\/\" target=\"_blank\" rel=\"noopener\">Signal <\/a>and <a href=\"https:\/\/web.telegram.org\/k\/\" target=\"_blank\" rel=\"noopener\">Telegram apps<\/a> for Android with malicious code that ESET researchers have identified as BadBazaar. The malicious apps went by the name Signal Plus Messenger and FlyGram, and their purpose was to exfiltrate user data, such as contact lists, call logs, and the list of Google accounts.<\/p><p>Signal Plus Messenger is even more dangerous than FlyGram with its unique capability to <a href=\"https:\/\/www.youtube.com\/shorts\/-CHGwdYEzVI\" target=\"_blank\" rel=\"noopener\">spy on the victim\u2019s communications<\/a> in the original Signal app. Such sensitive information could be used for further spear phishing attacks against business officials.<\/p><\/div><div id=\"content-c10566480\" class=\"frame frame-default frame-type-esetbase_fce_video frame-layout-0\"><div class=\"responsive-embed media-video\" style=\"max-width: 560px; max-height: 315px;\" data-module=\"ui\/youtubeplayer\" data-options=\"{&quot;youtube_video&quot;:&quot;-CHGwdYEzVI&quot;,&quot;youtube_autoplay&quot;:0,&quot;youtube_hide_info&quot;:0,&quot;youtube_hide_controls&quot;:0,&quot;youtube_deny_fullscreen&quot;:0,&quot;youtube_loop&quot;:0,&quot;youtube_hide_related_videos&quot;:0,&quot;youtube_hide_subtitles&quot;:0,&quot;youtube_interface_language&quot;:&quot;&quot;}\" data-processed=\"true\" data-initialized=\"ui\/youtubeplayer\"><div class=\"player-wrapper\"><div class=\"player\">\u00a0<\/div><\/div><\/div><\/div><div id=\"content-c10566528\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>A similar case was covered in June 2023, when ESET researchers identified an updated version of <a href=\"https:\/\/www.welivesecurity.com\/2023\/06\/15\/android-gravityrat-goes-after-whatsapp-backups\/\" target=\"_blank\" rel=\"noopener\">Android GravityRAT<\/a> spyware. It was distributed within the malicious but functional messaging apps BingeChat and Chatico, which were both based on the OMEMO Instant Messenger app. This particular spyware can exfiltrate call logs, contact lists, SMS messages, the device location, basic device information, and files with specific extensions, such as jpg, PNG, txt, pdf, etc.<\/p><p>And this is just the beginning. Smartphones can be attacked in numerous ways that put companies\u2019 finances and data in danger, such as through banking trojans, phishing, vulnerabilities, or physical theft.<\/p><p>A similar case was covered in June 2023, when ESET researchers identified an updated version of Android GravityRAT spyware. It was distributed within the malicious but functional messaging apps BingeChat and Chatico, which were both based on the OMEMO Instant Messenger app. This particular spyware can exfiltrate call logs, contact lists, SMS messages, the device location, basic device information, and files with specific extensions, such as jpg, PNG, txt, pdf, etc.<\/p><p>And this is just the beginning. Smartphones can be attacked in numerous ways that put companies\u2019 finances and data in danger, such as through <a href=\"https:\/\/www.welivesecurity.com\/2018\/10\/24\/banking-trojans-continue-surface-google-play\/\" target=\"_blank\" rel=\"noopener\">banking trojans<\/a>, <a href=\"https:\/\/www.upguard.com\/blog\/biggest-data-breaches\" target=\"_blank\" rel=\"noopener\">phishing<\/a>, <a href=\"https:\/\/www.eset.com\/blog\/business\/?tx_news_pi1%5Baction%5D=detail&amp;tx_news_pi1%5Bcontroller%5D=News&amp;tx_news_pi1%5Bnews%5D=416920\" target=\"_blank\" rel=\"noopener\">vulnerabilities<\/a>, or <a href=\"https:\/\/krebsonsecurity.com\/2023\/05\/re-victimization-from-police-auctioned-cell-phones\/\" target=\"_blank\" rel=\"noopener\">physical theft<\/a>.<\/p><\/div><div id=\"content-c10566529\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">SMBs are more vulnerable<\/h3><\/header><p>Small businesses are often considered to be the backbone of national economies. In the United States, small businesses (defined as businesses with up to 500 employees) comprise <a href=\"https:\/\/www.forbes.com\/advisor\/business\/small-business-statistics\/\" target=\"_blank\" rel=\"noopener\">99.9% of all American businesses. <\/a><\/p><p><a href=\"https:\/\/www.gov.uk\/government\/statistics\/business-population-estimates-2023\/business-population-estimates-for-the-uk-and-regions-2023-statistical-release\" target=\"_blank\" rel=\"noopener\">Authorities <\/a>in the United Kingdom define small businesses as those with 10 to 49 employees and medium businesses as those with 50 to 249 employees. Similarly, more than <a href=\"https:\/\/www.gov.uk\/government\/statistics\/business-population-estimates-2023\/business-population-estimates-for-the-uk-and-regions-2023-statistical-release\" target=\"_blank\" rel=\"noopener\">99% of all U.K. businesses<\/a> are small and medium-sized businesses (SMBs).<\/p><p>Being cheaper and simpler to manage than issuing business devices, a Bring Your Own Device (BYOD) policy is often the number one option for SMBs. Some may also take a <a href=\"https:\/\/insights.samsung.com\/2023\/05\/31\/mobile-devices-and-your-employees-to-byod-or-not-to-byod\/\" target=\"_blank\" rel=\"noopener\">hybrid approach<\/a>, providing corporate devices only to chosen employees. Without proper security, this comes with risks.<\/p><p>Of companies opting for BYOD, 48% say they have seen malware introduced through an employee\u2019s personal phone, and just 4 out of 10 have MDM deployed, according to a <a href=\"https:\/\/insights.samsung.com\/2023\/05\/31\/mobile-devices-and-your-employees-to-byod-or-not-to-byod\/\" target=\"_blank\" rel=\"noopener\">Samsung 2023 survey<\/a>.<\/p><p>And human error is a huge factor. <a href=\"https:\/\/newsroom.ibm.com\/2023-07-24-IBM-Report-Half-of-Breached-Organizations-Unwilling-to-Increase-Security-Spend-Despite-Soaring-Breach-Costs\" target=\"_blank\" rel=\"noopener\">Several recent studies<\/a> show that more than <a href=\"https:\/\/www.grcelearning.com\/blog\/human-error-is-responsible-for-85-of-data-breaches\" target=\"_blank\" rel=\"noopener\">80% of data breaches<\/a> involve a human element. Specifically, the most common mistakes contributing to cyber incidents are employees\u2019 poor password hygiene and misuse of personal email.<\/p><p>However, we are not here to put the blame for every cyber incident on an average employee; after all, IT professionals can make some of the most common mistakes too. For example, half of them admitted to reusing the same password in a Ponemon Institute <a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/password-statistics\/\" target=\"_blank\" rel=\"noopener\">2020 study<\/a>.<\/p><p>Moreover, SMBs are less eager to invest in employee training, according to <a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2023\/cyber-security-breaches-survey-2023\" target=\"_blank\" rel=\"noopener\">a survey<\/a> conducted by the U.K. Department for Science, Innovation and Technology in 2023. For example, only 28% of surveyed small businesses conducted awareness training, in comparison with 77% of large businesses.<\/p><p>The same survey found that SMBs often also lack properly educated senior managers: \u201cAlthough we have senior managers who are good at the role, they don\u2019t have awareness in cyber security. I try to ensure they have a basic understanding, training, and knowledge in it. But they are focused on the day-to-day,\u201d said one of the participating human resources administrators working for a medium business.<\/p><\/div><div id=\"content-c10566530\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Target mobile threats to minimize attack surfaces<\/h3><\/header><p>Considering these threats, implementing MDM is a huge step forward. For example, <a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/mobile-threat-defense\/\" target=\"_blank\" rel=\"noopener\">ESET Mobile Threat Defense <\/a>gives administrators the option to monitor and control applications for both Android and iOS. EMTD is part of ESET\u2019s cloud and on-premises unified management console <a href=\"https:\/\/www.eset.com\/int\/business\/protect-platform\/\" target=\"_blank\" rel=\"noopener\">ESET PROTECT<\/a>, so no additional management console is needed.<\/p><p>With endpoint protection included, EMTD also provides antivirus and anti-phishing features, giving businesses more cyberattack prevention capabilities.<\/p><p>Both are also necessary when opting for a <a href=\"https:\/\/www.eset.com\/blog\/enterprise\/traveling-your-zero-trust-journey-with-eset\/\" target=\"_blank\" rel=\"noopener\">Zero Trust<\/a> approach, an <a href=\"https:\/\/www.statista.com\/statistics\/1299061\/global-zero-trust-security-market-value\/\" target=\"_blank\" rel=\"noopener\">increasingly popular strategy<\/a> in which the company verifies every account or device before allowing it to connect to its network.<\/p><p>See these ESET Mobile Threat Defense key capabilities and features:<\/p><ul><li><strong>Security:<\/strong> The security features range from anti-malware, anti-phishing, anti-theft, device security to control over web access, and much more.<\/li><li><strong>Management: <\/strong>Management includes remotely wiping devices, restricting application installs, preconfiguring devices for users, and other items related to IT management.<\/li><li><strong>Multiple OS:<\/strong> Mobile protection typically covers Android and Apple devices, the two most widespread mobile operating systems. As these operating systems are different, mobile protection capabilities can also vary between them.<\/li><li><strong>Single pane of glass (SPOG): <\/strong>EMTD is natively integrated into the ESET PROTECT platform, and there is no need for another console or management platform.<\/li><li><strong>Remote deployment:<\/strong> IT administrators simply selects employees with corporate devices, and they will automatically receive a QR code to then download ESET protection. Simple as that!<\/li><li><strong>Seamless synchronization with cloud management platforms:<\/strong> For streamlined enrollment of mobile devices, ESET supports Microsoft Intune, Microsoft Entra ID, VMware Workspace ONE, and Apple Business Manager.<\/li><\/ul><\/div><div id=\"content-c10566612\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Investing in prevention to avoid crisis<\/h3><\/header><p>According to the <a href=\"https:\/\/www.idtheftcenter.org\/post\/2023-business-impact-report-record-level-attacks-still-high-confidence-in-defense\/\" target=\"_blank\" rel=\"noopener\">2023 ITRC Business Impact Report<\/a>, nearly half of the surveyed U.S. SMBs that experienced a data breach estimated their financial losses as being up to $250,000, another 26% calculated their losses as $250,000 to $500,000, and another 10% of SMBs estimated their losses could reach $1 million.<\/p><p>Seeing these numbers, it is clear that the phrase \u201can ounce of prevention is worth a pound of cure\u201d also applies to cybersecurity. And that is not all: One-third of those companies also experienced loss of customer trust after a breach.<\/p><p>MDM with endpoint protection is always a great option to avoid such damage by decreasing your attack surface and possible risks, despite a lack of employee awareness training. Even better is that device management and protection can be operated from a single user-friendly platform, saving IT professionals precious time.<i class=\"arrow\"><\/i><\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>With proactive prevention, companies can mitigate threa [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,40,61],"tags":[41,1272],"class_list":["post-78517","post","type-post","status-publish","format-standard","hentry","category-1273","category-eset","category-press-release","tag-eset","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Employee smartphones, a pack of risks in a pocket. How to minimize your business\u2019 attack surface - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/new-products\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Employee smartphones, a pack of risks in a pocket. How to minimize your business\u2019 attack surface - Version 2\" \/>\n<meta property=\"og:description\" content=\"With proactive prevention, companies can mitigate threa [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/new-products\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-27T07:32:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/b2b-emtd2-2-thumb-250x250forreal.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Employee smartphones, a pack of risks in a pocket. How to minimize your business\u2019 attack surface\",\"datePublished\":\"2024-05-27T07:32:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\\\/\"},\"wordCount\":1485,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/b2b-emtd2-2-thumb-250x250forreal.png\",\"keywords\":[\"ESET\",\"2024\"],\"articleSection\":[\"2024\",\"ESET\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\\\/\",\"name\":\"Employee smartphones, a pack of risks in a pocket. How to minimize your business\u2019 attack surface - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/b2b-emtd2-2-thumb-250x250forreal.png\",\"datePublished\":\"2024-05-27T07:32:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/b2b-emtd2-2-thumb-250x250forreal.png\",\"contentUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/b2b-emtd2-2-thumb-250x250forreal.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Employee smartphones, a pack of risks in a pocket. How to minimize your business\u2019 attack surface\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Employee smartphones, a pack of risks in a pocket. How to minimize your business\u2019 attack surface - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/new-products\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/","og_locale":"en_US","og_type":"article","og_title":"Employee smartphones, a pack of risks in a pocket. How to minimize your business\u2019 attack surface - Version 2","og_description":"With proactive prevention, companies can mitigate threa [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/new-products\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/","og_site_name":"Version 2","article_published_time":"2024-05-27T07:32:33+00:00","og_image":[{"url":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/b2b-emtd2-2-thumb-250x250forreal.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/new-products\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/05\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Employee smartphones, a pack of risks in a pocket. How to minimize your business\u2019 attack surface","datePublished":"2024-05-27T07:32:33+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/05\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/"},"wordCount":1485,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/new-products\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/b2b-emtd2-2-thumb-250x250forreal.png","keywords":["ESET","2024"],"articleSection":["2024","ESET","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/new-products\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/05\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/","url":"https:\/\/www.eset.com\/blog\/new-products\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/","name":"Employee smartphones, a pack of risks in a pocket. How to minimize your business\u2019 attack surface - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/new-products\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/new-products\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/b2b-emtd2-2-thumb-250x250forreal.png","datePublished":"2024-05-27T07:32:33+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/new-products\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/new-products\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eset.com\/blog\/new-products\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/#primaryimage","url":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/b2b-emtd2-2-thumb-250x250forreal.png","contentUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/b2b-emtd2-2-thumb-250x250forreal.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/new-products\/employee-smartphones-a-pack-of-risks-in-a-pocket-how-to-minimize-your-business-attack-surface\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Employee smartphones, a pack of risks in a pocket. How to minimize your business\u2019 attack surface"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-kqp","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/78517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=78517"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/78517\/revisions"}],"predecessor-version":[{"id":78524,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/78517\/revisions\/78524"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=78517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=78517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=78517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}