{"version":"1.0","provider_name":"UDS Enterprise","provider_url":"https:\/\/udsenterprise.com\/en\/","author_name":"UDS Enterprise Team","author_url":"https:\/\/udsenterprise.com\/en\/author\/uds-enterprise-team\/","title":"BYOID adoption and the new security risks","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"S0wK668vKV\"><a href=\"https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/\">BYOID adoption and the new security risks<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/embed\/#?secret=S0wK668vKV\" width=\"600\" height=\"338\" title=\"&#8220;BYOID adoption and the new security risks&#8221; &#8212; UDS Enterprise\" data-secret=\"S0wK668vKV\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/udsenterprise.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","thumbnail_width":67,"thumbnail_height":4,"description":"A new technological trend has arisen after the massive adoption of BYOD (Bring Your Own Device) by most users, who use their own mobile devices for both personal and proffesional purposes. This new trend is called BYOID, Bring Your Own Identity, and it is based on the use of the same digital identities used in the social media profiles to access corporative applications.The employees welcome this option, as they don't need to create different accounts for the different web sites they access everyday but the IT departments face new necurity risks. Companies must catch up on this trend and make the adoption easier for the staff without threatening the security of corporate data."}