{"id":108913,"date":"2024-04-16T16:24:41","date_gmt":"2024-04-16T20:24:41","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=108913"},"modified":"2024-08-15T15:01:01","modified_gmt":"2024-08-15T19:01:01","slug":"making-byod-work-safely","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely","title":{"rendered":"Making BYOD Work, Safely"},"content":{"rendered":"\n

Achieving an effective bring-your-own-device (BYOD) program has been aspirational for many IT organizations. There are explicit security and privacy concerns, which have led many admins to sour on the concept, despite its benefits. Admins have even reluctantly accepted the risk of personal PCs being left unmanaged, which leaves gaps in management and visibility.<\/p>\n\n\n\n

Today, those challenges can all be overcome by new technologies and an administrative framework that reduces costs and overhead, and improves your speed of execution. It\u2019s particularly important for IT to get BYOD right as hardware and maintenance costs rise amid a competitive market environment. <\/p>\n\n\n\n

This article will empower you to hit the reset button on how both sides \u2014 workers and the company \u2014 think about this problem. It shares prescriptive steps with solutions that make it possible to make BYOD work safely.<\/p>\n\n\n\n

The Significance and Challenges of BYOD<\/h2>\n\n\n\n

BYOD started to gain momentum as the cloud emerged and smartphones took off in the early 2000s. Harvard Business Review observed that BYOD behavior was rising<\/a>, even when it wasn\u2019t an officially sanctioned practice. The trend was undeniable as employees sought to be collaborative, fast, and effective. The use of personal computers also rose significantly, which introduced security concerns like Shadow IT<\/a>, or the use of unknown or unapproved IT to conduct business activities.<\/p>\n\n\n\n

Point solutions emerged to meet the demand for a response, but many companies tacitly permitted the practice without any tool to manage the process. This approach gives personal devices considerable access and trust without any accountability. And it’s no surprise that this has become the reigning practice, as most end users are deeply concerned about their privacy and object to corporate control over their devices.<\/p>\n\n\n\n

It\u2019s understandable that most organizations still have not been able to make BYOD work effectively. Either they allow BYOD and appreciate the cost advantages, but are left insecure, or they disallow it entirely. The latter leaves users discouraged and leads to expensive hardware purchases for the business.<\/p>\n\n\n\n

A New Outlook<\/h3>\n\n\n\n

Interest in BYOD waned pre-pandemic for a variety of factors, though most notably for security reasons, due to corporate data leakage, malware, and users having local admin privileges on their endpoints. Security incidents also increased during the return-to-work<\/a> era following the global pandemic. Employee-owned devices were designated as an insider threat by many to be mitigated rather than an asset.<\/p>\n\n\n\n

Despite these risks, the global nature of organizations today and cost of procuring\/managing hardware around the world has generated renewed interest in making BYOD work in the post-pandemic world. Companies of all sizes struggle<\/a> with employee turnover, security, and supply chain. BYOD is being revisited<\/a> with a focus on doing it safely to protect applications and data.<\/p>\n\n\n\n

Making BYOD Work<\/h2>\n\n\n\n

BYOD isn\u2019t just a technical problem to be solved; it must be governed and managed at the people-level too. A successful program combines technology with a mutually beneficial and understandable proposition for employees. We\u2019ll explain how to get started with just a few simple steps.<\/p>\n\n\n\n

Technical Controls to Balance Privacy and Security<\/h3>\n\n\n\n

A unified endpoint management (UEM) service, where all devices are managed cross-OS, provides configuration options for BYOD that respects privacy and protects corporate data. This can be accomplished while ensuring a healthy device posture. Integrating cross-OS device management with identity and access management (IAM) also enables a Zero Trust<\/a> security strategy.<\/p>\n\n\n\n

Apple and Google have largely solved this problem for smartphones and tablets. Their systems are credible in terms of separating personal and business use. IT can help to put employees at ease by informing them about those privacy safeguards by including links to the safety information of those mobile device management (MDM)<\/a> controls. Most users are comfortable with allowing their devices to be enrolled in corporate MDM programs once they\u2019re shown the separation and privacy controls. <\/p>\n\n\n\n

Your organization needs to address the usual sticking point in BYOD programs \u2014 laptops and desktops. The solution is straightforward \u2014 end users can leverage their personal devices as long as they can be secured by corporate IT management tools which include MDM solutions, endpoint detection and response (EDR), and remote monitoring and management (RMM) tools. These tools allow the organization to ensure that devices are safe and will not cause a security risk. We\u2019ll outline how to obtain employee buy-in below.<\/p>\n\n\n\n

Other controls include security training to raise awareness about IT hygiene and phishing, as well as network segmentation<\/a> for BYOD devices that are mapped to your apps and workflows. Also, consider using a password manager to keep sensitive passwords secure instead of permitting users to store passwords in their browsers or personal device keychains.<\/p>\n\n\n\n

Administrative Prowess <\/h3>\n\n\n\n

There needs to be a shared understanding that the organization values security and control over their corporate data. Organizational leaders need to help their users be productive, but do so in a safe way. For end users, it’s important to understand that corporate security and supporting that value is essential. Most organizations have no interest in violating their employees\u2019 privacy, so starting with a positive message of intent helps a great deal.<\/p>\n\n\n\n

Shared Responsibility<\/h4>\n\n\n\n

A first step to enable this shared understanding is to create a BYOD policy document that outlines the program, its intentions, and the guidelines\/rules of the road. This will help both sides create clarity and build trust in a BYOD program that can work\/function safely and not violate privacy. It is also important to incentivize user buy-in.<\/p>\n\n\n\n

Incentivize Participation<\/h4>\n\n\n\n

Many workers have high-quality personal devices that can be used for work functions, but how can organizations take advantage of this while maintaining security? The short answer is to adjust the way that both sides \u2014 workers and the company \u2014 think about this problem.<\/p>\n\n\n\n

The organization can compensate the end user for allowing the company to place security tools on their machine and for the right to use their machine for business purposes. This practice eliminates the need to acquire corporate laptops or desktops, which is beneficial for geographically distributed organizations or when turnover is high. This arrangement also represents an agreed-upon contract that encourages both sides to do the right thing.<\/p>\n\n\n\n

This arrangement compels a choice for both sides \u2014 you can go along with an organization having more control over your personal device and be compensated, or if you opt out, the organization can procure hardware for employee use.<\/p>\n\n\n\n

Establish Trust<\/h4>\n\n\n\n

BYOD is a win-win where the company ensures security without having to purchase hardware, and the end user receives compensation for the use of their personal machine and the placement of security software on their device. Inherent in this transaction is an organizational commitment to operate ethically, use tools to protect privacy, prevent eavesdropping, and curtail “big brother” accusations. <\/p>\n\n\n\n

This can be an elegant solution to ensuring that BYOD can work, if the end user and the organization work to build and maintain a relationship based on trust.<\/p>\n\n\n\n

How JumpCloud Can Help<\/h2>\n\n\n\n

Cross-OS device management<\/a> is a critical technical component of a BYOD strategy. JumpCloud pairs the ability to manage every endpoint with an open directory platform for IAM to secure every identity. This unified approach delivers strong access control while consolidating IT management tools into a single console for increased operational efficiency. Unified device and identity management provides detailed reporting to track events, identities, and other assets. <\/p>\n\n\n\n

Plus, its technical controls can seamlessly fit into your workflows. JumpCloud offers an optional password manager and the ability to configure phishing-resistant authentication for all PCs using JumpCloud Go<\/a>\u2122. You can try JumpCloud for free<\/a> to determine if it\u2019s right for your organization. <\/p>\n\n\n\n

<\/p><\/div>

Note:<\/strong> \n

You can\u2019t manage what you\u2019re not aware of. JumpCloud is enhancing its platform<\/a> to unify SaaS, IT security, and asset management<\/a> to uncover shadow IT<\/a>.<\/p>\n <\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"

BYOD challenges can be overcome by combining technology with administrative incentives and trust.<\/p>\n","protected":false},"author":150,"featured_media":99074,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[2337,2753],"tags":[],"collection":[2778,2776],"platform":[],"funnel_stage":[3016],"coauthors":[2535,2511],"acf":[],"yoast_head":"\nMaking BYOD Work, Safely - JumpCloud<\/title>\n<meta name=\"description\" content=\"BYOD challenges can be overcome by combining technology with administrative incentives and trust.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Making BYOD Work, Safely\" \/>\n<meta property=\"og:description\" content=\"BYOD challenges can be overcome by combining technology with administrative incentives and trust.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-16T20:24:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-15T19:01:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/10\/1372091104.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Worthington, Rajat Bhargava\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Worthington, Rajat Bhargava\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely\"},\"author\":{\"name\":\"David Worthington\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/185ca12034835ee50ee17b100abdfb2e\"},\"headline\":\"Making BYOD Work, Safely\",\"datePublished\":\"2024-04-16T20:24:41+00:00\",\"dateModified\":\"2024-08-15T19:01:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely\"},\"wordCount\":1301,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/10\/1372091104.jpg\",\"articleSection\":[\"Remote Work\",\"Unification\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely\",\"url\":\"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely\",\"name\":\"Making BYOD Work, Safely - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/10\/1372091104.jpg\",\"datePublished\":\"2024-04-16T20:24:41+00:00\",\"dateModified\":\"2024-08-15T19:01:01+00:00\",\"description\":\"BYOD challenges can be overcome by combining technology with administrative incentives and trust.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/10\/1372091104.jpg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/10\/1372091104.jpg\",\"width\":1000,\"height\":750,\"caption\":\"Man working on his laptop in his living room\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Making BYOD Work, Safely\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/185ca12034835ee50ee17b100abdfb2e\",\"name\":\"David Worthington\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/d9acf1381c6e5b50c0f50d47b7b05411\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a6dde901b469c9005c22973e42038d62?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a6dde901b469c9005c22973e42038d62?s=96&d=mm&r=g\",\"caption\":\"David Worthington\"},\"description\":\"I'm the JumpCloud Champion for Product, Security. JumpCloud and Microsoft certified, security analyst, a one-time tech journalist, and former IT director.\",\"sameAs\":[\"https:\/\/jumpcloud.com\/blog\",\"david.worthington@jumpcloud.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Making BYOD Work, Safely - JumpCloud","description":"BYOD challenges can be overcome by combining technology with administrative incentives and trust.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely","og_locale":"en_US","og_type":"article","og_title":"Making BYOD Work, Safely","og_description":"BYOD challenges can be overcome by combining technology with administrative incentives and trust.","og_url":"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely","og_site_name":"JumpCloud","article_published_time":"2024-04-16T20:24:41+00:00","article_modified_time":"2024-08-15T19:01:01+00:00","og_image":[{"width":1000,"height":750,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/10\/1372091104.jpg","type":"image\/jpeg"}],"author":"David Worthington, Rajat Bhargava","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Worthington, Rajat Bhargava","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely"},"author":{"name":"David Worthington","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/185ca12034835ee50ee17b100abdfb2e"},"headline":"Making BYOD Work, Safely","datePublished":"2024-04-16T20:24:41+00:00","dateModified":"2024-08-15T19:01:01+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely"},"wordCount":1301,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/10\/1372091104.jpg","articleSection":["Remote Work","Unification"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely","url":"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely","name":"Making BYOD Work, Safely - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/10\/1372091104.jpg","datePublished":"2024-04-16T20:24:41+00:00","dateModified":"2024-08-15T19:01:01+00:00","description":"BYOD challenges can be overcome by combining technology with administrative incentives and trust.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/making-byod-work-safely"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/10\/1372091104.jpg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/10\/1372091104.jpg","width":1000,"height":750,"caption":"Man working on his laptop in his living room"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/making-byod-work-safely#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Making BYOD Work, Safely"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/185ca12034835ee50ee17b100abdfb2e","name":"David Worthington","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/d9acf1381c6e5b50c0f50d47b7b05411","url":"https:\/\/secure.gravatar.com\/avatar\/a6dde901b469c9005c22973e42038d62?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a6dde901b469c9005c22973e42038d62?s=96&d=mm&r=g","caption":"David Worthington"},"description":"I'm the JumpCloud Champion for Product, Security. JumpCloud and Microsoft certified, security analyst, a one-time tech journalist, and former IT director.","sameAs":["https:\/\/jumpcloud.com\/blog","david.worthington@jumpcloud.com"]}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/108913"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/150"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=108913"}],"version-history":[{"count":3,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/108913\/revisions"}],"predecessor-version":[{"id":114170,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/108913\/revisions\/114170"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/99074"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=108913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=108913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=108913"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=108913"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=108913"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=108913"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=108913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}