{"id":20710,"date":"2022-08-25T11:52:53","date_gmt":"2022-08-25T10:52:53","guid":{"rendered":"https:\/\/www.topdesk.com\/en\/?p=20710"},"modified":"2025-08-05T17:46:06","modified_gmt":"2025-08-05T16:46:06","slug":"5-risks-of-byod","status":"publish","type":"post","link":"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/","title":{"rendered":"The 5 biggest BYOD cybersecurity risks"},"content":{"rendered":"<p>The rise of remote working means more and more people are opting to use their personal laptops, phones, and tablets for work. For employees, this means more freedom and flexibility. But for IT departments, BYOD (bring your own device) can easily turn into a <a href=\"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/\">cybersecurity nightmare<\/a>.<\/p>\n<p>Discover the 5 biggest security risks of BYOD.<\/p>\n<h3>1. Data breaches<\/h3>\n<p>BYOD devices \u2013 especially mobile devices \u2013 complicate any <a href=\"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/\">IT security<\/a> strategy. They\u2019re often easier for employees to lose and usually aren\u2019t as well-protected from security threats as business-owned devices.<\/p>\n<p>Plus, because BYOD devices normally contain a mixture of personal and business data, they\u2019re more difficult for IT to secure and remotely control in case something does go wrong.<\/p>\n<p><a href=\"https:\/\/www.topdesk.com\/en\/blog\/itsm\/cybersecurity-risks-remote-working\/\">Hybrid working<\/a> has led to a rise in data breaches. Read this blog to discover how remote work has changed the face of cybersecurity.<\/p>\n<h3>2. Unsecured networks<\/h3>\n<p>Because of the flexibility they offer, employees often use BYOD devices on the go \u2013 it\u2019s one of the main reasons many people opt for BYOD in the first place. And the public Wi-Fi in the caf\u00e9 is pretty convenient if you fancy a cappuccino while you work. But connecting to an unsecured Wi-fi network puts valuable company data at risk and can be  another BYOD cybersecurity threat. When employees connect to public Wi-Fi networks, their work device becomes vulnerable to attacks like:<\/p>\n<ul>\n<li>Honeypots: Fake WiFi hotspots set up by attackers, which look legitimate to end-users.<\/li>\n<li>Snooping: Attackers listening to network traffic between two machines, potentially exposing confidential data to people outside the organization.<\/li>\n<\/ul>\n<p>When drafting up a BYOD policy, it\u2019s crucial to take these \u2018third spaces\u2019 like caf\u00e9s and pubs \u2013 and their unsecured networks \u2013 into account.<\/p>\n<h3>3. Blurred lines<\/h3>\n<p>Unclear security expectations are already bad news for any IT department. But couple them with BYOD and you\u2019ve got a potential security nightmare on your hands. Why?<\/p>\n<p>Well, if an employee is using a personal device for work, this means that they\u2019re probably using it when the working day ends, too. Unfortunately, this means they\u2019re less likely to stick to security best practices.<\/p>\n<p>After all, you probably don\u2019t apply the same caution when using your own laptop in your leisure time as you do when using a device at work. But because that personal device is also being used for work, this carries the risk of exposing confidential company data. So, it\u2019s extra important to set clear security expectations for employees who are working on their own devices.<\/p>\n<p>Here\u2019s <a href=\"https:\/\/www.topdesk.com\/en\/blog\/security-work-remotely\/\">how to maintain security<\/a> while employees work remotely.<\/p>\n<h3>4. Shadow IT<\/h3>\n<p>Using a personal device for work as part of a BYOD policy is one thing, but doing it entirely without the IT department\u2019s knowledge is another thing entirely. This is where the risks of BYOD meet the creepily named phenomenon of <a href=\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/\">shadow IT<\/a>.<\/p>\n<p>If employees are using personal devices for work without notifying IT, it creates invisible risks that the IT department can\u2019t address because they don\u2019t know about them. It also increases the attack surface of the organization, making it more susceptible to things like data leaks.<\/p>\n<h3>5. Malware<\/h3>\n<p>Another major security risk of BYOD devices \u2013 especially smartphones \u2013 is that they are more vulnerable to being infected with malware than other devices. Worryingly, this can often happen without users even noticing. It\u2019s pretty common for smartphone users to inadvertently download malicious software to their devices, which could enable attackers to steal data or even uninstall security programs.<\/p>\n<h3>Want to stay one step ahead of attackers?<\/h3>\n<p>With cyber-attacks becoming more sophisticated by the day, staying aware of BYOD security risks and getting on top of IT security is more important than ever. Discover 6 ways to <a href=\"https:\/\/www.topdesk.com\/en\/blog\/itsm\/6-ways-to-boost-it-security\/\">boost your company\u2019s IT security<\/a> in this blog or learn more about our <a href=\"https:\/\/www.topdesk.com\/en\/cybersecurity-solution\/\">cybersecurity solution<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The rise of remote working means more and more people are opting to use their personal laptops, phones, and tablets for work. For employees, this means more freedom and flexibility. But for IT departments, BYOD (bring your own device) can easily turn into a cybersecurity nightmare. Discover the 5 biggest security risks of BYOD. 1.<\/p>\n","protected":false},"author":1,"featured_media":20722,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"editor_notices":[],"footnotes":""},"class_list":["post-20710","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":{"blog_author":28080,"blog_hubspot_cta_link":{"title":"Boost your IT security","url":"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/","target":""},"toc_display":"full","blog_promotion_overwrite":false,"blog_promotion":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>BYOD Cybersecurity: 5 Critical Bring Your Own Device Risks<\/title>\n<meta name=\"description\" content=\"Explore the top BYOD cyber security threats and how to reduce risks. Secure your business from &quot;bring your own device&quot; vulnerabilities\u2014read the guide now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The 5 biggest BYOD cybersecurity risks | Better support, happy customers | TOPdesk\" \/>\n<meta property=\"og:description\" content=\"Explore the top BYOD cyber security threats and how to reduce risks. Secure your business from &quot;bring your own device&quot; vulnerabilities\u2014read the guide now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/\" \/>\n<meta property=\"og:site_name\" content=\"T1 TOPdesk - EN\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TOPdesk\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-25T10:52:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-05T16:46:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/BYOD_security-risk_blog-header.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Timon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Timon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/\"},\"author\":{\"name\":\"Timon\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916\"},\"headline\":\"The 5 biggest BYOD cybersecurity risks\",\"datePublished\":\"2022-08-25T10:52:53+00:00\",\"dateModified\":\"2025-08-05T16:46:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/\"},\"wordCount\":636,\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/BYOD_security-risk_blog-header.png\",\"articleSection\":[\"ITSM\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/\",\"url\":\"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/\",\"name\":\"BYOD Cybersecurity: 5 Critical Bring Your Own Device Risks\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/BYOD_security-risk_blog-header.png\",\"datePublished\":\"2022-08-25T10:52:53+00:00\",\"dateModified\":\"2025-08-05T16:46:06+00:00\",\"description\":\"Explore the top BYOD cyber security threats and how to reduce risks. Secure your business from \\\"bring your own device\\\" vulnerabilities\u2014read the guide now!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/#primaryimage\",\"url\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/BYOD_security-risk_blog-header.png\",\"contentUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/BYOD_security-risk_blog-header.png\",\"width\":1200,\"height\":600,\"caption\":\"holding tablet with attention icon\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.topdesk.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The 5 biggest BYOD cybersecurity risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#website\",\"url\":\"https:\/\/www.topdesk.com\/en\/\",\"name\":\"TOPdesk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.topdesk.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\",\"name\":\"TOPdesk\",\"url\":\"https:\/\/www.topdesk.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg\",\"contentUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg\",\"width\":1,\"height\":1,\"caption\":\"TOPdesk\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TOPdesk\/\",\"https:\/\/www.instagram.com\/topdeskuk\/\",\"https:\/\/www.linkedin.com\/company\/topdesk\/\",\"https:\/\/www.youtube.com\/user\/topdesk\",\"https:\/\/en.wikipedia.org\/wiki\/TOPdesk\",\"https:\/\/www.gartner.com\/reviews\/market\/it-service-management-platforms\/vendor\/topdesk\",\"https:\/\/www.capterra.com\/p\/127562\/TOPdesk\/\",\"https:\/\/www.trustradius.com\/products\/topdesk\/reviews\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916\",\"name\":\"Timon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g\",\"caption\":\"Timon\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"BYOD Cybersecurity: 5 Critical Bring Your Own Device Risks","description":"Explore the top BYOD cyber security threats and how to reduce risks. Secure your business from \"bring your own device\" vulnerabilities\u2014read the guide now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/","og_locale":"en_US","og_type":"article","og_title":"The 5 biggest BYOD cybersecurity risks | Better support, happy customers | TOPdesk","og_description":"Explore the top BYOD cyber security threats and how to reduce risks. Secure your business from \"bring your own device\" vulnerabilities\u2014read the guide now!","og_url":"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/","og_site_name":"T1 TOPdesk - EN","article_publisher":"https:\/\/www.facebook.com\/TOPdesk\/","article_published_time":"2022-08-25T10:52:53+00:00","article_modified_time":"2025-08-05T16:46:06+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/BYOD_security-risk_blog-header.png","type":"image\/png"}],"author":"Timon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Timon","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/#article","isPartOf":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/"},"author":{"name":"Timon","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916"},"headline":"The 5 biggest BYOD cybersecurity risks","datePublished":"2022-08-25T10:52:53+00:00","dateModified":"2025-08-05T16:46:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/"},"wordCount":636,"publisher":{"@id":"https:\/\/www.topdesk.com\/en\/#organization"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/BYOD_security-risk_blog-header.png","articleSection":["ITSM","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/","url":"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/","name":"BYOD Cybersecurity: 5 Critical Bring Your Own Device Risks","isPartOf":{"@id":"https:\/\/www.topdesk.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/#primaryimage"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/BYOD_security-risk_blog-header.png","datePublished":"2022-08-25T10:52:53+00:00","dateModified":"2025-08-05T16:46:06+00:00","description":"Explore the top BYOD cyber security threats and how to reduce risks. Secure your business from \"bring your own device\" vulnerabilities\u2014read the guide now!","breadcrumb":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/#primaryimage","url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/BYOD_security-risk_blog-header.png","contentUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/BYOD_security-risk_blog-header.png","width":1200,"height":600,"caption":"holding tablet with attention icon"},{"@type":"BreadcrumbList","@id":"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.topdesk.com\/en\/"},{"@type":"ListItem","position":2,"name":"The 5 biggest BYOD cybersecurity risks"}]},{"@type":"WebSite","@id":"https:\/\/www.topdesk.com\/en\/#website","url":"https:\/\/www.topdesk.com\/en\/","name":"TOPdesk","description":"","publisher":{"@id":"https:\/\/www.topdesk.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.topdesk.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.topdesk.com\/en\/#organization","name":"TOPdesk","url":"https:\/\/www.topdesk.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg","contentUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg","width":1,"height":1,"caption":"TOPdesk"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TOPdesk\/","https:\/\/www.instagram.com\/topdeskuk\/","https:\/\/www.linkedin.com\/company\/topdesk\/","https:\/\/www.youtube.com\/user\/topdesk","https:\/\/en.wikipedia.org\/wiki\/TOPdesk","https:\/\/www.gartner.com\/reviews\/market\/it-service-management-platforms\/vendor\/topdesk","https:\/\/www.capterra.com\/p\/127562\/TOPdesk\/","https:\/\/www.trustradius.com\/products\/topdesk\/reviews"]},{"@type":"Person","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916","name":"Timon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g","caption":"Timon"}}]}},"_links":{"self":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/20710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/comments?post=20710"}],"version-history":[{"count":12,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/20710\/revisions"}],"predecessor-version":[{"id":47205,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/20710\/revisions\/47205"}],"acf:post":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/person\/28080"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/media\/20722"}],"wp:attachment":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/media?parent=20710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}