{"id":4459,"date":"2021-06-09T14:55:20","date_gmt":"2021-06-09T19:55:20","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=4459"},"modified":"2021-06-09T14:55:20","modified_gmt":"2021-06-09T19:55:20","slug":"how-to-enhance-security-by-embracing-byod","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/","title":{"rendered":"How to Enhance Security by Embracing BYOD"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-4463\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/06\/endpoint-device-security-ciso-corner-strat-300x190.jpg\" alt=\"A person holding a smartphone against a dark blue background with a floating shield icon with a keyhole in it hovering over the phone's screen, symbolizing device security. \" width=\"300\" height=\"190\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/06\/endpoint-device-security-ciso-corner-strat-300x190.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/06\/endpoint-device-security-ciso-corner-strat-1024x650.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/06\/endpoint-device-security-ciso-corner-strat-768x488.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/06\/endpoint-device-security-ciso-corner-strat-1536x975.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/06\/endpoint-device-security-ciso-corner-strat-2048x1300.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/06\/endpoint-device-security-ciso-corner-strat-200x127.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>You&#8217;ve probably heard this security adage: &#8220;The perimeter is dead.&#8221; Well, I&#8217;m here to tell you that the managed endpoint isn&#8217;t far behind. Even as a growing number of people in the U.S. get vaccinated and case numbers fall, the pandemic-driven alterations in how and where many of us work have lingered.\u00a0As of April, 72 percent of white-collar employees still reported\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/remote-work-resource-roundup-9-blog-entries-for-business-leaders-navigating-the-new-normal\/\" target=\"_blank\" rel=\"nofollow noopener\">working remotely<\/a>, and 35 percent of all full-time employees who&#8217;ve been fulfilling their professional obligations from home at least part of the time want to continue working remote as much as possible, according to\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/news.gallup.com\/poll\/348743\/seven-u.s.-white-collar-workers-still-working-remotely.aspx\" target=\"_blank\" rel=\"nofollow noopener\">Gallup<\/a>. It&#8217;s clear that many people want the shift to WFH to become a permanent change \u2013 and that also means a lasting adjustment in how we approach endpoint security.<\/p>\n<h2>Securing Endpoints in the WFH Era: Is It Possible?<\/h2>\n<p>The new reality of remote work as the rule rather than an exception requires security teams to rethink their long-term endpoint protection strategy to account for people relying on potentially unsecured devices to do their jobs. For instance, a\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/newsroom.ibm.com\/2020-06-22-IBM-Security-Study-Finds-Employees-New-to-Working-from-Home-Pose-Security-Risk#:~:text=IBM%20Security%20Study%20Finds%20Employees%20New%20to%20Working%20from%20Home%20Pose%20Security%20Risk,-X%2DForce%20Red&amp;text=The%20study%20shows%20more%20than,policies%20to%20help%20guide%20them.\" target=\"_blank\" rel=\"nofollow noopener\">2020 IBM Security study<\/a>\u00a0found that 50 percent of people newly working from home reported utilizing their personal computers for work. Improperly secured devices are a huge risk for any organization, as 70 percent of data breaches start at endpoints and numerous types of malware (e.g., LokiBot, NanoCore and FormBook) specifically target endpoints, according to the Cisco blog entry &#8220;<a class=\"external-link external external_icon\" href=\"https:\/\/blogs.cisco.com\/security\/securing-remote-work-protecting-endpoints-the-right-way?CAMPAIGN=Corporate+Communications&amp;Country_Site=GL&amp;POSITION=Social%2BMedia&amp;REFERRING_SITE=Facebook&amp;CREATIVE=Cisco%2B%2BGC+-+Security%2BBlog\" target=\"_blank\" rel=\"nofollow noopener\">Security Remote Work: Protecting Endpoints the Right Way<\/a>.&#8221;<\/p>\n<p>While you can implement endpoint protection solutions and invest in corporate devices to lower your odds of experiencing a breach, in our current work-from-home environment, it&#8217;s become essentially impossible to ensure none of your endpoints are compromised. To achieve the highest possible level of security, you have to shift your focus away from enforcing endpoint and toward sandboxing applications and protecting your servers and cloud infrastructure.<\/p>\n<h2>How to Lower Your Breach Risk With Bring Your Own Device (BYOD), Sandboxing and SASE<\/h2>\n<p>Although it might seem counterintuitive at first, you can improve your security posture by encouraging your employees to utilize their own devices for work. Take the funds you would have otherwise spent on company issued-phones, laptops and so on and give your team members a stipend to select and purchase devices that they like and are comfortable using. Then leverage a <a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/secure-access-service-edge-faq-the-benefits-of-sase-for-your-business\/\" target=\"_blank\" rel=\"nofollow noopener\">secure access service edge (SASE) solution<\/a>\u00a0to minimize your data breach risk level.<\/p>\n<p>SASE combines SD-WAN functionality with cloud-native security features and is ideal for businesses that rely increasingly on cloud solutions and services, according to\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/what-is-sase-secure-access-service-edge.html\" target=\"_blank\" rel=\"nofollow noopener\">Cisco<\/a>. This type of solution allows security teams to adjust cost, reliability, performance and cybersecurity for each network session based on user identity and context, as\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/security-awareness\/cloud\/what-is-sase.html\" target=\"_blank\" rel=\"nofollow noopener\">McAfee explains<\/a>. Some of our clients have implemented\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-your-business-needs-a-secure-remote-work-strategy-to-survive\/\" target=\"_blank\" rel=\"nofollow noopener\">secure remote work strategies<\/a>\u00a0by\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/getting-the-most-out-of-your-microsoft-365-subscription-and-the-business-benefits-of-going-serverless\/\" target=\"_blank\" rel=\"nofollow noopener\">going serverless<\/a>\u00a0with\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/microsoft-365-productivity-suite-for-businesses.html\" target=\"_blank\" rel=\"nofollow noopener\">Microsoft 365<\/a>\u00a0apps like SharePoint and OneDrive and then protecting their environment with our\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/office-anywhere.html\" target=\"_blank\" rel=\"nofollow noopener\">Office Anywhere<\/a>\u00a0offering, which combines a zero-trust framework with SASE and includes the following features:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>A single secure user identity based on specific device characteristics,\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/two-factor-authentication.html\" target=\"_blank\" rel=\"nofollow noopener\">multi-factor authentication (MFA)<\/a> and other app classifications<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>End user ability to log in via any device with their identity, with policy enforcement ensuring each device is secure before granting access to company resources<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Policy enforcement that only gives end users access to the resources they need to do their job in accordance with the device&#8217;s security checks, user access requirements, and the determination process<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>The latest in SASE tech even includes a SASE-hosted sandboxed browser and other such applications, meaning that even if the end user&#8217;s host is compromised, it&#8217;s impossible for malware to leak over into your critical information systems!<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>If your company has Microsoft 365, you can also\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/docs.microsoft.com\/en-us\/mem\/intune\/fundamentals\/common-scenarios\" target=\"_blank\" rel=\"nofollow noopener\">leverage Intune<\/a>\u00a0to implement a BYOD program and manage apps with work-related data on your employees&#8217; devices. Admins can require end users to utilize Office mobile apps and set up protective policies for those apps to prevent data loss.<\/p>\n<p>SASE app and browser sandboxing \u2013 as well as\u00a0endpoint checks to ensure the user&#8217;s device has all the necessary updates, anti-virus, and endpoint detection and response software before they connect to your corporate network \u2013\u00a0will significantly reduce your risk of an endpoint-related breach without corporate devices and extensive endpoint management. This benefits businesses in the form of savings on devices and management efforts while providing employees with new personal devices they can keep even if they part ways with the company. With your endpoint management savings, you can launch a program that gives your staff members an annual tech stipend, which should help attract top talent to your company.<\/p>\n<p>Of course, you shouldn&#8217;t completely forget about\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/vulnerability-scans.html\" target=\"_blank\" rel=\"nofollow noopener\">vulnerability scanning<\/a>, OS patching and software version enforcement. However, with this updated security strategy, you can hyper-focus on protecting the servers, applications and other high-value assets behind the SASE &#8220;moat.&#8221; As a result, you&#8217;ll see faster vulnerability resolution times for your company&#8217;s critical systems and better security overall.<\/p>\n<p>If you have any questions about endpoint security and data breach prevention, our security analysts are available to assist you. We can provide information about SASE, Intune and many other cybersecurity solutions, in addition to assisting with long-term security strategy development. Get in touch with us today by calling\u00a0877-599-3999 or emailing\u00a0<a class=\"external-link\" href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"nofollow noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You&#8217;ve probably heard this security adage: &#8220;The perimeter is dead.&#8221; Well, I&#8217;m here to tell you that the managed endpoint isn&#8217;t far behind. Even as a growing number of people in the U.S. get vaccinated and case numbers fall, the &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":4463,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[263],"tags":[],"class_list":["post-4459","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-corner"],"yoast_head":"<title>BYOD Could Be the Key to Better Post-Pandemic Security<\/title>\n<meta name=\"description\" content=\"In the work-from-home era, it&#039;s impossible to ensure your endpoints aren&#039;t compromised. Here&#039;s how to prevent breaches with BYOD and SASE.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BYOD Could Be the Key to Better Post-Pandemic Security\" \/>\n<meta property=\"og:description\" content=\"In the work-from-home era, it&#039;s impossible to ensure your endpoints aren&#039;t compromised. Here&#039;s how to prevent breaches with BYOD and SASE.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-09T19:55:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/06\/endpoint-device-security-ciso-corner-strat.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2172\" \/>\n\t<meta property=\"og:image:height\" content=\"1379\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"How to Enhance Security by Embracing BYOD\",\"datePublished\":\"2021-06-09T19:55:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/\"},\"wordCount\":870,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/06\/endpoint-device-security-ciso-corner-strat.jpg\",\"articleSection\":[\"Cyber Corner\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/\",\"name\":\"BYOD Could Be the Key to Better Post-Pandemic Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/06\/endpoint-device-security-ciso-corner-strat.jpg\",\"datePublished\":\"2021-06-09T19:55:20+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"In the work-from-home era, it's impossible to ensure your endpoints aren't compromised. Here's how to prevent breaches with BYOD and SASE.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/06\/endpoint-device-security-ciso-corner-strat.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/06\/endpoint-device-security-ciso-corner-strat.jpg\",\"width\":2172,\"height\":1379,\"caption\":\"A person holding a smartphone against a dark blue background with a floating shield icon with a keyhole in it hovering over the phone's screen, symbolizing device security.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Enhance Security by Embracing BYOD\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"BYOD Could Be the Key to Better Post-Pandemic Security","description":"In the work-from-home era, it's impossible to ensure your endpoints aren't compromised. Here's how to prevent breaches with BYOD and SASE.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/","og_locale":"en_US","og_type":"article","og_title":"BYOD Could Be the Key to Better Post-Pandemic Security","og_description":"In the work-from-home era, it's impossible to ensure your endpoints aren't compromised. Here's how to prevent breaches with BYOD and SASE.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2021-06-09T19:55:20+00:00","og_image":[{"width":2172,"height":1379,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/06\/endpoint-device-security-ciso-corner-strat.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"How to Enhance Security by Embracing BYOD","datePublished":"2021-06-09T19:55:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/"},"wordCount":870,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/06\/endpoint-device-security-ciso-corner-strat.jpg","articleSection":["Cyber Corner"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/","name":"BYOD Could Be the Key to Better Post-Pandemic Security","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/06\/endpoint-device-security-ciso-corner-strat.jpg","datePublished":"2021-06-09T19:55:20+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"In the work-from-home era, it's impossible to ensure your endpoints aren't compromised. Here's how to prevent breaches with BYOD and SASE.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/06\/endpoint-device-security-ciso-corner-strat.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/06\/endpoint-device-security-ciso-corner-strat.jpg","width":2172,"height":1379,"caption":"A person holding a smartphone against a dark blue background with a floating shield icon with a keyhole in it hovering over the phone's screen, symbolizing device security."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-enhance-security-by-embracing-byod\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Enhance Security by Embracing BYOD"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4459"}],"version-history":[{"count":4,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4459\/revisions"}],"predecessor-version":[{"id":4461,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4459\/revisions\/4461"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/4463"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}