{"id":3726,"date":"2016-08-09T15:08:00","date_gmt":"2016-08-09T15:08:00","guid":{"rendered":"http:\/\/www.abrahamsconsulting.com\/blog\/?p=3726"},"modified":"2016-08-09T15:09:27","modified_gmt":"2016-08-09T15:09:27","slug":"byod-policy-3-tips-for-in-the-iot-era","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/","title":{"rendered":"BYOD Policy: 3 Tips for Universities in the IoT Era"},"content":{"rendered":"<p>Each semester, your university welcomes a new cohort of students equipped with the latest personal devices. While it\u2019s exhilarating that students are coming prepared to learn, we live in the<br \/>\n<a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_52123967.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright wp-image-3732 size-medium\" src=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_52123967-300x300.jpg\" alt=\"BYOD \" width=\"300\" height=\"300\" srcset=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_52123967-300x300.jpg 300w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_52123967-150x150.jpg 150w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_52123967-768x768.jpg 768w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_52123967.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Internet of Things (IoT) era; all those devices of various types, models, and configurations can present a cybersecurity risk for universities with bring-your-own-device (BYOD) policies.<\/p>\n<p>Network access control (NAC) solutions help your IT team manage BYOD\u2014but these days, any old NAC won\u2019t cut it. Just as students strive for grades that meet Dean&#8217;s list criteria, your university should seek a NAC that satisfies the following standards set by our team of IT experts.<strong>\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><\/p>\n<p><strong>1.\u00a0<\/strong><strong>Low Maintenance<\/strong><\/p>\n<p><strong>\u00a0<\/strong><span style=\"line-height: 1.5;\">From registration, to orientation, to graduation, you have a lot to attend to on campus. You need a NAC that performs at peak functionality with minimal support.<\/span><\/p>\n<p>Major improvements don\u2019t have to require a major overhaul. It\u2019s critical to select a system that\u2019s compatible with your existing network infrastructure\u2014that\u2019s how you avoid having to continuously adjust Layer 2 network switch devices, wireless access points, and virtual private network (VPN) concentrators.<\/p>\n<p><strong>2.<\/strong><strong>Insightful<\/strong><\/p>\n<p><strong>\u00a0<\/strong>Few know the power of information better than universities. You understand the value of a system that provides real-time and historical insights into the devices on your network.<\/p>\n<p><strong>\u00a0<\/strong><span style=\"line-height: 1.5;\">Real-time updates allow for closer tracking of end-user behavior, empowering your university to uphold its most important BYOD security policies. Simply search a device\u2019s IP, MAC address, or username to determine owner compliance with university rules and regulations.<\/span><\/p>\n<p>Don\u2019t limit your view to the present. Employ a NAC that offers granular historical database reporting. Comprehensive records enable staff to establish context and uncover currently overlooked user behavior patterns. Analyze trends, audit compliance, and archive data with unparalleled accuracy for a stronger, safer network.<\/p>\n<p><strong>3. Cost Effective<\/strong><\/p>\n<p>Of course, the system\u2019s cost must be taken into consideration.<\/p>\n<p>Pay for quality rather than quantity: opt for a NAC that\u2019s priced according to peak load, rather than a system that\u2019s priced per user.<\/p>\n<p>Enjoy rising enrollment rates without worrying about the cost to support them. As a bustling university supporting a BYOD policy in the high stakes IoT-era, it\u2019s critical that you embrace a NAC that\u2019s easy to use, informative, and cost-effective.<\/p>\n<p>If your NAC doesn\u2019t make the grade, don\u2019t hesitate to <a href=\"http:\/\/www.abrahamsconsulting.com\/contact-us\/\">contact us<\/a>.<\/p>\n<p>At Abrahams Consulting, we\u2019ll help you understand all your options and choose a solution that\u2019s right for your university.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Each semester, your university welcomes a new cohort of students equipped with the latest personal devices. While it\u2019s exhilarating that students are coming prepared to learn, we live in the Internet of Things (IoT) era; all those devices of various types, models, and configurations can present a cybersecurity risk for universities with bring-your-own-device (BYOD) policies. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3732,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[171,170,169],"class_list":["post-3726","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-security","tag-byod","tag-endpoint-visibility","tag-iot"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BYOD Policy: 3 Tips for Universities in the IoT Era - TechTonic Times<\/title>\n<meta name=\"description\" content=\"BYOD in an IoT era: Universities should consider Safe Connect for Endpoint Visibility and Wireless Access for 3 reasons: Insight, Cost and Low Maintenance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BYOD Policy: 3 Tips for Universities in the IoT Era - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"BYOD in an IoT era: Universities should consider Safe Connect for Endpoint Visibility and Wireless Access for 3 reasons: Insight, Cost and Low Maintenance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-09T15:08:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-08-09T15:09:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_52123967.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"BYOD Policy: 3 Tips for Universities in the IoT Era\",\"datePublished\":\"2016-08-09T15:08:00+00:00\",\"dateModified\":\"2016-08-09T15:09:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/\"},\"wordCount\":421,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_52123967.jpg\",\"keywords\":[\"BYOD\",\"Endpoint Visibility\",\"IoT\"],\"articleSection\":[\"Data Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/\",\"name\":\"BYOD Policy: 3 Tips for Universities in the IoT Era - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_52123967.jpg\",\"datePublished\":\"2016-08-09T15:08:00+00:00\",\"dateModified\":\"2016-08-09T15:09:27+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"description\":\"BYOD in an IoT era: Universities should consider Safe Connect for Endpoint Visibility and Wireless Access for 3 reasons: Insight, Cost and Low Maintenance.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_52123967.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_52123967.jpg\",\"width\":800,\"height\":800,\"caption\":\"BYOD Policy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BYOD Policy: 3 Tips for Universities in the IoT Era\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BYOD Policy: 3 Tips for Universities in the IoT Era - TechTonic Times","description":"BYOD in an IoT era: Universities should consider Safe Connect for Endpoint Visibility and Wireless Access for 3 reasons: Insight, Cost and Low Maintenance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/","og_locale":"en_US","og_type":"article","og_title":"BYOD Policy: 3 Tips for Universities in the IoT Era - TechTonic Times","og_description":"BYOD in an IoT era: Universities should consider Safe Connect for Endpoint Visibility and Wireless Access for 3 reasons: Insight, Cost and Low Maintenance.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/","og_site_name":"TechTonic Times","article_published_time":"2016-08-09T15:08:00+00:00","article_modified_time":"2016-08-09T15:09:27+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_52123967.jpg","type":"image\/jpeg"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"BYOD Policy: 3 Tips for Universities in the IoT Era","datePublished":"2016-08-09T15:08:00+00:00","dateModified":"2016-08-09T15:09:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/"},"wordCount":421,"commentCount":0,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_52123967.jpg","keywords":["BYOD","Endpoint Visibility","IoT"],"articleSection":["Data Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/","name":"BYOD Policy: 3 Tips for Universities in the IoT Era - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_52123967.jpg","datePublished":"2016-08-09T15:08:00+00:00","dateModified":"2016-08-09T15:09:27+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"description":"BYOD in an IoT era: Universities should consider Safe Connect for Endpoint Visibility and Wireless Access for 3 reasons: Insight, Cost and Low Maintenance.","breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_52123967.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_52123967.jpg","width":800,"height":800,"caption":"BYOD Policy"},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/byod-policy-3-tips-for-in-the-iot-era\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"BYOD Policy: 3 Tips for Universities in the IoT Era"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/3726","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=3726"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/3726\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/3732"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=3726"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=3726"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=3726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}