{"id":53941,"date":"2023-08-15T08:00:20","date_gmt":"2023-08-15T12:00:20","guid":{"rendered":"https:\/\/insi.net\/?p=53941"},"modified":"2023-08-15T08:00:20","modified_gmt":"2023-08-15T12:00:20","slug":"cybersecurity-vs-byod-cell-phones","status":"publish","type":"post","link":"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/","title":{"rendered":"Company Cybersecurity Vs Bring Your Own Device (BYOD)"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.16″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”]<\/p>\n

Companies are constantly weighing whether to provide cell phones, tablets, or computers or have the employee bring their own device (BYOD). You may not know, but employees\u2019 personal cell phones are a window into your private company data, and cyber criminals are increasingly discovering new ways to exploit this weakness.<\/span><\/p>\n

Company Cybersecurity vs. Bring Your Own Device (BYOD) Risks<\/span><\/h2>\n

Regardless of your size or industry, your data is a hot commodity. For this reason, you should have policies to limit applications and phone use. But what do you do when the employee owns the device?<\/span><\/p>\n

87% of end-users in the United States currently use their cell phones or tablets for business use.\u00a0 A growing trend among small and medium-sized businesses is to ditch corporate handsets and forward calls to the employee’s cell phone.<\/span><\/p>\n

Unfortunately, your network is only as secure as one employee\u2019s unsecured device. Therefore, mobile users are vulnerable to various attacks, including malicious apps, smishing, and Man-in-the-Middle attacks.<\/span><\/p>\n

BYOD Cell Phone Smishing Risks<\/span><\/h2>\n

By now, we are all aware of what a phishing scam is. However, only some know what a Smishing scam entails or how to avoid it. Undoubtedly, that makes your end-users prime targets.<\/span><\/p>\n

For clarification, a\u00a0Smishing<\/a> attack is a general term for a text requesting the end-user to click on a link, respond, or provide personal\/corporate information. The results of a successful Smishing attack could mean compromised PIN’s, credit information, passwords, social security number, and other private details that could lead to stolen identity. At worse, it could provide access to company emails, calendars, corporate contacts, and other applications that hold confidential data.<\/span><\/p>\n

Company Cybersecurity vs. BYOD Solution: Mobile Threat Defense<\/span><\/h2>\n

A Mobile Threat Defense<\/a> (MTD) system protects your BYOD users. It is ideal for companies concerned about the vulnerabilities of their end-users’ mobile devices. MTD monitors for threats to the OS versions, firmware, system parameters, and misconfigurations. In addition, it continuously scans for suspicious activity by unauthorized users.<\/span><\/p>\n

The Cybersecurity & BYOD Review: Mobile Risk Assessment<\/span><\/h2>\n

If you suspect your endusers’ cell phones have been compromised, you may want to consider a Mobile Risk Assessment<\/a>. Under this program, our experts evaluate the risk to mobile phones\/tablets, policies, and impact on policies, and then recommend actions to better secure and align mobile devices to your business practices.<\/span><\/p>\n

It is important to note that INSIs Mobile Device Management<\/a>\u00a0(MDR-IT) is a prerequisite to the mobile risk assessment. Additional enhancements available include app penetration testing and leaky app analysis.<\/span><\/p>\n

Call INSI<\/span><\/h2>\n

Is it time to review your cell phone security and policies? Let INSI help. INSI is an Atlanta-based IT support provider Cybriant Managed Security Services channel reseller. Subsequently, we can help you determine the best services specific to your managed security needs. If you have regulations or are concerned about security threats, contact INSI<\/strong> <\/a>at 770-387-2424 to speak with one of our experienced security consultants today.<\/span><\/p>\n

[\/et_pb_text][et_pb_button button_url=”https:\/\/insi.net\/best-it-support-provider-in-atlanta\/” button_text=”Connect with INSI” _builder_version=”4.22.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_button][et_pb_text _builder_version=”4.22.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

About INSI: The Best MSP in Atlanta!<\/span><\/h3>\n

Innovative Network Systems, Inc. has a unique approach to integrating\u00a0<\/span>IT support<\/a>\u00a0<\/span>and\u00a0<\/span>cybersecurity<\/a>. Our month-to-month programs range from basic support to proactive support, managed support, and customized support. Each program is tailored to the client\u2019s needs and internal IT strengths.\u00a0\u00a0<\/p>\n

For more information about cybersecurity dangers and the preventative measures for your company, connect with the top MSP in Atlanta; Contact INSI: 770-387-2424, option 2 or click the link below. In addition, we offer 16 different\u00a0<\/span>cybersecurity programs<\/a>\u00a0to protect you and your data.<\/p>\n

About the Author<\/h3>\n

Deborah Frazier<\/a>\u00a0is the author of\u00a0IT Outsourcing Secrets \u2013 A Small Business Guide to Compare IT Support Companies.<\/em><\/strong>\u00a0<\/span>With nearly 20 years of experience consulting small and medium-sized businesses on their IT support needs, she brings a wealth of knowledge to INSI as Head of Marketing and Sales. If you like this article and want to be notified when a new article is posted, click\u00a0<\/span>here<\/a>.<\/p>\n

To\u00a0<\/span>make an appointment for more information about INSI and our Marietta and Atlanta metro IT Support services, click here<\/a>.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

Companies are constantly weighing whether to provide cell phones, tablets, or computers or have the employee bring their own device (BYOD). You may not know, but employees\u2019 personal cell phones are a window into your private company data, and cyber criminals are increasingly discovering new ways to exploit this weakness. Company Cybersecurity vs. Bring Your […]<\/p>\n","protected":false},"author":3,"featured_media":58289,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"

Cybersecurity & personal cell phones are a very real danger.\u00a0 For instance, are you aware your employees cell phones are a window into your private company data?\u00a0 Further, did you know cybercriminals are increasingly discovering new ways to exploit this weakness?<\/p>

Cybersecurity, BYOD Cell Phones, and Your Risks<\/strong><\/p>

Regardless of your size or industry, your data is a hot commodity.\u00a0 For this reason, you should have policies in place to limit the applications and phone use.\u00a0 But, what do you do when the device is owned by the employee?<\/p>

Interestingly, 87% of end-users in the United States bring their own devices (BYOD).\u00a0 Of course, your network is only as secure as one employee\u2019s unsecured device.\u00a0 Unfortunately, mobile users are vulnerable to all sorts of attacks including malicious apps, smishing, and Man-in-the-Middle attacks.<\/p>

Cybersecurity, BYOD Cell Phones & Smishing<\/strong><\/p>

By now, we are all aware of what a phishing scam is.\u00a0 However, few know what a Smishing scam entails or how to avoid it.\u00a0 Undoubtedly, that makes your end-users prime targets.<\/p>

For clarification, a Cybersecurity Smishing<\/a> is a general term for a text that requests for you to click on a link, respond, or provide personal\/corporate information.\u00a0 Unfortunately, the results of a successful Cybersecurity Smishing attack could mean compromised pin number, credit information, passwords, social security number, and other private details that could lead to stolen identity. At worse, it could provide access to company emails, calendars, corporate contacts, and other applications that hold confidential data.<\/p>

The Cybersecurity & BYOD Solution: Mobile Threat Defense<\/strong><\/p>

Mobile Threat Defense (MTD)<\/a> system provides protection for your BYOD users. It is ideal for companies who are concerned about the vulnerabilities of their end-user\u2019s mobile devices. \u00a0Moreover, it monitors for threats to the OS versions, firmware, system parameters, and misconfigurations.\u00a0 In addition, it continuously scans for suspicious activity by unauthorized users.<\/p>

The Cybersecurity & BYOD Review: Mobile Risk Assessment<\/strong><\/p>

If you believe one of your end-user\u2019s cell phones have been compromised, you may want to consider a Mobile Risk Assessment<\/a>.\u00a0 Under this program experts evaluate the risk to mobile phones\/tablets, policies, impact on policies, and then recommend actions to better secure and align mobile devices to your business practices.<\/p>

It is important to note that\u00a0INSI\u2019s Mobile Device Management<\/a>\u00a0(MDR-IT) is a prerequisite to the mobile risk assessment. Additional enhancements available include app penetration testing and leaky app analysis.<\/p>

\u00a0<\/p>

Call INSI<\/strong><\/p>

Is it time to review your cell phone security and policies? Let INSI help. INSI is an Atlanta based IT support provider and channel re-seller of Cybriant Managed Security Services. Subsequently, we can help you determine the best services that are specific to your\u00a0managed security<\/a>\u00a0needs. If you have regulation or are concerned about security threats, please call INSI at 770-387-2424 to speak with one of our experienced security consultants today.<\/p>

About INSI<\/strong><\/p>

INSI is the Top Managed Service Provider in Atlanta.\u00a0 We offer both\u00a0complete IT support<\/a>\u00a0packages for clients with no internal IT\u00a0and\u00a0a la carte customized packages<\/a>\u00a0for small IT departments.\u00a0 Most importantly, we only charge the client for the exact service and level they actually need.<\/p>

\u00a0<\/p>

Interestingly, this unique support model has not only proven to save the client money, but it has also greatly complemented the client\u2019s internal IT strengths.\u00a0 Call the Best MSP in Atlanta today at 770-387-2424, Option 2 for more information.<\/p>

\u00a0<\/p>

Do You Like This Article?<\/strong><\/p>

If you like this article and would like to get notified when a new article is posted, click\u00a0here<\/a>.<\/p>

\u00a0<\/p>

About the Author<\/strong><\/p>

Deborah Frazier<\/a>\u00a0is the author of\u00a0IT Outsourcing Secrets<\/em><\/strong><\/a>\u00a0\u2013 A Small Business Guide to Compare IT Support Companies.<\/em><\/strong>\u00a0 With nearly 20-years\u2019 experience consulting small and medium-sized businesses on their IT support needs, she brings a wealth of experience to INSI as Head of Marketing and Sales.<\/p>","_et_gb_content_width":"","footnotes":""},"categories":[34],"tags":[12,13,14,15,16,20,21,22,23,25,32],"yoast_head":"\nCybersecurity Vs Bring Your Own Device- IT Atlanta Support<\/title>\n<meta name=\"description\" content=\"Cybersecurity Vs BYOD Cell Phones- Top IT Atlanta Support Company helps you learn the dangers and solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Vs Bring Your Own Device- IT Atlanta Support\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity Vs BYOD Cell Phones- Top IT Atlanta Support Company helps you learn the dangers and solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/\" \/>\n<meta property=\"og:site_name\" content=\"INSI's Integrated IT Support & Cybersecurity Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-15T12:00:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insi.net\/wp-content\/uploads\/2021\/04\/dreamstime_xxl_199639211-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Deborah Frazier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Deborah Frazier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/\"},\"author\":{\"name\":\"Deborah Frazier\",\"@id\":\"https:\/\/insi.net\/#\/schema\/person\/b120a1ff6fd1f1a92fc022dc1cb176c3\"},\"headline\":\"Company Cybersecurity Vs Bring Your Own Device (BYOD)\",\"datePublished\":\"2023-08-15T12:00:20+00:00\",\"dateModified\":\"2023-08-15T12:00:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/\"},\"wordCount\":783,\"publisher\":{\"@id\":\"https:\/\/insi.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/insi.net\/wp-content\/uploads\/2021\/04\/dreamstime_xxl_199639211-scaled-1.jpg\",\"keywords\":[\"Cyber Security\",\"cyber security companies\",\"Cybersecurity\",\"cybersecurity awareness\",\"information security\",\"managed IT security services\",\"managed security\",\"managed security provider\",\"Managed security services\",\"Managed Services\",\"network security providers\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/\",\"url\":\"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/\",\"name\":\"Cybersecurity Vs Bring Your Own Device- IT Atlanta Support\",\"isPartOf\":{\"@id\":\"https:\/\/insi.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/insi.net\/wp-content\/uploads\/2021\/04\/dreamstime_xxl_199639211-scaled-1.jpg\",\"datePublished\":\"2023-08-15T12:00:20+00:00\",\"dateModified\":\"2023-08-15T12:00:20+00:00\",\"description\":\"Cybersecurity Vs BYOD Cell Phones- Top IT Atlanta Support Company helps you learn the dangers and solutions.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/#primaryimage\",\"url\":\"https:\/\/insi.net\/wp-content\/uploads\/2021\/04\/dreamstime_xxl_199639211-scaled-1.jpg\",\"contentUrl\":\"https:\/\/insi.net\/wp-content\/uploads\/2021\/04\/dreamstime_xxl_199639211-scaled-1.jpg\",\"width\":2560,\"height\":1350,\"caption\":\"Cybersecurity vs BYOD\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insi.net\/#website\",\"url\":\"https:\/\/insi.net\/\",\"name\":\"INSI - Innovative Network Systems, Inc.\",\"description\":\"Atlanta Metro's best integrated IT Support and Cybersecurity Solution with a competitively priced flat rate model. No hidden fees, & all local college-educated engineers\",\"publisher\":{\"@id\":\"https:\/\/insi.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insi.net\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/insi.net\/#organization\",\"name\":\"INSI - Innovative Network Systems, Inc.\",\"url\":\"https:\/\/insi.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insi.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/insi.net\/wp-content\/uploads\/2023\/10\/cropped-INSITlogo_favicon-1.jpg\",\"contentUrl\":\"https:\/\/insi.net\/wp-content\/uploads\/2023\/10\/cropped-INSITlogo_favicon-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"INSI - Innovative Network Systems, Inc.\"},\"image\":{\"@id\":\"https:\/\/insi.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/innovative-network-systems-inc.\",\"https:\/\/www.youtube.com\/channel\/UCDsB8ePL69nOZX5Y_3jzniA\/featured\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/insi.net\/#\/schema\/person\/b120a1ff6fd1f1a92fc022dc1cb176c3\",\"name\":\"Deborah Frazier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insi.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/beac7a52631d8638d3a1dca572342a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/beac7a52631d8638d3a1dca572342a2d?s=96&d=mm&r=g\",\"caption\":\"Deborah Frazier\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Vs Bring Your Own Device- IT Atlanta Support","description":"Cybersecurity Vs BYOD Cell Phones- Top IT Atlanta Support Company helps you learn the dangers and solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Vs Bring Your Own Device- IT Atlanta Support","og_description":"Cybersecurity Vs BYOD Cell Phones- Top IT Atlanta Support Company helps you learn the dangers and solutions.","og_url":"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/","og_site_name":"INSI's Integrated IT Support & Cybersecurity Solutions","article_published_time":"2023-08-15T12:00:20+00:00","og_image":[{"width":2560,"height":1350,"url":"https:\/\/insi.net\/wp-content\/uploads\/2021\/04\/dreamstime_xxl_199639211-scaled-1.jpg","type":"image\/jpeg"}],"author":"Deborah Frazier","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Deborah Frazier","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/#article","isPartOf":{"@id":"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/"},"author":{"name":"Deborah Frazier","@id":"https:\/\/insi.net\/#\/schema\/person\/b120a1ff6fd1f1a92fc022dc1cb176c3"},"headline":"Company Cybersecurity Vs Bring Your Own Device (BYOD)","datePublished":"2023-08-15T12:00:20+00:00","dateModified":"2023-08-15T12:00:20+00:00","mainEntityOfPage":{"@id":"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/"},"wordCount":783,"publisher":{"@id":"https:\/\/insi.net\/#organization"},"image":{"@id":"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/#primaryimage"},"thumbnailUrl":"https:\/\/insi.net\/wp-content\/uploads\/2021\/04\/dreamstime_xxl_199639211-scaled-1.jpg","keywords":["Cyber Security","cyber security companies","Cybersecurity","cybersecurity awareness","information security","managed IT security services","managed security","managed security provider","Managed security services","Managed Services","network security providers"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/","url":"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/","name":"Cybersecurity Vs Bring Your Own Device- IT Atlanta Support","isPartOf":{"@id":"https:\/\/insi.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/#primaryimage"},"image":{"@id":"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/#primaryimage"},"thumbnailUrl":"https:\/\/insi.net\/wp-content\/uploads\/2021\/04\/dreamstime_xxl_199639211-scaled-1.jpg","datePublished":"2023-08-15T12:00:20+00:00","dateModified":"2023-08-15T12:00:20+00:00","description":"Cybersecurity Vs BYOD Cell Phones- Top IT Atlanta Support Company helps you learn the dangers and solutions.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insi.net\/cybersecurity\/cybersecurity-vs-byod-cell-phones\/#primaryimage","url":"https:\/\/insi.net\/wp-content\/uploads\/2021\/04\/dreamstime_xxl_199639211-scaled-1.jpg","contentUrl":"https:\/\/insi.net\/wp-content\/uploads\/2021\/04\/dreamstime_xxl_199639211-scaled-1.jpg","width":2560,"height":1350,"caption":"Cybersecurity vs BYOD"},{"@type":"WebSite","@id":"https:\/\/insi.net\/#website","url":"https:\/\/insi.net\/","name":"INSI - Innovative Network Systems, Inc.","description":"Atlanta Metro's best integrated IT Support and Cybersecurity Solution with a competitively priced flat rate model. No hidden fees, & all local college-educated engineers","publisher":{"@id":"https:\/\/insi.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insi.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/insi.net\/#organization","name":"INSI - Innovative Network Systems, Inc.","url":"https:\/\/insi.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insi.net\/#\/schema\/logo\/image\/","url":"https:\/\/insi.net\/wp-content\/uploads\/2023\/10\/cropped-INSITlogo_favicon-1.jpg","contentUrl":"https:\/\/insi.net\/wp-content\/uploads\/2023\/10\/cropped-INSITlogo_favicon-1.jpg","width":512,"height":512,"caption":"INSI - Innovative Network Systems, Inc."},"image":{"@id":"https:\/\/insi.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/innovative-network-systems-inc.","https:\/\/www.youtube.com\/channel\/UCDsB8ePL69nOZX5Y_3jzniA\/featured"]},{"@type":"Person","@id":"https:\/\/insi.net\/#\/schema\/person\/b120a1ff6fd1f1a92fc022dc1cb176c3","name":"Deborah Frazier","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insi.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/beac7a52631d8638d3a1dca572342a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/beac7a52631d8638d3a1dca572342a2d?s=96&d=mm&r=g","caption":"Deborah Frazier"}}]}},"_links":{"self":[{"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/posts\/53941"}],"collection":[{"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/comments?post=53941"}],"version-history":[{"count":0,"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/posts\/53941\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/media\/58289"}],"wp:attachment":[{"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/media?parent=53941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/categories?post=53941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insi.net\/wp-json\/wp\/v2\/tags?post=53941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}