<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Lifehacker Australia</provider_name><provider_url>https://www.lifehacker.com.au</provider_url><author_name>johnsmithus</author_name><author_url>https://www.lifehacker.com.au/author/johnsmithus005gmail-com/</author_url><title>How To Protect Your Network In A BYOD World</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="BbUSVjgKl0"&gt;&lt;a href="https://www.lifehacker.com.au/2012/11/how-to-protect-your-network-in-a-byod-world/"&gt;How To Protect Your Network In A BYOD World&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.lifehacker.com.au/2012/11/how-to-protect-your-network-in-a-byod-world/embed/#?secret=BbUSVjgKl0" width="600" height="338" title="&#x201C;How To Protect Your Network In A BYOD World&#x201D; &#x2014; Lifehacker Australia" data-secret="BbUSVjgKl0" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
&lt;/script&gt;
</html><description>If your business is pursuing a bring-your-own-device (BYOD) strategy, effective network management and security becomes critical. How can you ensure resources are accessible to staff who need them but not vulnerable to attack? The answer could lie in an often-maligned technology: network access control (NAC).</description></oembed>
