{"id":2099,"date":"2017-03-02T09:47:51","date_gmt":"2017-03-02T14:47:51","guid":{"rendered":"http:\/\/www.stratospherenetworks.com\/blog\/?p=2099"},"modified":"2022-08-08T16:45:44","modified_gmt":"2022-08-08T21:45:44","slug":"12-steps-make-infrastructure-secure-creating-enforcing-security-policies","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/","title":{"rendered":"12 Steps to Make Your IT Infrastructure More Secure: Creating and Enforcing IT Security Policies"},"content":{"rendered":"<p><a href=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/IT-infrastructure-security.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-2100\" src=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/IT-infrastructure-security-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/IT-infrastructure-security-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/IT-infrastructure-security-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/IT-infrastructure-security-1024x683.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Ensuring your IT infrastructure is protected from cyberattacks is critical for businesses today. Last week, we discussed the importance of safeguarding your infrastructure from the ever-evolving threat of cybercriminals and detailed the <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-to-make-infrastructure-secure-performing-security-audit\/\" target=\"_blank\" rel=\"noopener\">first step in the process<\/a>: Performing a security audit.<\/p>\n<p>Once you have finished your security audit and established benchmarks, identified vulnerabilities, and come up with a list of action items, it\u2019s time to move on to the next step in the process of achieving the highest possible level of IT infrastructure security. The second stage involves creating and enforcing IT security policies.<\/p>\n<p>Here\u2019s a breakdown of what you\u2019ll need to do to complete step 2 of the Stratosphere Networks infrastructure security process.<\/p>\n<p><strong>1. Create an HR module. <\/strong>Part of instituting your security policies for IT infrastructure will involve establishing a module for your Human Resource Management System. An HR module for IT security can help your business make sure everyone complies with your policies.<\/p>\n<p><strong>2. Establish corporate awareness training. <\/strong>Having policies in place to ensure the security of your IT infrastructure won\u2019t do any good unless everyone who works for your company is aware of them.\u00a0<a href=\"http:\/\/www.stratospherenetworks.com\/blog\/4-inexpensive-ways-to-enhance-it-security\/\" target=\"_blank\" rel=\"noopener\">Training your staff<\/a> during the HR onboarding process and having managers review IT security policies regularly is important to make sure your efforts to guard your infrastructure from cyberattacks are effective.<\/p>\n<p><strong>3. Set vendor access guidelines. <\/strong>You\u2019ll not only want to establish security policies for your employees but also for third party vendors that access your IT infrastructure and data. Otherwise, vendor errors could leave you vulnerable to a data breach that could devastate your business. \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<strong>\u00a0\u00a0<\/strong>\u00a0\u00a0<strong>\u00a0\u00a0\u00a0<\/strong>\u00a0<strong><br \/>\n<\/strong><br \/>\n<strong>4. Create remote access policies. <\/strong>If you have employees who <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/how-to-develop-a-successful-work-from-home-policy\/\" target=\"_blank\" rel=\"noopener\">work from home<\/a> and\/or on the go, you\u2019ll want to ensure that they\u2019re accessing company data using secure methods to minimize the chances of a breach. <a href=\"http:\/\/www.stratospherenetworks.com\/data-security-solutions.html\" target=\"_blank\" rel=\"noopener\">Technologies<\/a> such as secure VPN can allow remote workers to safely access your organization\u2019s private network.<\/p>\n<p><strong>5. Establish mobile use policies. <\/strong>Since Bring Your Own Device (BYOD) has become common in the business world, you\u2019ll also have to set guidelines for workers using smartphones, tablets, and other personal devices. Standard <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/7-things-everyone-should-know-about-mobile-security\/\" target=\"_blank\" rel=\"noopener\">mobile security<\/a> practices such as setting strong passwords and installing antivirus programs on mobile devices are key if you want to cover all of your IT security bases.<\/p>\n<p><strong>6. Craft data transfer policies and data disposal practices. <\/strong>In order to minimize your company\u2019s chances of experiencing a disastrous data breach, you\u2019ll need to consider how everyone who interacts with sensitive information should handle it to keep it safe at all times. That includes establishing proper and secure procedures for the process of transferring data and disposing of it.<\/p>\n<p><strong>7. Create simple security practices.<\/strong> It\u2019s important to provide guidelines for end users concern simple security practices. Some examples include the following:<\/p>\n<ul>\n<li>Make sure that everyone\u2019s passwords clear a minimum threshold of complexity and that they\u2019re changed on a regular basis. A weak password creates an opportunity for cybercriminals to infiltrate your infrastructure.<\/li>\n<li>Do not leave your passwords on sticky notes on your desk or share passwords.<\/li>\n<li>Do not download business data to a thumb drive.<\/li>\n<li>Only access company data from approved company devices.<strong>\u00a0<\/strong><\/li>\n<\/ul>\n<p><strong>8. Ensure end user adoption and policy enforcement. <\/strong>Establishing policies and procedures and conducting regular awareness training sessions serve as the foundation for IT infrastructure security for any organization. However, end user adoption and enforcement of security policies is crucial for success. Conduct spot checks to make sure everyone at your business has adopted and is following your policies.<\/p>\n<p>After successfully creating and enforcing security policies, there\u2019s still plenty of work to be done to make sure your IT infrastructure is fully secure. Come back next week for the next step. In the meantime, if you\u2019d like to learn more about IT security, our expert team can answer your questions. Just give us a call at 877-599-3999 or email <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ensuring your IT infrastructure is protected from cyberattacks is critical for businesses today. Last week, we discussed the importance of safeguarding your infrastructure from the ever-evolving threat of cybercriminals and detailed the first step in the process: Performing a security &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-2099","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>12 Steps to Secure Your IT Infrastructure: Security Policies<\/title>\n<meta name=\"description\" content=\"The second step in the process of securing your IT infrastructure involves creating and enforcing security policies for your organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"12 Steps to Secure Your IT Infrastructure: Security Policies\" \/>\n<meta property=\"og:description\" content=\"The second step in the process of securing your IT infrastructure involves creating and enforcing security policies for your organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-02T14:47:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-08T21:45:44+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/IT-infrastructure-security-300x200.jpg\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"12 Steps to Make Your IT Infrastructure More Secure: Creating and Enforcing IT Security Policies\",\"datePublished\":\"2017-03-02T14:47:51+00:00\",\"dateModified\":\"2022-08-08T21:45:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/\"},\"wordCount\":667,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/\",\"name\":\"12 Steps to Secure Your IT Infrastructure: Security Policies\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2017-03-02T14:47:51+00:00\",\"dateModified\":\"2022-08-08T21:45:44+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"The second step in the process of securing your IT infrastructure involves creating and enforcing security policies for your organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"12 Steps to Make Your IT Infrastructure More Secure: Creating and Enforcing IT Security Policies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"12 Steps to Secure Your IT Infrastructure: Security Policies","description":"The second step in the process of securing your IT infrastructure involves creating and enforcing security policies for your organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/","og_locale":"en_US","og_type":"article","og_title":"12 Steps to Secure Your IT Infrastructure: Security Policies","og_description":"The second step in the process of securing your IT infrastructure involves creating and enforcing security policies for your organization.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2017-03-02T14:47:51+00:00","article_modified_time":"2022-08-08T21:45:44+00:00","og_image":[{"url":"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/IT-infrastructure-security-300x200.jpg","type":"","width":"","height":""}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"12 Steps to Make Your IT Infrastructure More Secure: Creating and Enforcing IT Security Policies","datePublished":"2017-03-02T14:47:51+00:00","dateModified":"2022-08-08T21:45:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/"},"wordCount":667,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/","name":"12 Steps to Secure Your IT Infrastructure: Security Policies","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2017-03-02T14:47:51+00:00","dateModified":"2022-08-08T21:45:44+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"The second step in the process of securing your IT infrastructure involves creating and enforcing security policies for your organization.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"12 Steps to Make Your IT Infrastructure More Secure: Creating and Enforcing IT Security Policies"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2099","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2099"}],"version-history":[{"count":5,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2099\/revisions"}],"predecessor-version":[{"id":5288,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2099\/revisions\/5288"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2099"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}