{"id":2122,"date":"2017-03-23T07:55:56","date_gmt":"2017-03-23T12:55:56","guid":{"rendered":"http:\/\/www.stratospherenetworks.com\/blog\/?p=2122"},"modified":"2020-10-21T15:14:04","modified_gmt":"2020-10-21T20:14:04","slug":"12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/","title":{"rendered":"12 Steps to Make Your IT Infrastructure More Secure: Guard Your Email With a Hosted Spam Solution"},"content":{"rendered":"<p><a href=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/email.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-2123\" src=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/email-300x240.jpg\" alt=\"Hosted spam solution\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/email-300x240.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/email-768x614.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/email-1024x819.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/email.jpg 1936w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Welcome back to our blog series on making your IT infrastructure more secure. If you\u2019ve been following along for the past several weeks, you\u2019ve already read our entries on the first four steps in the process: <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-to-make-infrastructure-secure-performing-security-audit\/\" target=\"_blank\" rel=\"noopener noreferrer\">Performing a security audit<\/a>, creating and enforcing <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/\" target=\"_blank\" rel=\"noopener noreferrer\">IT security policies<\/a>, <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-anti-virus\/\" target=\"_blank\" rel=\"noopener noreferrer\">updating your anti-virus solution<\/a>, and <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/\" target=\"_blank\" rel=\"noopener noreferrer\">updating workstations and servers<\/a>. The next step is protecting your email with a hosted spam solution.<\/p>\n<p>If you\u2019re one of the many office workers who spends your days fielding dozens of incoming emails, you\u2019re already familiar with the concept of spam. Email is an increasingly common mode of communication: The average business user is expected to send and receive upwards of 126 messages each day by 2019, according to a report from <a href=\"http:\/\/www.radicati.com\/wp\/wp-content\/uploads\/2015\/02\/Email-Statistics-Report-2015-2019-Executive-Summary.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">The Radicati Group<\/a>.<\/p>\n<p>Cyber criminals take advantage of the popularity of email, crafting messages that imitate legitimate correspondence to trick recipients into granting access to sensitive data (a tactic known as \u201c<a href=\"http:\/\/www.stratospherenetworks.com\/what-you-should-know-about-phishing-malware-infographic.html\" target=\"_blank\" rel=\"noopener noreferrer\">phishing<\/a>\u201d).<\/p>\n<p>You might think that <a href=\"https:\/\/www.stratospherenetworks.com\/how-to-spot-spam-in-your-inbox.html\" target=\"_blank\" rel=\"noopener noreferrer\">spotting spam<\/a> and evading hackers\u2019 tricks is easy for most people, but it\u2019s often difficult to correctly identify 100% of the phishing attacks that can end up in your inbox. A quiz <a href=\"https:\/\/blogs.mcafee.com\/consumer\/phishing-quiz-results\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Intel Security<\/a> developed that tested consumers\u2019 ability to discern whether each of a set of 10 emails was genuine or malicious found that only 3% of the quiz takers got a perfect score. The majority (80%) guessed wrong about at least one of the emails.<\/p>\n<p>If even one employee falls for an email scam and clicks on a malicious link or downloads an attachment containing malware, the fallout could be significant and costly for your company. A <a href=\"https:\/\/blog.cloudmark.com\/wp-content\/uploads\/2016\/01\/cloudmark_survey_infographic.png\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Cloudmark survey<\/a> of enterprises that were victims of targeted \u201c<a href=\"http:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">spear phishing<\/a>\u201d attacks found that 43% suffered a drop in productivity, 29% experienced reputation damage, and 15% saw their stock prices decline as a result.<\/p>\n<p>Fortunately, businesses don\u2019t have to depend on users\u2019 judgment alone to protect against malicious spam messages. A <a href=\"http:\/\/www.stratospherenetworks.com\/email-spam.html\" target=\"_blank\" rel=\"noopener noreferrer\">hosted spam solution<\/a> can block spam and cyberattacks before they reach your company\u2019s network. Having this form of email protection in place is essential if you want to achieve the maximum level of security for your IT infrastructure and minimize your risk of data breaches as much as possible.<\/p>\n<p>Here are some of the characteristics of a hosted spam filter solution:<\/p>\n<ul>\n<li>Can be layered on top of your company\u2019s hosted email services<\/li>\n<li>Can feature customized settings to meet your organization\u2019s unique needs<\/li>\n<li>Allows you to blacklist and whitelist certain domains, in addition to blocking spam and cyber threats<\/li>\n<\/ul>\n<p>Once you\u2019ve secured your email with a hosted spam filter solution, you\u2019re one step closer to achieving optimal security for your overall IT infrastructure. Come back next week to learn what comes next in the process.<\/p>\n<p>In the meantime, if you\u2019d like to find out more about hosted spam solutions, feel free to contact our expert team at 877-599-3999 or <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">sales@stratospherenetworks.com<\/a>. We offer hosted spam solutions (in addition to other <a href=\"http:\/\/www.stratospherenetworks.com\/email-spam.html\" target=\"_blank\" rel=\"noopener noreferrer\">email migration and anti-spam offerings<\/a>) and can answer any questions you have about protecting your business from malicious email-related attacks like spear phishing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome back to our blog series on making your IT infrastructure more secure. If you\u2019ve been following along for the past several weeks, you\u2019ve already read our entries on the first four steps in the process: Performing a security audit, &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-2122","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>12 Steps to Secure IT Infrastructure: Hosted Spam Solution<\/title>\n<meta name=\"description\" content=\"The fifth step in the process of securing your IT infrastructure is implementing a hosted spam solution to protect against phishing and other email scams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"12 Steps to Secure IT Infrastructure: Hosted Spam Solution\" \/>\n<meta property=\"og:description\" content=\"The fifth step in the process of securing your IT infrastructure is implementing a hosted spam solution to protect against phishing and other email scams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-23T12:55:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-21T20:14:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"12 Steps to Make Your IT Infrastructure More Secure: Guard Your Email With a Hosted Spam Solution\",\"datePublished\":\"2017-03-23T12:55:56+00:00\",\"dateModified\":\"2020-10-21T20:14:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/\"},\"wordCount\":532,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/\",\"name\":\"12 Steps to Secure IT Infrastructure: Hosted Spam Solution\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2017-03-23T12:55:56+00:00\",\"dateModified\":\"2020-10-21T20:14:04+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"The fifth step in the process of securing your IT infrastructure is implementing a hosted spam solution to protect against phishing and other email scams.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"12 Steps to Make Your IT Infrastructure More Secure: Guard Your Email With a Hosted Spam Solution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"12 Steps to Secure IT Infrastructure: Hosted Spam Solution","description":"The fifth step in the process of securing your IT infrastructure is implementing a hosted spam solution to protect against phishing and other email scams.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/","og_locale":"en_US","og_type":"article","og_title":"12 Steps to Secure IT Infrastructure: Hosted Spam Solution","og_description":"The fifth step in the process of securing your IT infrastructure is implementing a hosted spam solution to protect against phishing and other email scams.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2017-03-23T12:55:56+00:00","article_modified_time":"2020-10-21T20:14:04+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"12 Steps to Make Your IT Infrastructure More Secure: Guard Your Email With a Hosted Spam Solution","datePublished":"2017-03-23T12:55:56+00:00","dateModified":"2020-10-21T20:14:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/"},"wordCount":532,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/","name":"12 Steps to Secure IT Infrastructure: Hosted Spam Solution","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2017-03-23T12:55:56+00:00","dateModified":"2020-10-21T20:14:04+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"The fifth step in the process of securing your IT infrastructure is implementing a hosted spam solution to protect against phishing and other email scams.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"12 Steps to Make Your IT Infrastructure More Secure: Guard Your Email With a Hosted Spam Solution"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2122"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2122\/revisions"}],"predecessor-version":[{"id":3943,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2122\/revisions\/3943"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}