{"id":2128,"date":"2017-03-30T08:55:23","date_gmt":"2017-03-30T13:55:23","guid":{"rendered":"http:\/\/www.stratospherenetworks.com\/blog\/?p=2128"},"modified":"2018-06-26T12:03:57","modified_gmt":"2018-06-26T17:03:57","slug":"12-steps-make-infrastructure-secure-implement-hosted-dns-solution","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/","title":{"rendered":"12 Steps to Make Your IT Infrastructure More Secure: Implement a Hosted DNS Solution"},"content":{"rendered":"<p><a href=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/DNS-filtering.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-2129\" src=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/DNS-filtering-300x225.jpg\" alt=\"DNS filtering\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/DNS-filtering-300x225.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/DNS-filtering-768x576.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/DNS-filtering-1024x768.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/DNS-filtering.jpg 2000w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>At this point, you\u2019re nearly halfway done with the process of making sure your IT infrastructure is secure. The sixth step involves leveraging a hosted DNS solution as an extra layer of prevention against cybersecurity threats like malware.<\/p>\n<p>If you haven\u2019t been following our series of blogs on protecting your IT infrastructure, you might want to review the first five steps of the process:<\/p>\n<p>1. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-to-make-infrastructure-secure-performing-security-audit\/\" target=\"_blank\">Performing a security audit<\/a><\/p>\n<p>2. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/\" target=\"_blank\">Creating and enforcing IT security policies<\/a><\/p>\n<p>3. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-anti-virus\/\" target=\"_blank\">Updating your anti-virus solution<\/a><\/p>\n<p>4. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/\" target=\"_blank\">Updating workstations and servers<\/a><\/p>\n<p>5. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/\" target=\"_blank\">Guarding your email with a hosted spam solution<\/a><strong><\/p>\n<p>Why you should leverage a DNS filtering solution<br \/>\n<\/strong>When we detailed guarding your email with a hosted spam solution, we discussed how end users can accidentally open the door to hackers and expose sensitive data by clicking on links in or downloading attachments from malicious emails.<\/p>\n<p>Similarly, end users can unintentionally expose your IT infrastructure to cybercriminals if they visit websites that infect their PCs with malware. If that happens, the malicious programs could go on to affect other machines and impact your company\u2019s entire network.<\/p>\n<p>A hosted Domain Name System (DNS) solution plays an important role in preventing this scenario from occurring. Although some companies have internal firewalls that can filter which websites end users can visit, this function might not be set up, require a subscription, or fall short of being able to identify all <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/4-inexpensive-ways-to-enhance-it-security\/\" target=\"_blank\">security threats<\/a>. A hosted DNS filtering solution acts as an extra line of defense against malicious programs and hackers<\/p>\n<p><strong>How DNS filtering works<br \/>\n<\/strong>A hosted DNS filtering solution protects your business from malware lurking on the Web by filtering particular websites. It might block Web pages that contain specific keywords or that fall into certain categories. With a DNS solution in place, end users won\u2019t be able to visit risky websites where they could inadvertently pick up malware and expose your IT infrastructure to cybercriminals. This can also have the added benefit of preventing your employees from getting distracted and spending their time browsing sites that aren\u2019t related to their work.<\/p>\n<p>A DNS filtering solution also adds business value in the following ways.<\/p>\n<ul>\n<li>Decreasing end user downtime due to prevention of threats.<\/li>\n<li>Providing access to additional metrics and reports on cloud application and website utilization, which can help you make technology decisions.<\/li>\n<li>Human Resources might have an interest in employees\u2019 online activities.<\/li>\n<\/ul>\n<p>Implementing a DNS solution as a preventive measure to protect your IT infrastructure can be simple and stress free for your business if you go through a managed service provider. At Stratosphere Networks, we provide hosted DNS as part of our threat intelligence and management services as a comprehensive <a href=\"http:\/\/www.stratospherenetworks.com\/data-security-solutions.html\" target=\"_blank\">managed security service provider<\/a>.<\/p>\n<p>Once you have a hosted DNS solution in place, you\u2019re halfway done with your journey to safeguard your IT infrastructure from cyber threats. Check back with us next week for step 7. In the meantime, if you\u2019d like to know more about hosted DNS, our expert techs can answer any questions you might have. Contact us today at 877-599-3999 or <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At this point, you\u2019re nearly halfway done with the process of making sure your IT infrastructure is secure. The sixth step involves leveraging a hosted DNS solution as an extra layer of prevention against cybersecurity threats like malware. If you &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-2128","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>12 Steps to Secure IT Infrastructure: Hosted DNS Solution<\/title>\n<meta name=\"description\" content=\"The sixth step in the process of securing your IT infrastructure is leveraging a hosted DNS solution to filter Web content and guard against malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"12 Steps to Secure IT Infrastructure: Hosted DNS Solution\" \/>\n<meta property=\"og:description\" content=\"The sixth step in the process of securing your IT infrastructure is leveraging a hosted DNS solution to filter Web content and guard against malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-30T13:55:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-26T17:03:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"12 Steps to Make Your IT Infrastructure More Secure: Implement a Hosted DNS Solution\",\"datePublished\":\"2017-03-30T13:55:23+00:00\",\"dateModified\":\"2018-06-26T17:03:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/\"},\"wordCount\":525,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/\",\"name\":\"12 Steps to Secure IT Infrastructure: Hosted DNS Solution\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2017-03-30T13:55:23+00:00\",\"dateModified\":\"2018-06-26T17:03:57+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"The sixth step in the process of securing your IT infrastructure is leveraging a hosted DNS solution to filter Web content and guard against malware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"12 Steps to Make Your IT Infrastructure More Secure: Implement a Hosted DNS Solution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"12 Steps to Secure IT Infrastructure: Hosted DNS Solution","description":"The sixth step in the process of securing your IT infrastructure is leveraging a hosted DNS solution to filter Web content and guard against malware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/","og_locale":"en_US","og_type":"article","og_title":"12 Steps to Secure IT Infrastructure: Hosted DNS Solution","og_description":"The sixth step in the process of securing your IT infrastructure is leveraging a hosted DNS solution to filter Web content and guard against malware.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2017-03-30T13:55:23+00:00","article_modified_time":"2018-06-26T17:03:57+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"12 Steps to Make Your IT Infrastructure More Secure: Implement a Hosted DNS Solution","datePublished":"2017-03-30T13:55:23+00:00","dateModified":"2018-06-26T17:03:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/"},"wordCount":525,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/","name":"12 Steps to Secure IT Infrastructure: Hosted DNS Solution","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2017-03-30T13:55:23+00:00","dateModified":"2018-06-26T17:03:57+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"The sixth step in the process of securing your IT infrastructure is leveraging a hosted DNS solution to filter Web content and guard against malware.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"12 Steps to Make Your IT Infrastructure More Secure: Implement a Hosted DNS Solution"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2128"}],"version-history":[{"count":1,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2128\/revisions"}],"predecessor-version":[{"id":2130,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2128\/revisions\/2130"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}