{"id":2149,"date":"2017-04-20T02:38:19","date_gmt":"2017-04-20T07:38:19","guid":{"rendered":"http:\/\/www.stratospherenetworks.com\/blog\/?p=2149"},"modified":"2022-08-31T17:02:47","modified_gmt":"2022-08-31T22:02:47","slug":"12-steps-make-infrastructure-secure-audit-servers","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/","title":{"rendered":"12 Steps to Make Your IT Infrastructure More Secure: Audit Your Servers"},"content":{"rendered":"<p><a href=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/04\/servers2electricboogaloo.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-2150\" src=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/04\/servers2electricboogaloo-300x214.jpg\" alt=\"server room\" width=\"300\" height=\"214\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/04\/servers2electricboogaloo-300x214.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/04\/servers2electricboogaloo-768x548.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/04\/servers2electricboogaloo-1024x731.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>If you want to maximize IT infrastructure security, you can\u2019t overlook the importance of safeguarding your servers. Earlier in this series, we discussed <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/\" target=\"_blank\" rel=\"noopener noreferrer\">updating individual security measures<\/a> like firewalls for your servers. However, you\u2019ll want to take some additional steps to optimize your operations and make sure your servers are truly safe from evolving <a href=\"http:\/\/www.stratospherenetworks.com\/data-security-solutions.html\" target=\"_blank\" rel=\"noopener noreferrer\">cybersecurity threats<\/a>.<\/p>\n<p>Before we delve deeper into server security, you might want to review the steps we\u2019ve gone over so far in our process for making sure your IT infrastructure is safe. If you\u2019re new to this series or would like to go over a previous step, here they are in order.<\/p>\n<p>1. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-to-make-infrastructure-secure-performing-security-audit\/\" target=\"_blank\" rel=\"noopener noreferrer\">Performing a security audit<\/a><\/p>\n<p>2. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/\" target=\"_blank\" rel=\"noopener noreferrer\">Creating and enforcing IT security policies<\/a><\/p>\n<p>3. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-anti-virus\/\" target=\"_blank\" rel=\"noopener noreferrer\">Updating your anti-virus solution<\/a><\/p>\n<p>4. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Updating workstations and servers<\/a><\/p>\n<p>5. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/\" target=\"_blank\" rel=\"noopener noreferrer\">Guarding your email with a hosted spam solution<\/a><\/p>\n<p>6. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/\" target=\"_blank\" rel=\"noopener noreferrer\">Implementing a hosted DNS solution<\/a><\/p>\n<p>7. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-update-firewall\/\" target=\"_blank\" rel=\"noopener noreferrer\">Updating your firewall<\/a><\/p>\n<p>8. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-backup-solution\/\" target=\"_blank\" rel=\"noopener noreferrer\">Implementing a backup solution<\/a><\/p>\n<h2>IT infrastructure security audit: The importance of server security<\/h2>\n<p><a href=\"http:\/\/www.stratospherenetworks.com\/it-glossary\/server.html\" target=\"_blank\" rel=\"noopener noreferrer\">Servers<\/a> are computers or programs that manage access to a central resource or service in your network. If you want to protect your business from security risks while also achieving minimal downtime and operating as efficiently as possible, proper <a href=\"http:\/\/www.stratospherenetworks.com\/server-support.html\">server support<\/a> and network security are crucial.<\/p>\n<p>As part of your efforts to make sure your overall IT infrastructure is as safe as possible from data breaches and cyberattacks, you\u2019ll want to carry out an audit of your servers, similar to how your organization performed a <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-to-make-infrastructure-secure-performing-security-audit\/\" target=\"_blank\" rel=\"noopener noreferrer\">general security audit<\/a> at the beginning of this process. You\u2019ll need to establish your current level of server security, identify any vulnerabilities, and create an action plan for fixing those weaknesses.<\/p>\n<p>What does auditing the servers truly mean? Consider when you last reviewed the following:<\/p>\n<ul>\n<li>User database<\/li>\n<li>File folder share permissions<\/li>\n<li>Password policies<\/li>\n<li>Updates<\/li>\n<li>Local firewall<\/li>\n<li>Virus protection<\/li>\n<\/ul>\n<p>You\u2019ll want to go over these aspects and more as part of the IT security audit process.<\/p>\n<h2>Cloud server concerns<\/h2>\n<p>If you have <a href=\"http:\/\/www.stratospherenetworks.com\/cloud.html\" target=\"_blank\" rel=\"noopener\">cloud-based<\/a> servers, don\u2019t make the mistake of thinking that you don\u2019t have to worry about <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/security-in-the-cloud-part-1\/\" target=\"_blank\" rel=\"noopener\">information security<\/a>. Just because the cloud is involved doesn\u2019t mean your servers won\u2019t have vulnerabilities that could open you up to data breaches and cyberattacks.<\/p>\n<p>Although public and private clouds are generally secure, you\u2019ll always take on a certain level of risk when it comes to an environment your company doesn\u2019t own. Make sure that you trust your cloud service providers and check to ensure that they have implemented strong security policies. Additionally, if you need to comply with any industry regulations (e.g., HIPAA), it\u2019s important to make sure that cloud computing providers operate in line with those requirements.<\/p>\n<p>Once you\u2019ve audited your servers, you\u2019ll be one step closer to having achieved an optimal level of IT infrastructure security. If you\u2019d like to learn more about how to manage risk related to your servers and how to secure IT infrastructure overall, our <a href=\"https:\/\/www.stratospherenetworks.com\/trusted-advisor.html\" target=\"_blank\" rel=\"noopener\">trusted advisors<\/a> can connect you with leading <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-services.html\" target=\"_blank\" rel=\"noopener\">managed cybersecurity<\/a> service providers in our partner network.<\/p>\n<p>Get started today by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a>\u00a0to schedule a consultation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you want to maximize IT infrastructure security, you can\u2019t overlook the importance of safeguarding your servers. Earlier in this series, we discussed updating individual security measures like firewalls for your servers. However, you\u2019ll want to take some additional steps &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-2149","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>How to secure IT infrastructure: Audit your servers<\/title>\n<meta name=\"description\" content=\"How do you secure your infrastructure? Auditing your servers to identify security risks is a vital step in the process.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to secure IT infrastructure: Audit your servers\" \/>\n<meta property=\"og:description\" content=\"How do you secure your infrastructure? Auditing your servers to identify security risks is a vital step in the process.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-20T07:38:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-31T22:02:47+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/04\/servers2electricboogaloo-300x214.jpg\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"12 Steps to Make Your IT Infrastructure More Secure: Audit Your Servers\",\"datePublished\":\"2017-04-20T07:38:19+00:00\",\"dateModified\":\"2022-08-31T22:02:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/\"},\"wordCount\":536,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/\",\"name\":\"How to secure IT infrastructure: Audit your servers\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2017-04-20T07:38:19+00:00\",\"dateModified\":\"2022-08-31T22:02:47+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"How do you secure your infrastructure? Auditing your servers to identify security risks is a vital step in the process.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"12 Steps to Make Your IT Infrastructure More Secure: Audit Your Servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"How to secure IT infrastructure: Audit your servers","description":"How do you secure your infrastructure? Auditing your servers to identify security risks is a vital step in the process.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/","og_locale":"en_US","og_type":"article","og_title":"How to secure IT infrastructure: Audit your servers","og_description":"How do you secure your infrastructure? Auditing your servers to identify security risks is a vital step in the process.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2017-04-20T07:38:19+00:00","article_modified_time":"2022-08-31T22:02:47+00:00","og_image":[{"url":"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/04\/servers2electricboogaloo-300x214.jpg","type":"","width":"","height":""}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"12 Steps to Make Your IT Infrastructure More Secure: Audit Your Servers","datePublished":"2017-04-20T07:38:19+00:00","dateModified":"2022-08-31T22:02:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/"},"wordCount":536,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/","name":"How to secure IT infrastructure: Audit your servers","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2017-04-20T07:38:19+00:00","dateModified":"2022-08-31T22:02:47+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"How do you secure your infrastructure? Auditing your servers to identify security risks is a vital step in the process.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"12 Steps to Make Your IT Infrastructure More Secure: Audit Your Servers"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2149"}],"version-history":[{"count":4,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2149\/revisions"}],"predecessor-version":[{"id":5346,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2149\/revisions\/5346"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}