{"id":2166,"date":"2017-05-11T10:25:41","date_gmt":"2017-05-11T15:25:41","guid":{"rendered":"http:\/\/www.stratospherenetworks.com\/blog\/?p=2166"},"modified":"2018-06-26T12:03:54","modified_gmt":"2018-06-26T17:03:54","slug":"12-steps-make-infrastructure-secure-adopt-proactive-approach","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/","title":{"rendered":"12 Steps to Make Your IT Infrastructure More Secure: Adopt a Proactive Approach"},"content":{"rendered":"<p><a href=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/IT-infrastructure-security.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-2100\" src=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/IT-infrastructure-security-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/IT-infrastructure-security-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/IT-infrastructure-security-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/IT-infrastructure-security-1024x683.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>If you\u2019ve been following our series on securing your IT infrastructure so far, you\u2019ve already gotten a lot of work done. From performing a security audit to updating your firewall to safeguarding mobile devices, you\u2019ve almost completed our process to ensure you\u2019re as protected as possible from hackers, malware, and data breaches.<\/p>\n<p>If you\u2019re new to this series or if you\u2019d like to go back and review, here are the previous steps in the process:<\/p>\n<p>1. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-to-make-infrastructure-secure-performing-security-audit\/\" target=\"_blank\" rel=\"noopener noreferrer\">Performing a security audit<\/a><\/p>\n<p>2. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/\" target=\"_blank\" rel=\"noopener noreferrer\">Creating and enforcing IT security policies<\/a><\/p>\n<p>3. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-anti-virus\/\" target=\"_blank\" rel=\"noopener noreferrer\">Updating your anti-virus solution<\/a><\/p>\n<p>4. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Updating workstations and servers<\/a><\/p>\n<p>5. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/\" target=\"_blank\" rel=\"noopener noreferrer\">Guarding your email with a hosted spam solution<\/a><\/p>\n<p>6. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/\" target=\"_blank\" rel=\"noopener noreferrer\">Implementing a hosted DNS solution<\/a><\/p>\n<p>7. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-update-firewall\/\" target=\"_blank\" rel=\"noopener noreferrer\">Updating your firewall<\/a><\/p>\n<p>8. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-backup-solution\/\" target=\"_blank\" rel=\"noopener noreferrer\">Implementing a backup solution<\/a><\/p>\n<p>9. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Auditing your servers<\/a><\/p>\n<p>10. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-secure-wifi\/\" target=\"_blank\" rel=\"noopener noreferrer\">Securing your WiFi<\/a><\/p>\n<p>11. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/\" target=\"_blank\" rel=\"noopener noreferrer\">Safeguarding mobile devices<\/a><\/p>\n<p>Once you\u2019ve completed these 11 steps, you\u2019re ready to move on to the final element necessary to secure your IT infrastructure as much as possible: Adopting a proactive approach to IT security.<\/p>\n<p><strong>Why You Need a Proactive Approach<br \/>\n<\/strong>The IT security threat landscape is constantly evolving. Hackers are becoming increasingly crafty, and new malicious programs seeking unauthorized access to sensitive information pop up every day. To effectively defend your organization against ever-changing threats, you\u2019ll need to take action before a data breach occurs. Being <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">reactive rather than proactive<\/a> could lead to disaster for your business because of the following factors:<\/p>\n<p>-The cost per hour in the form of lost productivity if your business loses access to important data<\/p>\n<p>-How a data breach or losing access to data will affect clients and your company\u2019s reputation<\/p>\n<p>-How stolen trade secrets or compromised data could affect your organization<\/p>\n<p>-The amount of time it will take to bounce back from a cyberattack<\/p>\n<p>There are a few steps you should take to proactively protect your business against IT security threats and their potentially devastating effects. If you look to prevent and detect threats before they cause damage to your organization, you\u2019re much less likely to suffer significant damages from a data breach. Here\u2019s what you need to do.<\/p>\n<p><strong>1. Review security practices regularly. <\/strong>Because the IT security threat landscape changes rapidly, you\u2019ll need to continually re-evaluate your security policies and practices to make sure they\u2019re up-to-date. Letting your organization lag behind could leave you vulnerable to new malicious entities seeking access to your infrastructure.<strong><\/p>\n<p>2. Continue awareness training. <\/strong>User errors often lead to data breaches, so it\u2019s crucial to keep every member of your organization up to speed on best security practices. As the threats your business faces evolve, you\u2019ll need to keep educating your employees on how to combat them.<strong><\/p>\n<p>3. Conduct audits on your security practices on an annual basis (at minimum). <\/strong>The very <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-to-make-infrastructure-secure-performing-security-audit\/\" target=\"_blank\" rel=\"noopener noreferrer\">first step<\/a> in our process for securing your IT infrastructure was conducting a security audit. To keep up with evolving cyber threats, you should repeat this step at least once every year. <strong><\/p>\n<p>4. Implement a managed security solution to provide an extra layer of detection and response to threats. <\/strong>Combating rapidly evolving cybersecurity threats can prove challenging, so it can help to turn to a <a href=\"http:\/\/www.stratospherenetworks.com\/data-security-solutions.html\" target=\"_blank\" rel=\"noopener noreferrer\">managed security solution<\/a> to prevent, identify, and combat malware. These solutions can include two factor authentication, next-generation firewalls, security information and event management (SIEM), and more.<\/p>\n<p>Congratulations on completing the Stratosphere Networks process to make sure your IT infrastructure is secure! Although protecting your business from cyberattacks is an ongoing task, it\u2019s easier to fight IT security threats when you\u2019re informed about what you need to do and tackle it proactively. If you have any questions about infrastructure security, don\u2019t hesitate to reach out to our team at Stratosphere Networks by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019ve been following our series on securing your IT infrastructure so far, you\u2019ve already gotten a lot of work done. From performing a security audit to updating your firewall to safeguarding mobile devices, you\u2019ve almost completed our process to &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-2166","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>12 Steps to Secure IT Infrastructure: Proactive Approach<\/title>\n<meta name=\"description\" content=\"The 12th step in the process of securing your IT infrastructure is adopting a proactive rather than reactive approach to cybersecurity going forward.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"12 Steps to Secure IT Infrastructure: Proactive Approach\" \/>\n<meta property=\"og:description\" content=\"The 12th step in the process of securing your IT infrastructure is adopting a proactive rather than reactive approach to cybersecurity going forward.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-11T15:25:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-26T17:03:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"12 Steps to Make Your IT Infrastructure More Secure: Adopt a Proactive Approach\",\"datePublished\":\"2017-05-11T15:25:41+00:00\",\"dateModified\":\"2018-06-26T17:03:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/\"},\"wordCount\":633,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/\",\"name\":\"12 Steps to Secure IT Infrastructure: Proactive Approach\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2017-05-11T15:25:41+00:00\",\"dateModified\":\"2018-06-26T17:03:54+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"The 12th step in the process of securing your IT infrastructure is adopting a proactive rather than reactive approach to cybersecurity going forward.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"12 Steps to Make Your IT Infrastructure More Secure: Adopt a Proactive Approach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"12 Steps to Secure IT Infrastructure: Proactive Approach","description":"The 12th step in the process of securing your IT infrastructure is adopting a proactive rather than reactive approach to cybersecurity going forward.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/","og_locale":"en_US","og_type":"article","og_title":"12 Steps to Secure IT Infrastructure: Proactive Approach","og_description":"The 12th step in the process of securing your IT infrastructure is adopting a proactive rather than reactive approach to cybersecurity going forward.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2017-05-11T15:25:41+00:00","article_modified_time":"2018-06-26T17:03:54+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"12 Steps to Make Your IT Infrastructure More Secure: Adopt a Proactive Approach","datePublished":"2017-05-11T15:25:41+00:00","dateModified":"2018-06-26T17:03:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/"},"wordCount":633,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/","name":"12 Steps to Secure IT Infrastructure: Proactive Approach","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2017-05-11T15:25:41+00:00","dateModified":"2018-06-26T17:03:54+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"The 12th step in the process of securing your IT infrastructure is adopting a proactive rather than reactive approach to cybersecurity going forward.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"12 Steps to Make Your IT Infrastructure More Secure: Adopt a Proactive Approach"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2166"}],"version-history":[{"count":1,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2166\/revisions"}],"predecessor-version":[{"id":2167,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2166\/revisions\/2167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}