{"id":2183,"date":"2017-06-09T09:24:22","date_gmt":"2017-06-09T14:24:22","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=2183"},"modified":"2018-06-26T12:03:52","modified_gmt":"2018-06-26T17:03:52","slug":"5-simple-steps-build-business-security-awareness","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/","title":{"rendered":"5 Simple Steps to Build Business IT Security Awareness"},"content":{"rendered":"<p><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/06\/Security-breach-attack.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-2184\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/06\/Security-breach-attack-300x225.jpg\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/06\/Security-breach-attack-300x225.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/06\/Security-breach-attack-768x576.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/06\/Security-breach-attack-1024x768.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>IT security has already become a major concern for businesses around the world and across all industries in recent years. Headlines detailing data breaches have become common, and it\u2019s clear that no company can afford to ignore the potentially devastating consequences (financial and otherwise) of suffering a cyberattack.<\/p>\n<p>The WannaCry ransomware incident last month reminded us all of the importance of staying on top of IT security. The malicious software caused tens of thousands of infections around the world, affecting more than 150 countries, according to the <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA17-132A\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">United States Computer Emergency Readiness Team<\/a>.<\/p>\n<p>Ransomware \u2013 one of the biggest cybersecurity threats businesses have faced in recent years \u2013 is a type of malware that cyber criminals use to encrypt a victim\u2019s files. They will then demand payment in exchange for the decryption key. WannaCry reportedly requested a ransom of approximately $300 U.S., according to US-CERT.<\/p>\n<p>Cybersecurity threats like ransomware can devastate businesses by cutting off access to crucial data, causing downtime and making it impossible for employees to do their jobs. In addition to the potentially high cost per hour of unplanned downtime, a data breach can damage a company\u2019s reputation and lead to regulatory consequences if the organization handles sensitive data (e.g., financial information).<\/p>\n<p><strong>The role of human error in cyberattacks<br \/>\n<\/strong>Cyber criminals frequently try to trick end users into granting them access to sensitive data using tactics like <a href=\"http:\/\/www.stratospherenetworks.com\/what-you-should-know-about-phishing-malware-infographic.html\" target=\"_blank\" rel=\"noopener noreferrer\">phishing<\/a> \u2013 sending emails that imitate legitimate business communications. A 2016 <a href=\"https:\/\/press.malwarebytes.com\/2016\/08\/03\/international-study-finds-nearly-40-percent-of-enterprises-hit-by-ransomware-in-the-last-year\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Malwarebytes report on ransomware<\/a> found that 46% of ransomware attacks worldwide resulted from <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/\" target=\"_blank\" rel=\"noopener noreferrer\">emails<\/a>, typically through malicious attachments or links.<\/p>\n<p>Whether they fail to use strong passwords, click on malicious links in emails, or visit shady websites that harbor malware, end users can inadvertently open the door for hackers and end up causing a costly data breach. That\u2019s why any comprehensive and proactive IT security strategy should include employee awareness training.<\/p>\n<p><strong>What can you do to reduce your risk of a data breach?<\/strong><br \/>\nEmpowering your end users to make the right choices when leveraging different types of technology will lower your risk of data breaches, downtime, and potentially catastrophic business losses. Here are a few steps to get you started:<\/p>\n<p><strong>1. Identify current awareness practices for new staff members and recurring awareness programs performed by IT or HR.<\/strong> Because hackers keep developing new malware and finding novel ways of gaining access to sensitive data, it\u2019s important to make awareness training an ongoing project to keep up with the constantly evolving IT security threat landscape.<\/p>\n<p><strong>2. Identify standard IT practices, policies and standards. <\/strong>If you haven\u2019t already, it\u2019s important to create and <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/\" target=\"_blank\" rel=\"noopener noreferrer\">enforce IT security policies<\/a> to protect your business. These can include the following:<\/p>\n<ul>\n<li>Guidelines for setting up strong passwords (and routinely changing them)<\/li>\n<li>Remote access policies to ensure employees who work from home or on the go access company data using secure methods (e.g., secure VPN).<\/li>\n<li>Policies for onboarding\/offboarding staff members to make sure they\u2019re aware of company security standards and to ensure former employees can\u2019t still access sensitive information.<\/li>\n<li><a href=\"https:\/\/www.stratospherenetworks.com\/backup-and-disaster-recovery.html\" target=\"_blank\" rel=\"noopener noreferrer\">Backup and disaster recovery procedures<\/a> to minimize downtime and avoid data loss.<\/li>\n<\/ul>\n<p><strong>3. Randomly sample your employee pool. <\/strong>Test end users to see how effective your training programs are and to give them practice in avoiding cyberattacks. There are tools companies can leverage to manage these simulated attacks.<\/p>\n<p><strong>4. Work with your <\/strong><a href=\"https:\/\/www.stratospherenetworks.com\/it-managed-services-for-c-level-executives.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>C-Level executives<\/strong><\/a><strong> to ensure they understand the severity of a data breach and the importance of prioritizing <\/strong><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/are-you-reactive-or-proactive-when-it-comes-to-it-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>proactive security efforts<\/strong><\/a><strong>.<\/strong> IT security should have its own budget separate from the general IT bucket, for example. This will not only help your cause but will also drive home the point to all members of your organization that comprehensive IT security is critical.<\/p>\n<p><strong>5. Increase the frequency of awareness training.<\/strong> New types of malware pop up every day, and hackers keep getting more innovative. Make sure your HR department updates everyone in your company on a regular basis on the latest developments in the IT security threat world.<\/p>\n<p>If you\u2019d like to learn more about IT security awareness training and protecting your business from cyberattacks and data breaches, our expert team can help. We offer a wide range of managed security solutions and can answer your questions about anything ranging from email protection to secure data management to endpoint security (and more). Don\u2019t hesitate to call us today at 877-599-3999 or email us at <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT security has already become a major concern for businesses around the world and across all industries in recent years. Headlines detailing data breaches have become common, and it\u2019s clear that no company can afford to ignore the potentially devastating &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-2183","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>5 Simple Steps to Build Business IT Security Awareness<\/title>\n<meta name=\"description\" content=\"Ensuring employee awareness of best IT security practices is a crucial part of reducing your company\u2019s risk of cyberattacks and data breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Simple Steps to Build Business IT Security Awareness\" \/>\n<meta property=\"og:description\" content=\"Ensuring employee awareness of best IT security practices is a crucial part of reducing your company\u2019s risk of cyberattacks and data breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-09T14:24:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-26T17:03:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"5 Simple Steps to Build Business IT Security Awareness\",\"datePublished\":\"2017-06-09T14:24:22+00:00\",\"dateModified\":\"2018-06-26T17:03:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/\"},\"wordCount\":741,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/\",\"name\":\"5 Simple Steps to Build Business IT Security Awareness\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2017-06-09T14:24:22+00:00\",\"dateModified\":\"2018-06-26T17:03:52+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"Ensuring employee awareness of best IT security practices is a crucial part of reducing your company\u2019s risk of cyberattacks and data breaches.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Simple Steps to Build Business IT Security Awareness\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"5 Simple Steps to Build Business IT Security Awareness","description":"Ensuring employee awareness of best IT security practices is a crucial part of reducing your company\u2019s risk of cyberattacks and data breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/","og_locale":"en_US","og_type":"article","og_title":"5 Simple Steps to Build Business IT Security Awareness","og_description":"Ensuring employee awareness of best IT security practices is a crucial part of reducing your company\u2019s risk of cyberattacks and data breaches.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2017-06-09T14:24:22+00:00","article_modified_time":"2018-06-26T17:03:52+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"5 Simple Steps to Build Business IT Security Awareness","datePublished":"2017-06-09T14:24:22+00:00","dateModified":"2018-06-26T17:03:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/"},"wordCount":741,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/","name":"5 Simple Steps to Build Business IT Security Awareness","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2017-06-09T14:24:22+00:00","dateModified":"2018-06-26T17:03:52+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"Ensuring employee awareness of best IT security practices is a crucial part of reducing your company\u2019s risk of cyberattacks and data breaches.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-simple-steps-build-business-security-awareness\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"5 Simple Steps to Build Business IT Security Awareness"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2183"}],"version-history":[{"count":3,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2183\/revisions"}],"predecessor-version":[{"id":2187,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2183\/revisions\/2187"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}