{"id":2437,"date":"2018-03-29T09:00:32","date_gmt":"2018-03-29T14:00:32","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=2437"},"modified":"2018-06-26T12:03:39","modified_gmt":"2018-06-26T17:03:39","slug":"ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/","title":{"rendered":"DDoS Attack Facts: Answers to 4 Essential Questions in the Wake of the GitHub Incident"},"content":{"rendered":"<p><a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\">IT security<\/a> is still a big concern for businesses across all industries as hackers continue to develop new strategies for carrying out cyberattacks. Recently, distributed denial of service (DDoS) attacks have made headlines. On February 28, <a href=\"https:\/\/githubengineering.com\/ddos-incident-report\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">GitHub.com was unavailable<\/a> as the result of a DDoS attack that flooded the developer platform with 1.35 terabits per second of traffic \u2013 the biggest DDoS incident recorded so far, <a href=\"https:\/\/www.wired.com\/story\/github-ddos-memcached\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">according to Wired<\/a>.<\/p>\n<p><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2018\/03\/ddos_graphic-1.jpg\"><img decoding=\"async\" class=\"size-full wp-image-2440 aligncenter\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2018\/03\/ddos_graphic-1.jpg\" alt=\"\" width=\"800\" height=\"304\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2018\/03\/ddos_graphic-1.jpg 800w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2018\/03\/ddos_graphic-1-300x114.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2018\/03\/ddos_graphic-1-768x292.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><br \/>\n<\/a>After hearing about the GitHub attack, you might be wondering if you should be worried about hackers targeting your organization using a similar method. These FAQs can help you gain a better understanding of this type of cyberattack and learn how to lower your risk of becoming a target.<\/p>\n<p><strong>1. What is a DDoS attack? <\/strong>A DDoS attack involves bombarding a server with data requests from numerous compromised systems, according to <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/what-is-a-ddos-attack.html\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Cisco<\/a>. The goal is to crash the server and the target\u2019s system so that they\u2019re not able to provide services\/do business.<\/p>\n<p>There are a number of reasons why hackers might carry out a DDoS attack against an organization. They might have political motivations or plan to extort money from the target, Cisco explains. Additionally, the hackers might work for a rival business that wants to take out the competition.<\/p>\n<p>&nbsp;<\/p>\n<p>Although DDoS attacks have been around for a while, they\u2019ve become more common and sophisticated in recent years due to the rise of the cloud, Internet of Things, and other advancements in Internet connections, according to a 2017 report from <a href=\"http:\/\/info.corero.com\/rs\/258-JCF-941\/images\/2017-q2q3-ddos-trends-report.pdf\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Corero Network Security<\/a>. In the third quarter of 2017, the report states monthly DDoS attack attempts increased by 91% compared to the first quarter.\u00a0 \u00a0<strong><\/p>\n<p>2. Why was the GitHub attack a big deal? <\/strong>The digital assault on GitHub was not only the largest DDoS attack recorded so far but also exemplified a different denial of service technique, according to the <a href=\"https:\/\/www.csoonline.com\/article\/3222095\/network-security\/ddos-explained-how-denial-of-service-attacks-are-evolving.html\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">security news source CSO<\/a>.<\/p>\n<p>DDoS attacks typically use \u201cbotnets,\u201d or networks of hacked computers and other devices that cybercriminals can leverage as an army of \u201czombie machines,\u201d according to <a href=\"https:\/\/usa.kaspersky.com\/resource-center\/threats\/botnet-attacks\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Kapersky Lab<\/a>. Hackers can create, buy, and\/or rent botnets to perpetrate DDoS attacks as well as other types of cyberattacks.<\/p>\n<p>The GitHub attack didn\u2019t use a botnet. Instead, the cybercriminals behind the incident exploited servers that use the Memcached memory caching system, according to CSO. Servers running Memcached are supposed to be protected and part of internal networks, so the system doesn\u2019t have strong defenses against hackers looking to spoof IP addresses and get servers to send out large amounts of data as part of a DDoS attack. However, thousands of Memcached servers are exposed to the open Internet and have as a result become tools for cybercriminals.\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<strong><\/p>\n<p>3. Should I be worried about hackers targeting my organization with DDoS attacks? <\/strong>DDoS attacks target large organizations 98% of the time, according to <a href=\"http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Verizon\u2019s 2017 Data Breach Investigations Report<\/a>. Still, because cybercriminals carry out these types of attacks for various reasons, all organizations of all sizes and across all industries should ensure they have a comprehensive and <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/\" target=\"_blank\" rel=\"noopener\">proactive cybersecurity strategy<\/a> in place to protect against DDoS attacks and other kinds of cybercrime. <strong><\/p>\n<p>4. How can I protect myself from these types of attacks? <\/strong>As part of your comprehensive IT security policies and solutions, you should have DDoS mitigation services in place to stop any attacks before they start, according to Verizon. It\u2019s also crucial to test them on a regular basis to ensure they actually work. Real-time threat detection, proactive monitoring, and other IT security solutions can help your organization lower its risk of experiencing downtime due to a DDoS attack.<\/p>\n<p>If you\u2019d like to learn more about <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\" target=\"_blank\" rel=\"noopener\">cybersecurity solutions<\/a>, feel free to contact our expert team. We work with a wide range of IT security offerings from various providers. Our experience, partner network and vendor agnostic approach allow us to serve as a trusted advisor to businesses seeking solutions that fulfill their unique needs. Feel free to call us at 877-599-3999 or email <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT security is still a big concern for businesses across all industries as hackers continue to develop new strategies for carrying out cyberattacks. Recently, distributed denial of service (DDoS) attacks have made headlines. On February 28, GitHub.com was unavailable as &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-2437","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>DDoS Attack Facts: Answers to 4 Essential Questions<\/title>\n<meta name=\"description\" content=\"In the wake of the biggest distributed denial of service (DDoS) attack on record, here are the answers to some essential questions about this type of cyberattack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS Attack Facts: Answers to 4 Essential Questions\" \/>\n<meta property=\"og:description\" content=\"In the wake of the biggest distributed denial of service (DDoS) attack on record, here are the answers to some essential questions about this type of cyberattack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-29T14:00:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-26T17:03:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"DDoS Attack Facts: Answers to 4 Essential Questions in the Wake of the GitHub Incident\",\"datePublished\":\"2018-03-29T14:00:32+00:00\",\"dateModified\":\"2018-06-26T17:03:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/\"},\"wordCount\":679,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/\",\"name\":\"DDoS Attack Facts: Answers to 4 Essential Questions\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2018-03-29T14:00:32+00:00\",\"dateModified\":\"2018-06-26T17:03:39+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"In the wake of the biggest distributed denial of service (DDoS) attack on record, here are the answers to some essential questions about this type of cyberattack.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DDoS Attack Facts: Answers to 4 Essential Questions in the Wake of the GitHub Incident\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"DDoS Attack Facts: Answers to 4 Essential Questions","description":"In the wake of the biggest distributed denial of service (DDoS) attack on record, here are the answers to some essential questions about this type of cyberattack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/","og_locale":"en_US","og_type":"article","og_title":"DDoS Attack Facts: Answers to 4 Essential Questions","og_description":"In the wake of the biggest distributed denial of service (DDoS) attack on record, here are the answers to some essential questions about this type of cyberattack.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2018-03-29T14:00:32+00:00","article_modified_time":"2018-06-26T17:03:39+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"DDoS Attack Facts: Answers to 4 Essential Questions in the Wake of the GitHub Incident","datePublished":"2018-03-29T14:00:32+00:00","dateModified":"2018-06-26T17:03:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/"},"wordCount":679,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/","name":"DDoS Attack Facts: Answers to 4 Essential Questions","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2018-03-29T14:00:32+00:00","dateModified":"2018-06-26T17:03:39+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"In the wake of the biggest distributed denial of service (DDoS) attack on record, here are the answers to some essential questions about this type of cyberattack.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/ddos-attack-facts-answers-to-4-essential-questions-in-the-wake-of-the-github-incident\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"DDoS Attack Facts: Answers to 4 Essential Questions in the Wake of the GitHub Incident"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2437"}],"version-history":[{"count":4,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2437\/revisions"}],"predecessor-version":[{"id":2443,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2437\/revisions\/2443"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}