{"id":2840,"date":"2019-03-26T12:55:55","date_gmt":"2019-03-26T17:55:55","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=2840"},"modified":"2019-03-26T12:55:55","modified_gmt":"2019-03-26T17:55:55","slug":"are-your-teams-smartphones-secure","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/","title":{"rendered":"Are Your Team\u2019s Smartphones Secure?"},"content":{"rendered":"<p><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/03\/smartphone-security.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-2841\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/03\/smartphone-security-300x200.jpg\" alt=\"smartphone security breach warning\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/03\/smartphone-security-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/03\/smartphone-security-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/03\/smartphone-security-1024x683.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>At this point, we\u2019re all aware of the serious threat that <a href=\"https:\/\/www.stratospherenetworks.com\/5-big-it-security-concerns-for-businesses-in-2019.html\" target=\"_blank\" rel=\"noopener\">cybercrime<\/a> poses to businesses of all kinds around the world. Data breach discoveries still pop up in the news, and hackers are only getting craftier. Taking proactive steps to <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-to-make-infrastructure-secure-performing-security-audit\/\" target=\"_blank\" rel=\"noopener\">secure your IT infrastructure<\/a> is a must.<\/p>\n<p>That includes not only safeguarding workstations and servers but also any mobile devices that your team members use for work-related tasks. Many companies have embraced the <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/best-practices-for-byod\/\" target=\"_blank\" rel=\"noopener\">Bring Your Own Device (BYOD)<\/a> phenomenon, as it\u2019s convenient and contains tech costs. The U.S. BYOD market is expected to reach $350 billion by 2022, according to research from <a href=\"https:\/\/www.marketwatch.com\/press-release\/bring-your-own-device-market-in-united-states-to-grow-at-15-cagr-till-2022-growth-trends-innovation-regional-analysis-major-companies-alcatel-lucent-enterprise-aruba-avaya-cisco-2019-02-26\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Global Market Insights<\/a>.<\/p>\n<p><strong>Mobile Malware: Why You Should Worry<\/strong><br \/>\nHowever, more mobile devices in the workplace also means more IT security vulnerabilities. Mobile malware is a significant threat. In 2017, for instance, <a href=\"https:\/\/www.symantec.com\/security-center\/threat-report\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Symantec recorded<\/a> a 54 percent increase in new mobile malware variants.<\/p>\n<p>Similarly, in 2018, <a href=\"https:\/\/securelist.com\/mobile-malware-evolution-2018\/89689\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Kaspersky Lab<\/a> products and technologies detected 151,359 new mobile banking Trojans, 60,176 new mobile ransomware Trojans, and more than 5 million malicious installation packages.<\/p>\n<p>\u201cUsers of mobile devices in 2018 faced what could be the strongest cybercriminal onslaught ever seen,\u201d writes Victor Chebyshev in the Kaspersky malware report \u201c<a href=\"https:\/\/securelist.com\/mobile-malware-evolution-2018\/89689\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Mobile malware evolution 2018<\/a>.\u201d<\/p>\n<p><strong>Securing Your Team\u2019s Smartphones: 4 Essential Steps<\/strong><br \/>\nIt seems unlikely that barrage of mobile malware will stop in 2019 (or in the following years). Luckily, there are <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/\" target=\"_blank\" rel=\"noopener\">steps you can take<\/a> to minimize the chances of a data breach related to mobile devices.<\/p>\n<p><strong>1. Ensure everyone has set up a strong PIN\/password for their devices. <\/strong>Locking your smartphone and other mobile devices in some way (whether that involves a PIN or fingerprint\/face scanning) will make it less likely that someone else will be able to access the data on it if it gets lost or stolen, according to the Wired article \u201cSmartphone Security 101: The Steps That Matter Most.\u201d<\/p>\n<p><strong>2. Implement proper Mobile Device Management (MDM).<\/strong> This is the No. 1 recommended method for protecting smartphones. An MDM solution allows for centralized management of mobile devices, according to <a href=\"https:\/\/www.webroot.com\/us\/en\/resources\/tips-articles\/mobile-device-management-do-you-need-it\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Webroot<\/a>. Usually, MDM software will allow for the enforcement of security policies, automatic cloud-based updates, remote monitoring and configuration, and logging and reporting for compliance, among other features. \u00a0<strong>\u00a0\u00a0<\/strong><\/p>\n<p><strong>3. Create a plan of action in case something goes wrong. <\/strong>This involves asking what you would do if a device with sensitive data on it gets lost or stolen, if an employee uses their smartphone or another mobile device to access a non-secure network, or if an employee leaves the company and takes mobile devices containing corporate data with them.<\/p>\n<p><strong>4. Secure your WiFi. <\/strong>Safeguarding your WiFi against unauthorized access will also protect your team\u2019s mobile devices while they\u2019re at work. This involves taking steps like using strong passwords and updating firmware regularly. Learn more by reading this <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-secure-wifi\/\" target=\"_blank\" rel=\"noopener\">blog entry on securing your WiFi<\/a>. You should also advise your employees not to connect to unsecured networks (e.g., public WiFi) when using phones and other mobile devices with company data on them.<\/p>\n<p>If you\u2019d like to learn more about what you can do to keep mobile devices and the rest of your company\u2019s IT environment secure, our team of cybersecurity experts would be happy to help. We have experience with various <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\" target=\"_blank\" rel=\"noopener\">cybersecurity solutions<\/a> from vendors in our partner network (in addition to offering our own multilayered IT security solution) and can help you decide which services and products would best fit your organization\u2019s specific needs.<\/p>\n<p>For more information, call 877-599-3999 or email <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At this point, we\u2019re all aware of the serious threat that cybercrime poses to businesses of all kinds around the world. Data breach discoveries still pop up in the news, and hackers are only getting craftier. Taking proactive steps to &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-2840","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>Are Your Team\u2019s Smartphones Secure? | Chicago IT Support<\/title>\n<meta name=\"description\" content=\"Mobile malware is a growing IT security threat, so it\u2019s essential to safeguard mobile devices. These tips can help keep your team\u2019s smartphones secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are Your Team\u2019s Smartphones Secure? | Chicago IT Support\" \/>\n<meta property=\"og:description\" content=\"Mobile malware is a growing IT security threat, so it\u2019s essential to safeguard mobile devices. These tips can help keep your team\u2019s smartphones secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-26T17:55:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"Are Your Team\u2019s Smartphones Secure?\",\"datePublished\":\"2019-03-26T17:55:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/\"},\"wordCount\":582,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/\",\"name\":\"Are Your Team\u2019s Smartphones Secure? | Chicago IT Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2019-03-26T17:55:55+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"Mobile malware is a growing IT security threat, so it\u2019s essential to safeguard mobile devices. These tips can help keep your team\u2019s smartphones secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are Your Team\u2019s Smartphones Secure?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"Are Your Team\u2019s Smartphones Secure? | Chicago IT Support","description":"Mobile malware is a growing IT security threat, so it\u2019s essential to safeguard mobile devices. These tips can help keep your team\u2019s smartphones secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/","og_locale":"en_US","og_type":"article","og_title":"Are Your Team\u2019s Smartphones Secure? | Chicago IT Support","og_description":"Mobile malware is a growing IT security threat, so it\u2019s essential to safeguard mobile devices. These tips can help keep your team\u2019s smartphones secure.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2019-03-26T17:55:55+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"Are Your Team\u2019s Smartphones Secure?","datePublished":"2019-03-26T17:55:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/"},"wordCount":582,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/","name":"Are Your Team\u2019s Smartphones Secure? | Chicago IT Support","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2019-03-26T17:55:55+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"Mobile malware is a growing IT security threat, so it\u2019s essential to safeguard mobile devices. These tips can help keep your team\u2019s smartphones secure.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Are Your Team\u2019s Smartphones Secure?"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2840"}],"version-history":[{"count":3,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2840\/revisions"}],"predecessor-version":[{"id":2844,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2840\/revisions\/2844"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}