{"id":2911,"date":"2019-05-06T13:45:18","date_gmt":"2019-05-06T18:45:18","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=2911"},"modified":"2021-09-09T13:26:29","modified_gmt":"2021-09-09T18:26:29","slug":"penetration-tests-vs-vulnerability-assessments-whats-the-difference","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/","title":{"rendered":"Penetration Tests vs. Vulnerability Assessments: What\u2019s the Difference?"},"content":{"rendered":"<p><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/01\/cybersecurity-concept.jpg\"><img decoding=\"async\" class=\"alignleft wp-image-2765 size-medium\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/01\/cybersecurity-concept-300x200.jpg\" alt=\"cybersecurity concept\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/01\/cybersecurity-concept-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/01\/cybersecurity-concept-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/01\/cybersecurity-concept-1024x683.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><em>Note: This blog post was updated on September 8, 2021.<\/em><\/p>\n<p>Ensuring your\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\" target=\"_blank\" rel=\"nofollow noopener\">cybersecurity measures<\/a>\u00a0are up-to-date and effective is a crucial and ongoing project for any business, regardless of size, location or industry. Cyberattacks continue to occur at a rapid pace: In June 2021, there was 10.7 times more average weekly ransomware activity than the previous year, according to\u00a0the August 2021\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/www.fortinet.com\/content\/dam\/maindam\/PUBLIC\/02_MARKETING\/08_Report\/report-2021-threat%20landscape.pdf\" target=\"_blank\" rel=\"nofollow noopener\">Global Threat Landscape Report<\/a>\u00a0from Fortinet.<\/p>\n<p><a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/it-security-assessment-offering.html\" rel=\"nofollow\">Identifying vulnerabilities<\/a>\u00a0in your IT environment and testing your security posture are both key steps that you should routinely revisit to minimize your organization\u2019s data breach risk. In today&#8217;s world of widespread\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-your-business-needs-a-secure-remote-work-strategy-to-survive\/\" rel=\"nofollow\">remote work<\/a>\u00a0and hybrid workplaces, it&#8217;s more important than ever to invest in cybersecurity and check for weak spots in your network. You might have heard the terms \u201cvulnerability assessment\u201d and \u201cpenetration test\u201d before while researching\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\" target=\"_blank\" rel=\"nofollow noopener\">cybersecurity solutions<\/a>. Sometimes, they get used interchangeably, but it\u2019s important to understand that they are distinct tests involving different techniques, goals and results.<\/p>\n<p>If you\u2019re seeking clarity and would like to understand the distinction between these two cybersecurity tools, the following table explains some of the main ways\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/penetration-testing.html\" target=\"_blank\" rel=\"nofollow noopener\">pen tests<\/a>\u00a0and\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/vulnerability-scans.html\" target=\"_blank\" rel=\"nofollow noopener\">vulnerability assessments<\/a>\u00a0differ from one another. Please keep in mind that this isn\u2019t an exhaustive list.<\/p>\n<h2>How is a Penetration Test Different from a Vulnerability Assessment?<\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-4662\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/05\/2019-assessment-graph-1.jpg\" alt=\"\" width=\"840\" height=\"573\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/05\/2019-assessment-graph-1.jpg 840w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/05\/2019-assessment-graph-1-300x205.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/05\/2019-assessment-graph-1-768x524.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/05\/2019-assessment-graph-1-200x136.jpg 200w\" sizes=\"(max-width: 840px) 100vw, 840px\" \/><\/p>\n<p>If you\u2019d like to learn more about pen tests, vulnerability assessments and other cybersecurity solutions, feel free to contact our team of security analysts. Acting to prevent data breaches is vital for all businesses these days, and we can help you build and maintain a comprehensive cybersecurity strategy. As a managed security service provider (MSSP), we can conduct vulnerability scans and pen testing to identify and address any weak points in your network before cybercriminals get the chance to exploit them.<\/p>\n<p>If you&#8217;d like to lower your risk level, completing our\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/security-risk-assessment-questionnaire.html\" target=\"_blank\" rel=\"nofollow noopener\">security risk assessment questionnaire<\/a>\u00a0takes just 5 minutes and is a great first step toward better security.<\/p>\n<p>For more information, give us a call at 877-599-3999 or email\u00a0<a class=\"external-link\" href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"nofollow noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n<p><strong>Sources:<\/strong><\/p>\n<p><a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/what-is-pen-testing.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Cisco<\/a><\/p>\n<p><a href=\"https:\/\/resources.infosecinstitute.com\/what-is-the-difference-between-penetration-testing-and-vulnerability-assessment\/#gref\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Infosec<\/a><\/p>\n<p><a href=\"https:\/\/www.schellman.com\/blog\/2015\/05\/frequency-of-vulnerability-scans-for-pci-dss\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Schellman<\/a><\/p>\n<p><a href=\"https:\/\/www.techcluesblog.com\/penetration-testing-vs-vulnerability-assessment\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">TechCluesBlog<\/a><\/p>\n<p><a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/penetration-testing\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">TechTarget<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Note: This blog post was updated on September 8, 2021. Ensuring your\u00a0cybersecurity measures\u00a0are up-to-date and effective is a crucial and ongoing project for any business, regardless of size, location or industry. Cyberattacks continue to occur at a rapid pace: In &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":3391,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-2911","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>Penetration Tests vs. Vulnerability Assessments | Chicago IT Support<\/title>\n<meta name=\"description\" content=\"Penetration tests and vulnerability assessments are sometimes referred to as if they\u2019re interchangeable, but they\u2019re distinct cybersecurity tools.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Penetration Tests vs. Vulnerability Assessments | Chicago IT Support\" \/>\n<meta property=\"og:description\" content=\"Penetration tests and vulnerability assessments are sometimes referred to as if they\u2019re interchangeable, but they\u2019re distinct cybersecurity tools.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-06T18:45:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-09T18:26:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"Penetration Tests vs. Vulnerability Assessments: What\u2019s the Difference?\",\"datePublished\":\"2019-05-06T18:45:18+00:00\",\"dateModified\":\"2021-09-09T18:26:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/\"},\"wordCount\":351,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/\",\"name\":\"Penetration Tests vs. Vulnerability Assessments | Chicago IT Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2019-05-06T18:45:18+00:00\",\"dateModified\":\"2021-09-09T18:26:29+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"Penetration tests and vulnerability assessments are sometimes referred to as if they\u2019re interchangeable, but they\u2019re distinct cybersecurity tools.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Penetration Tests vs. Vulnerability Assessments: What\u2019s the Difference?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"Penetration Tests vs. Vulnerability Assessments | Chicago IT Support","description":"Penetration tests and vulnerability assessments are sometimes referred to as if they\u2019re interchangeable, but they\u2019re distinct cybersecurity tools.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/","og_locale":"en_US","og_type":"article","og_title":"Penetration Tests vs. Vulnerability Assessments | Chicago IT Support","og_description":"Penetration tests and vulnerability assessments are sometimes referred to as if they\u2019re interchangeable, but they\u2019re distinct cybersecurity tools.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2019-05-06T18:45:18+00:00","article_modified_time":"2021-09-09T18:26:29+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"Penetration Tests vs. Vulnerability Assessments: What\u2019s the Difference?","datePublished":"2019-05-06T18:45:18+00:00","dateModified":"2021-09-09T18:26:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/"},"wordCount":351,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/","name":"Penetration Tests vs. Vulnerability Assessments | Chicago IT Support","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2019-05-06T18:45:18+00:00","dateModified":"2021-09-09T18:26:29+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"Penetration tests and vulnerability assessments are sometimes referred to as if they\u2019re interchangeable, but they\u2019re distinct cybersecurity tools.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Penetration Tests vs. Vulnerability Assessments: What\u2019s the Difference?"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2911"}],"version-history":[{"count":9,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2911\/revisions"}],"predecessor-version":[{"id":4663,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2911\/revisions\/4663"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}