{"id":2958,"date":"2019-06-04T08:51:43","date_gmt":"2019-06-04T13:51:43","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=2958"},"modified":"2019-05-31T14:38:39","modified_gmt":"2019-05-31T19:38:39","slug":"what-to-do-after-a-data-breach","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/","title":{"rendered":"What to Do After a Data Breach"},"content":{"rendered":"<p><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/06\/data-breach-stock-photo.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-2963\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/06\/data-breach-stock-photo-300x200.jpg\" alt=\"cyber attack data breach illustration\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/06\/data-breach-stock-photo-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/06\/data-breach-stock-photo-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/06\/data-breach-stock-photo-1024x683.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>If you haven\u2019t already experienced a data breach, odds are good that you will soon. In the fiscal year 2018, more than half (58 percent) of small and medium-sized businesses experienced a data breach, according to <a href=\"https:\/\/keepersecurity.com\/assets\/pdf\/Keeper-2018-Ponemon-Report.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">a report<\/a> from the Ponemon Institute and Keeper Security. <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/5-types-of-hackers-businesses-should-know-about\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hackers<\/a> develop new techniques and release new malware daily, making it difficult to keep <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\" target=\"_blank\" rel=\"noopener noreferrer\">IT security defenses<\/a> up-to-date.<\/p>\n<p>Preventing breaches from occurring in the first place with a <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/\" target=\"_blank\" rel=\"noopener noreferrer\">proactive and comprehensive approach<\/a> to cybersecurity is ideal. However, what do you do when your efforts to safeguard your organization\u2019s data fail? If you\u2019re seeking advice in the wake of an IT security incident, taking the following steps will help you control the damage and minimize your breach risk in the future.<a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/06\/2019-data-breach-smb.jpg\"><img decoding=\"async\" class=\"alignright wp-image-2964\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/06\/2019-data-breach-smb.jpg\" alt=\"data breach prevalance 2018\" width=\"450\" height=\"351\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/06\/2019-data-breach-smb.jpg 794w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/06\/2019-data-breach-smb-300x234.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/06\/2019-data-breach-smb-768x600.jpg 768w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/a><\/p>\n<p><strong>1. Preserve evidence. <\/strong>After you discover a breach has occurred, your first step should be to preserve evidence of the incident and manage the chain of custody to lower the odds that it will be tampered with or destroyed. This is key to facilitate an investigation of the breach and shed light on details such as how much data was exposed.<\/p>\n<p><strong>2. Notify your insurance.<\/strong> Hopefully your organization has <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-businesses-need-cyber-liability-insurance\/\" target=\"_blank\" rel=\"noopener noreferrer\">cyber liability insurance<\/a> that covers data breaches. Let them know about the incident.<\/p>\n<p><strong>3. Carry out your incident response plan.<\/strong> As part of your IT security strategy, you should already have an incident response plan in place. If you need assistance designing and executing a plan, Stratosphere\u2019s team of cybersecurity experts can help.<br \/>\n<strong><br \/>\n4. Notify the proper personnel. <\/strong>Ensure that everyone within your organization who should know about the data breach is aware of what\u2019s happening. In addition to an incident response plan, you should also assemble a response team, according to the credit bureau <a href=\"http:\/\/www.experian.com\/assets\/data-breach\/white-papers\/experian-2017-2018-data-breach-response-guide.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Experian<\/a>.<\/p>\n<p>Your incident response team should include people from the following departments\/areas of expertise:<\/p>\n<ul>\n<li>Executive leadership<\/li>\n<li>HR<\/li>\n<li>Legal affairs<\/li>\n<li>PR<\/li>\n<li>IT<\/li>\n<li>Customer service<\/li>\n<\/ul>\n<p>Additionally, you might want to enlist the services of external personnel, such as forensic specialists, legal counsel and a data breach resolution partner, according to Experian.<br \/>\n<strong><br \/>\n5. Inform authorities and\/or regulatory governing bodies. <\/strong>Because data breaches can potentially affect government security, public safety and the economy, a growing number of states have passed <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/states-take-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">cybersecurity regulations<\/a>. Make sure you comply with those laws \u2013 as well as any industry-specific regulations <a href=\"https:\/\/www.stratospherenetworks.com\/stay-hipaa-compliant-with-stratosphere.html\" target=\"_blank\" rel=\"noopener noreferrer\">such as HIPAA<\/a> \u2013 and inform law enforcement and any relevant regulatory entities about the incident.<\/p>\n<p><strong>6. Take the affected systems offline and contain the spread of attackers.<\/strong> This step is crucial to minimize the damage done to your systems and organization, according to the CSO article \u201c<a href=\"https:\/\/www.cso.com.au\/article\/600455\/six-stages-incident-response\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">The Six Stages of Incident Response<\/a>.\u201d<\/p>\n<p>This stage of incident response includes both short- and long-term containment activities. Visit the <a href=\"https:\/\/www.sans.org\/media\/score\/504-incident-response-cycle.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">SANS Institute<\/a> website for more details on what this phase involves, such as changing passwords, killing backdoors, and more.<\/p>\n<p><strong>7. Work on eradication.<\/strong> After you\u2019ve stopped the cyberattack from spreading, you can move on to eradicating the threat. Eradication involves steps such as deleting artifacts, applying patches, changing DNS names, removing malware, and rescanning the network, according to SANS.<\/p>\n<p><strong>8. Recover and restore systems.<\/strong> Following eradication, you should take actions related to recovery and restoration. This will involve figuring out when you can bring your system back into production, as well as how long you should monitor it for unusual activity, according to CSO.<br \/>\n<strong><br \/>\n9. Reflect on lessons learned. <\/strong>To reduce the risk of future breaches, it\u2019s crucial to review what happened, learn from your mistakes and adjust your incident response process accordingly.<\/p>\n<p>Your organization should record the entire procedure for reacting to a data breach in a policy document that everyone on staff is aware of and knows how to locate and follow in the event of a security incident. Additionally, even in the absence of breaches, you should regularly test and update your response plan.<\/p>\n<p>If you have any questions about dealing with data breaches, don\u2019t hesitate to contact our team of IT security experts. We offer a wide range of <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\" target=\"_blank\" rel=\"noopener noreferrer\">managed cybersecurity solutions<\/a> from various vendors and can assist you in developing a comprehensive security strategy to minimize your risk of experiencing a breach. Contact us today by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you haven\u2019t already experienced a data breach, odds are good that you will soon. In the fiscal year 2018, more than half (58 percent) of small and medium-sized businesses experienced a data breach, according to a report from the &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-2958","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>What to Do After a Data Breach| Chicago IT Support<\/title>\n<meta name=\"description\" content=\"If you\u2019re seeking guidance on what to do after a data breach, these steps can help you minimize damage and prevent future IT security incidents.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to Do After a Data Breach| Chicago IT Support\" \/>\n<meta property=\"og:description\" content=\"If you\u2019re seeking guidance on what to do after a data breach, these steps can help you minimize damage and prevent future IT security incidents.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-04T13:51:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"What to Do After a Data Breach\",\"datePublished\":\"2019-06-04T13:51:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/\"},\"wordCount\":701,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/\",\"name\":\"What to Do After a Data Breach| Chicago IT Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2019-06-04T13:51:43+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"If you\u2019re seeking guidance on what to do after a data breach, these steps can help you minimize damage and prevent future IT security incidents.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What to Do After a Data Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"What to Do After a Data Breach| Chicago IT Support","description":"If you\u2019re seeking guidance on what to do after a data breach, these steps can help you minimize damage and prevent future IT security incidents.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/","og_locale":"en_US","og_type":"article","og_title":"What to Do After a Data Breach| Chicago IT Support","og_description":"If you\u2019re seeking guidance on what to do after a data breach, these steps can help you minimize damage and prevent future IT security incidents.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2019-06-04T13:51:43+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"What to Do After a Data Breach","datePublished":"2019-06-04T13:51:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/"},"wordCount":701,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/","name":"What to Do After a Data Breach| Chicago IT Support","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2019-06-04T13:51:43+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"If you\u2019re seeking guidance on what to do after a data breach, these steps can help you minimize damage and prevent future IT security incidents.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What to Do After a Data Breach"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2958"}],"version-history":[{"count":5,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2958\/revisions"}],"predecessor-version":[{"id":2966,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2958\/revisions\/2966"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}