{"id":3051,"date":"2019-08-05T17:12:44","date_gmt":"2019-08-05T22:12:44","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=3051"},"modified":"2019-08-05T17:12:44","modified_gmt":"2019-08-05T22:12:44","slug":"why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/","title":{"rendered":"Why Email Sandboxing Should be Part of Your Cybersecurity Strategy"},"content":{"rendered":"<p><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/08\/email-sandbox-concept.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-3052\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/08\/email-sandbox-concept-300x200.jpg\" alt=\"email sign in the sand.\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/08\/email-sandbox-concept-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/08\/email-sandbox-concept-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/08\/email-sandbox-concept-1024x683.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Last month, Lake City, Florida officials fired a member of their IT staff and announced plans to revamp their whole IT department after a careless click led to a ransomware infection of the city\u2019s whole IT network, according to the ZDNet article \u201c<a href=\"https:\/\/www-zdnet-com.cdn.ampproject.org\/c\/s\/www.zdnet.com\/google-amp\/article\/florida-city-fires-it-employee-after-paying-ransom-demand-last-week\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Florida city fires IT employee after paying ransom demand last week<\/a>.\u201d<\/p>\n<p>An employee opened a document they got via email, which turned out to contain the Emotet Trojan, a type of malware. The Emotet Trojan also downloaded a <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/trickbot-qa-4-essential-things-to-know-about-this-cybersecurity-threat\/\" target=\"_blank\" rel=\"noopener noreferrer\">TrickBot Trojan<\/a> and Ryuk ransomware. After the latter spread through the network, the city ended up agreeing to pay a ransom of nearly half a million dollars, according to ZDNet.<\/p>\n<p>This whole mess could have been prevented with some essential cybersecurity solutions, one of which is a technique called sandboxing. If you don\u2019t have email sandboxing in effect already, here\u2019s what you should know about it and why you should make it part of your organization\u2019s IT security strategy to minimize your risk of getting <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/get-hit-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">hit with ransomware<\/a> and other <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/\" target=\"_blank\" rel=\"noopener noreferrer\">types of malware<\/a>.<\/p>\n<h2>1. What is a malware sandbox?<\/h2>\n<p>In the tech world, a sandbox is basically an isolated virtual environment where you can test programs and files, according to TechTarget SearchSecurity\u2019s definition of \u201c<a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/sandbox\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">sandbox (computer security)<\/a>.\u201d<\/p>\n<h2>2. How does sandboxing work?<\/h2>\n<p>Cybersecurity experts use sandboxes to \u201cdetonate\u201d suspicious files and programs in a place where they can\u2019t infect the whole system\/IT environment, TechTarget explains. In terms of email specifically, suspicious messages and files will get filtered into a sandbox for testing before they can reach your inbox.<\/p>\n<p>If the potentially malicious file turns out to indeed contain malware, the harmful entity won\u2019t be able to infect your network, since it will \u201cgo off\u201d in isolation in the sandbox. Your files and data stay safe.<\/p>\n<h2>3. Why should my organization use sandboxing?<\/h2>\n<p>Hackers commonly use email to distribute malware and <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">phish for sensitive data<\/a>. Email is the most common point of entry in instances where organizations know how malware got installed, according to <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Verizon&#8217;s 2019 Data Breach Investigations Report<\/a>. The report states that \u201cthe median company received over 90 percent of their detected malware by email.\u201d<\/p>\n<p>If you implement email sandboxing, you significantly reduce the odds that a malicious message will slip through and result in a breach\/infection of your network. A solid approach to cybersecurity also involves adding other layers of protection aside from sandboxing, including network <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/\" target=\"_blank\" rel=\"noopener noreferrer\">managed detection and response<\/a> (MDR) and endpoint MDR.<\/p>\n<p>We also recommend employee security awareness training to reduce the odds that someone will click on a suspicious link or attachment if a suspicious message slips through the cracks.<\/p>\n<p>Ultimately, as the <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">data breach<\/a> epidemic continues and hackers continue to churn out new types of malware, you must take steps to stay ahead of cybercriminals seeking access to your IT environment. Otherwise, you could find yourself facing steep costs if your systems get infected with something like the Ryuk ransomware.<\/p>\n<p>To learn more about sandboxing and other IT security strategies and solutions that can reduce your risk of a data breach, contact our team of cybersecurity experts today. We have a comprehensive portfolio of <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\" target=\"_blank\" rel=\"noopener noreferrer\">managed cybersecurity solutions<\/a> \u2013 including email sandboxing and network and endpoint MDR. Our experienced security professionals can help you identify which products and services make sense for your business.<\/p>\n<p>Get started and schedule an <a href=\"https:\/\/www.stratospherenetworks.com\/it-security-assessment-offering.html\" target=\"_blank\" rel=\"noopener noreferrer\">IT security assessment<\/a> by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">sales@stratospherenetworks.com<\/a>. Don\u2019t wait until the damage is already done to take action against cybersecurity threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last month, Lake City, Florida officials fired a member of their IT staff and announced plans to revamp their whole IT department after a careless click led to a ransomware infection of the city\u2019s whole IT network, according to the &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-3051","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>Email Sandboxing for Maximum IT Security | Chicago IT Support<\/title>\n<meta name=\"description\" content=\"Find out what email sandboxing is, how it combats infection by ransomware and other malware, and why it should be part of your cybersecurity strategy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Email Sandboxing for Maximum IT Security | Chicago IT Support\" \/>\n<meta property=\"og:description\" content=\"Find out what email sandboxing is, how it combats infection by ransomware and other malware, and why it should be part of your cybersecurity strategy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-05T22:12:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"Why Email Sandboxing Should be Part of Your Cybersecurity Strategy\",\"datePublished\":\"2019-08-05T22:12:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/\"},\"wordCount\":594,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/\",\"name\":\"Email Sandboxing for Maximum IT Security | Chicago IT Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2019-08-05T22:12:44+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"Find out what email sandboxing is, how it combats infection by ransomware and other malware, and why it should be part of your cybersecurity strategy.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Email Sandboxing Should be Part of Your Cybersecurity Strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"Email Sandboxing for Maximum IT Security | Chicago IT Support","description":"Find out what email sandboxing is, how it combats infection by ransomware and other malware, and why it should be part of your cybersecurity strategy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/","og_locale":"en_US","og_type":"article","og_title":"Email Sandboxing for Maximum IT Security | Chicago IT Support","og_description":"Find out what email sandboxing is, how it combats infection by ransomware and other malware, and why it should be part of your cybersecurity strategy.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2019-08-05T22:12:44+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"Why Email Sandboxing Should be Part of Your Cybersecurity Strategy","datePublished":"2019-08-05T22:12:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/"},"wordCount":594,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/","name":"Email Sandboxing for Maximum IT Security | Chicago IT Support","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2019-08-05T22:12:44+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"Find out what email sandboxing is, how it combats infection by ransomware and other malware, and why it should be part of your cybersecurity strategy.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-email-sandboxing-should-be-part-of-your-cybersecurity-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why Email Sandboxing Should be Part of Your Cybersecurity Strategy"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3051","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=3051"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3051\/revisions"}],"predecessor-version":[{"id":3054,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3051\/revisions\/3054"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=3051"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=3051"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=3051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}