{"id":3092,"date":"2019-09-03T16:26:11","date_gmt":"2019-09-03T21:26:11","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=3092"},"modified":"2019-09-03T16:27:54","modified_gmt":"2019-09-03T21:27:54","slug":"user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/","title":{"rendered":"User Rights Management Q&#038;A: What You Should Know About This Essential Data Security Measure"},"content":{"rendered":"<p><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/09\/user-access-illustration.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-3093\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/09\/user-access-illustration-300x200.jpg\" alt=\"close up of woman logging into a smartphone with fingerprint and lock symbols representing security.\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/09\/user-access-illustration-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/09\/user-access-illustration-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/09\/user-access-illustration-1024x683.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>In July of this year alone, there were 110 data breaches that exposed more than 100 million sensitive records, according to the <a href=\"https:\/\/www.idtheftcenter.org\/wp-content\/uploads\/2019\/08\/2019-July-Data-Breach-Package.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Identity Theft Resource Center<\/a>. As hackers continue to find new ways to get their hands on private information, <a href=\"https:\/\/www.stratospherenetworks.com\/data-security-solutions.html\" target=\"_blank\" rel=\"noopener noreferrer\">data security<\/a> remains a pressing concern for organizations of all kinds around the world.<\/p>\n<p>Establishing and maintaining a comprehensive <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\" target=\"_blank\" rel=\"noopener noreferrer\">cybersecurity strategy<\/a> is paramount for any business looking to achieve compliance and effectively <a href=\"https:\/\/www.stratospherenetworks.com\/security-risk-assessment-questionnaire.html\" target=\"_blank\" rel=\"noopener noreferrer\">minimize data breach risk levels<\/a>. <a href=\"https:\/\/www.stratospherenetworks.com\/user-rights-management.html\" target=\"_blank\" rel=\"noopener noreferrer\">User rights management<\/a> should be part of that strategy.<\/p>\n<p>If you don\u2019t already have a formalized approach to user rights management to ensure sensitive data stays secure, you might have a few questions about implementing one. Here\u2019s some essential information that should help you gain a solid understanding of how to tackle this key aspect of data security.<\/p>\n<h2>1. What is user rights management?<\/h2>\n<p>User rights management involves controlling which resources a user or employee has permission to access, in addition to what they\u2019re allowed to do with those resources. Basically, it helps your business ensure that only authorized individuals can access sensitive data. It\u2019s also called \u201c<a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/access-control\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">access control<\/a>\u201d and \u201c<a href=\"https:\/\/www.cyberdefensemagazine.com\/role-of-identity-and-access-management-iam-in-cyber-security\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Identity and Access Management (IAM)<\/a>\u201d and is an essential risk management strategy for any business.<\/p>\n<p>There are various ways to control access and user rights, depending on your organization\u2019s compliance and regulatory requirements, according to <a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/access-control\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">TechTarget SearchSecurity<\/a>. Some of the main approaches include the following:<\/p>\n<p><strong>Role-based control: <\/strong>Determines access based on a user\u2019s defined role in the business (e.g., executive or engineer).<\/p>\n<p><strong>Mandatory control: <\/strong>Involves a central authority regulating access rights according to multiple levels of security. Each resource gets a security classification, and then the system kernel or operating system grants or denies access according to a user\u2019s security clearance level.<\/p>\n<p><strong>Attribute-based control: <\/strong>Manages access based on a set of policies, rules and relationships that involve attributes of systems and users.<\/p>\n<p><strong>Rule-based control: <\/strong>Determines access based on rules set by the system administrator. These rules might involve conditions like the time or location of the user.<\/p>\n<h2>2. Why should my business be concerned about user rights management and access control?<\/h2>\n<p>Many organizations must ensure that only authorized users can access sensitive data to <a href=\"https:\/\/www.stratospherenetworks.com\/stay-hipaa-compliant-with-stratosphere.html\" target=\"_blank\" rel=\"noopener noreferrer\">achieve compliance<\/a> with industry regulations. Even if compliance isn\u2019t an issue, controlling user access permissions is imperative for any business looking to avoid a data breach.<\/p>\n<p>If you neglect user role management, you make it easier for someone with malicious intent to get their hands on what should be private information. A breach could come at a high cost for your business: The\u00a0 average total cost of a data breach is $3.92 million, <a href=\"https:\/\/www.ibm.com\/security\/data-breach?cm_mmc=Search_Google-_-Security_Optimize+the+Security+Program-_-WW_NA-_-%2Bcosts%20of%20%2Bdata%20%2Bbreach_b&amp;cm_mmca1=000000NJ&amp;cm_mmca2=10000253&amp;cm_mmca7=9030963&amp;cm_mmca8=aud-322244832184:kwd-295901325299&amp;cm_mmca9=_k_CjwKCAjw1_PqBRBIEiwA71rmtVV_dSM4B6OuV8-eq05b0FCW4vQTB6uiuCQQSPv2ahufMWdaDv6USxoCF4MQAvD_BwE_k_&amp;cm_mmca10=253508236958&amp;cm_mmca11=b&amp;gclsrc=aw.ds&amp;&amp;gclid=CjwKCAjw1_PqBRBIEiwA71rmtVV_dSM4B6OuV8-eq05b0FCW4vQTB6uiuCQQSPv2ahufMWdaDv6USxoCF4MQAvD_BwE\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">according to IBM<\/a>. You also risk losing your clients\u2019 trust and damaging your company\u2019s reputation, convincing people to turn to your competitors instead.<\/p>\n<h2>3. What is least privilege, and why is enforcing it important?<\/h2>\n<p>The concept of least privilege involves granting users the least amount of privilege possible to do their jobs properly. Giving only users who truly need access to do their work the ability to view and use sensitive data is a best practice if you want to reduce the odds of a breach.<\/p>\n<h2>4. Can automation help my organization with user rights management?<\/h2>\n<p>Yes, an <a href=\"https:\/\/www.stratospherenetworks.com\/trustwave.html\" target=\"_blank\" rel=\"noopener noreferrer\">automated solution<\/a> can make managing user access permissions much easier and less time consuming, especially as people change roles within your organization. We partner with cybersecurity vendors that can provide you with user rights management solutions that efficiently tackle data security processes and ensure your organization meets any regulatory requirements.<\/p>\n<p>If you\u2019d like to learn more about user rights management and\/or other data security concepts and solutions, contact our team of cybersecurity experts today by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratosphernetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">sales@stratosphernetworks.com<\/a>. We have high-level cybersecurity experts on staff who can help create an IT security roadmap for your business and keep your data breach risk level as low as possible.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In July of this year alone, there were 110 data breaches that exposed more than 100 million sensitive records, according to the Identity Theft Resource Center. As hackers continue to find new ways to get their hands on private information, &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3093,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-3092","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>User Rights Management Q&amp;A | Chicago IT Support<\/title>\n<meta name=\"description\" content=\"User rights management is an essential part of any comprehensive data security strategy. Here\u2019s what you should know about this IT security concept.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"User Rights Management Q&amp;A | Chicago IT Support\" \/>\n<meta property=\"og:description\" content=\"User rights management is an essential part of any comprehensive data security strategy. Here\u2019s what you should know about this IT security concept.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-03T21:26:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-03T21:27:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/09\/user-access-illustration.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2121\" \/>\n\t<meta property=\"og:image:height\" content=\"1414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"User Rights Management Q&#038;A: What You Should Know About This Essential Data Security Measure\",\"datePublished\":\"2019-09-03T21:26:11+00:00\",\"dateModified\":\"2019-09-03T21:27:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/\"},\"wordCount\":665,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/09\/user-access-illustration.jpg\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/\",\"name\":\"User Rights Management Q&A | Chicago IT Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/09\/user-access-illustration.jpg\",\"datePublished\":\"2019-09-03T21:26:11+00:00\",\"dateModified\":\"2019-09-03T21:27:54+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"User rights management is an essential part of any comprehensive data security strategy. Here\u2019s what you should know about this IT security concept.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/09\/user-access-illustration.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/09\/user-access-illustration.jpg\",\"width\":2121,\"height\":1414,\"caption\":\"close up of woman logging into a smartphone with fingerprint and lock symbols representing security.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"User Rights Management Q&#038;A: What You Should Know About This Essential Data Security Measure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"User Rights Management Q&A | Chicago IT Support","description":"User rights management is an essential part of any comprehensive data security strategy. Here\u2019s what you should know about this IT security concept.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/","og_locale":"en_US","og_type":"article","og_title":"User Rights Management Q&A | Chicago IT Support","og_description":"User rights management is an essential part of any comprehensive data security strategy. Here\u2019s what you should know about this IT security concept.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2019-09-03T21:26:11+00:00","article_modified_time":"2019-09-03T21:27:54+00:00","og_image":[{"width":2121,"height":1414,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/09\/user-access-illustration.jpg","type":"image\/jpeg"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"User Rights Management Q&#038;A: What You Should Know About This Essential Data Security Measure","datePublished":"2019-09-03T21:26:11+00:00","dateModified":"2019-09-03T21:27:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/"},"wordCount":665,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/09\/user-access-illustration.jpg","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/","name":"User Rights Management Q&A | Chicago IT Support","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/09\/user-access-illustration.jpg","datePublished":"2019-09-03T21:26:11+00:00","dateModified":"2019-09-03T21:27:54+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"User rights management is an essential part of any comprehensive data security strategy. Here\u2019s what you should know about this IT security concept.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/09\/user-access-illustration.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/09\/user-access-illustration.jpg","width":2121,"height":1414,"caption":"close up of woman logging into a smartphone with fingerprint and lock symbols representing security."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/user-rights-management-qa-what-you-should-know-about-this-essential-data-security-measure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"User Rights Management Q&#038;A: What You Should Know About This Essential Data Security Measure"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=3092"}],"version-history":[{"count":1,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3092\/revisions"}],"predecessor-version":[{"id":3094,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3092\/revisions\/3094"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3093"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=3092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=3092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=3092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}