{"id":3163,"date":"2019-10-15T11:58:14","date_gmt":"2019-10-15T16:58:14","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=3163"},"modified":"2019-10-15T11:58:14","modified_gmt":"2019-10-15T16:58:14","slug":"what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/","title":{"rendered":"What Is Two-Factor Authentication and How Does It Work? Your Guide to 2FA"},"content":{"rendered":"<p><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/two-factor-authentication.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-3165\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/two-factor-authentication-300x300.jpg\" alt=\"use multi-factor authentication or two-factor authentication graphic.\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/two-factor-authentication-300x300.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/two-factor-authentication-150x150.jpg 150w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/two-factor-authentication-768x768.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/two-factor-authentication-200x200.jpg 200w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/two-factor-authentication.jpg 900w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Does your company use two-factor authentication \u2013 or 2FA \u2013 to ensure that only authorized users can access sensitive data? If you\u2019re not already familiar with this essential security measure, now is a great time to learn about it and implement it.<\/p>\n<p>In honor of <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/10-must-read-blog-posts-for-national-cybersecurity-awareness-month\/\" target=\"_blank\" rel=\"noopener noreferrer\">National Cybersecurity Awareness Month (NCASM)<\/a>, here are the answers to some of the main questions you might have about what two-factor authentication is, how it works, and why it\u2019s an <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\" target=\"_blank\" rel=\"noopener noreferrer\">IT security solution<\/a> every business should have in place to minimize <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">data breach<\/a> risk levels.<\/p>\n<h2>What is two-factor authentication and how does it work?<\/h2>\n<p>Essentially, 2FA uses two different pieces of information (aside from the username) to verify that a user actually is who they say they are before they\u2019re allowed to access an account or system, according to the CSO article \u201c<a href=\"https:\/\/www.csoonline.com\/article\/3239144\/2fa-explained-how-to-enable-it-and-how-it-works.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">2fa explained: How to enable it and how it works<\/a>.\u201d<\/p>\n<p>Most of us are familiar with single-factor authentication, which just requires you to input your username and a password. With two-factor, you must provide something in addition to your password to log in. Many 2FA solutions these days involve a code or approval prompt accessed via your smartphone, since that\u2019s something many of us have on us at almost all times these days.<\/p>\n<h2>Why should I use two-factor authentication?<\/h2>\n<p>Two-factor authentication adds an extra layer of security. Even if your users <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/4-key-reasons-to-use-a-password-manager\/\" target=\"_blank\" rel=\"noopener noreferrer\">pick strong passwords<\/a>, change them regularly and don\u2019t use them across multiple accounts, credential theft (e.g., through <a href=\"https:\/\/www.stratospherenetworks.com\/what-you-should-know-about-phishing-malware-infographic.html\" target=\"_blank\" rel=\"noopener noreferrer\">phishing scams<\/a>) has become common. Twenty-nine percent of data breaches involve stolen credentials, according to Verizon\u2019s <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/2019\/summary-of-findings\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">2019 Data Breach Investigations Report<\/a>.<\/p>\n<p>Passwords alone simply aren\u2019t secure enough anymore. Two-factor, however, can potentially stop cybersecurity threats in their tracks. <a href=\"https:\/\/security.googleblog.com\/2019\/05\/new-research-how-effective-is-basic.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Research released by Google<\/a> earlier this year found that an SMS code sent to a user\u2019s phone blocked 100 percent of automated bots, 96 percent of bulk phishing attacks, and 76 percent of targeted attacks. On-device prompts \u2013 a more secure 2FA alternative to SMS \u2013 stopped 100 percent of automated bots, 99 percent of bulk phishing attempts and 90 percent of targeted attacks.<\/p>\n<h2>What types of two-factor authentication are available, and which one is best for my business?<\/h2>\n<p>There are four main kinds of 2FA, according to the TechCrunch article \u201c<a href=\"https:\/\/techcrunch.com\/2018\/12\/25\/cybersecurity-101-guide-two-factor\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Cybersecurity 101: Two-factor authentication can save you from hackers<\/a>.\u201d All of them have pros and cons, and the right method depends on which apps your business uses and what 2FA options they support.<\/p>\n<p><strong>1. Codes from authenticator apps. <\/strong>This involves users installing an app on their smartphones that generates temporary codes that serve as the second authenticating factor. Because these codes are securely relayed via an HTTPS connection, the only way hackers can get to that info is by infecting your phone with malware or acquiring the phone itself.<\/p>\n<p><strong>2. Codes sent via text message.<\/strong> This is the most common 2FA technique and doesn\u2019t even require users to have smartphones, just phones capable of receiving text messages. However, SMS messages aren\u2019t encrypted, which can lead to leaks. Hackers have also found vulnerabilities in phone networks that they can exploit to get their hands on these codes. As a result, codes sent via SMS are better than single-factor authentication but are probably the least secure 2FA method you can choose.<\/p>\n<p><strong>3. Biometrics. <\/strong>This is a more uncommon method, since it requires specialized tech. Think retina, face and fingerprint scans. Hackers can only get around this if they go to lengths like fingerprint cloning.<\/p>\n<p><strong>4. Physical keys.<\/strong> These keys are USB drives that you must insert into your computer to confirm your identity, and they\u2019re considered the most secure 2FA option. However, not many sites currently support this method.<\/p>\n<p>If you\u2019d like to learn more about two-factor authentication and other cybersecurity solutions, our team of IT security experts can assist you. We offer 2FA as one of our <a href=\"https:\/\/www.stratospherenetworks.com\/data-security-solutions.html\" target=\"_blank\" rel=\"noopener noreferrer\">data security solutions<\/a>, and Stratosphere provides various <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\" target=\"_blank\" rel=\"noopener noreferrer\">managed cybersecurity products and services<\/a>. We can help you determine which solutions meet your company\u2019s specific requirements. Our security analysts can also perform an IT security assessment to define your needs and points of vulnerability.<\/p>\n<p>Fill out our <a href=\"https:\/\/www.stratospherenetworks.com\/security-risk-assessment-questionnaire.html\" target=\"_blank\" rel=\"noopener noreferrer\">security risk assessment questionnaire here<\/a> to get started. You can also get in touch with us by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Does your company use two-factor authentication \u2013 or 2FA \u2013 to ensure that only authorized users can access sensitive data? If you\u2019re not already familiar with this essential security measure, now is a great time to learn about it and &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":3165,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-3163","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>What Is Two-Factor Authentication and How Does It Work?<\/title>\n<meta name=\"description\" content=\"What is two-factor authentication and how does it work? Here\u2019s why every business should use 2FA as part of a comprehensive cybersecurity arsenal.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Two-Factor Authentication and How Does It Work?\" \/>\n<meta property=\"og:description\" content=\"What is two-factor authentication and how does it work? Here\u2019s why every business should use 2FA as part of a comprehensive cybersecurity arsenal.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-15T16:58:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/two-factor-authentication.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"What Is Two-Factor Authentication and How Does It Work? Your Guide to 2FA\",\"datePublished\":\"2019-10-15T16:58:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/\"},\"wordCount\":721,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/two-factor-authentication.jpg\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/\",\"name\":\"What Is Two-Factor Authentication and How Does It Work?\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/two-factor-authentication.jpg\",\"datePublished\":\"2019-10-15T16:58:14+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"What is two-factor authentication and how does it work? Here\u2019s why every business should use 2FA as part of a comprehensive cybersecurity arsenal.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/two-factor-authentication.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/two-factor-authentication.jpg\",\"width\":900,\"height\":900,\"caption\":\"use multi-factor authentication or two-factor authentication graphic.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Two-Factor Authentication and How Does It Work? Your Guide to 2FA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"What Is Two-Factor Authentication and How Does It Work?","description":"What is two-factor authentication and how does it work? Here\u2019s why every business should use 2FA as part of a comprehensive cybersecurity arsenal.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/","og_locale":"en_US","og_type":"article","og_title":"What Is Two-Factor Authentication and How Does It Work?","og_description":"What is two-factor authentication and how does it work? Here\u2019s why every business should use 2FA as part of a comprehensive cybersecurity arsenal.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2019-10-15T16:58:14+00:00","og_image":[{"width":900,"height":900,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/two-factor-authentication.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"What Is Two-Factor Authentication and How Does It Work? Your Guide to 2FA","datePublished":"2019-10-15T16:58:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/"},"wordCount":721,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/two-factor-authentication.jpg","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/","name":"What Is Two-Factor Authentication and How Does It Work?","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/two-factor-authentication.jpg","datePublished":"2019-10-15T16:58:14+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"What is two-factor authentication and how does it work? Here\u2019s why every business should use 2FA as part of a comprehensive cybersecurity arsenal.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/two-factor-authentication.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/two-factor-authentication.jpg","width":900,"height":900,"caption":"use multi-factor authentication or two-factor authentication graphic."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-two-factor-authentication-and-how-does-it-work-your-guide-to-2fa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is Two-Factor Authentication and How Does It Work? Your Guide to 2FA"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=3163"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3163\/revisions"}],"predecessor-version":[{"id":3167,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3163\/revisions\/3167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3165"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=3163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=3163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=3163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}