{"id":3205,"date":"2019-10-29T11:07:27","date_gmt":"2019-10-29T16:07:27","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=3205"},"modified":"2019-10-29T11:07:27","modified_gmt":"2019-10-29T16:07:27","slug":"why-every-business-should-use-device-encryption","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/","title":{"rendered":"Why Every Business Should Use Device Encryption"},"content":{"rendered":"<div id=\"attachment_3206\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/lockup-devices-graphic-small.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-3206\" class=\"wp-image-3206 size-full\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/lockup-devices-graphic-small.jpg\" alt=\"lock up your devices cybersecurity graphic.\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/lockup-devices-graphic-small.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/lockup-devices-graphic-small-150x150.jpg 150w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/lockup-devices-graphic-small-200x200.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-3206\" class=\"wp-caption-text\">Endpoint security is a crucial element of any comprehensive cybersecurity strategy.<\/p><\/div>\n<p>Many companies these days allow employees to use mobile devices and laptops to get work done remotely and on the go. In 2018, for instance, the majority (nearly 70 percent) of businesses supported <a href=\"https:\/\/www.stratospherenetworks.com\/it-glossary\/byod.html\" target=\"_blank\" rel=\"noopener noreferrer\">Bring Your Own Device (BYOD)<\/a> policies and programs, according to research by <a href=\"https:\/\/ww2.frost.com\/awards\/navigating-business-mobility-in-the-era-of-byod\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Frost &amp; Sullivan<\/a>.<\/p>\n<p>While this practice comes with plenty of advantages like <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/mobile-devices-can-make-employees-productive\/\" target=\"_blank\" rel=\"noopener noreferrer\">increased productivity<\/a>, it also creates new points of vulnerability for corporate networks. One relatively common scenario that can lead to a <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">data breach<\/a> is a lost or stolen device. If a mobile device with work-related apps and data on it falls into the wrong hands, the results could be disastrous. That\u2019s why it\u2019s vital to ensure all of your team members\u2019 devices are encrypted.<\/p>\n<p>If you\u2019re not already familiar with and using device encryption to protect your organization and your clients, here are the answers to a few questions you might have about this security measure.<\/p>\n<h2>1. How does device encryption work?<\/h2>\n<p><a href=\"https:\/\/www.stratospherenetworks.com\/it-glossary\/encryption.html\" target=\"_blank\" rel=\"noopener noreferrer\">Encryption<\/a>, in general, involves taking data or information and scrambling it to make it indecipherable to third parties who don\u2019t have the key or password to decrypt it. Encrypting a device means making it so that only <a href=\"https:\/\/www.stratospherenetworks.com\/user-rights-management.html\" target=\"_blank\" rel=\"noopener noreferrer\">authorized users<\/a> can access the data on it.<\/p>\n<h2>2. Why should I encrypt my devices?<\/h2>\n<p>There are numerous reasons why your company should ensure every device employees use for work is properly encrypted. Here are just a few of the most compelling arguments for device encryption:<\/p>\n<p><strong>Data breach avoidance: <\/strong>You\u2019ll lower your chances of experiencing a costly and reputation damaging breach if a device gets lost or stolen.<\/p>\n<p><strong>Compliance: <\/strong>For companies that must secure sensitive data to comply with federal or industry-specific regulations, a lack of encryption that leads to a data breach could lead to fines or sanctions.<\/p>\n<p><strong>Reputation enhancement: <\/strong>Just as a lack of security can cost you customers, proactively implementing cybersecurity tactics like encryption can be a selling point and attract new clients.<\/p>\n<p><strong>Stress reduction: <\/strong>It\u2019ll put everyone\u2019s minds at ease if they know that a lost device won\u2019t necessarily spell doom for the organization.<\/p>\n<h2>3. How can I activate device encryption?<\/h2>\n<p>To see if a device has encryption enabled, you should check the settings or system preferences, according to the Gizmodo article \u201c<a href=\"https:\/\/gizmodo.com\/why-you-should-be-encrypting-your-devices-and-how-to-ea-1798698901\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Why You Should Be Encrypting Your Devices and How to Easily Do It<\/a>.\u201d Many smartphones these days are encrypted by default, but it\u2019s still best to check.<\/p>\n<p>The best way to secure a device like a laptop is to encrypt the hard drive. Otherwise, someone looking to dig through whatever you have stored on it can easily extract the data. Macs have FileVault for full-disk encryption. Get <a href=\"https:\/\/support.apple.com\/en-us\/HT204837\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">instructions from Apple for turning it on here<\/a>.<\/p>\n<p>Windows 10 also offers a device encryption feature as well as BitLocker. You can <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4502379\/windows-10-device-encryption#targetText=What%20is%20device%20encryption%3F,people%20who've%20been%20authorized.\" target=\"_blank\" rel=\"noopener noreferrer\">learn more from Microsoft here<\/a>.<\/p>\n<p>If you\u2019d like an easy, centralized way to manage full disk encryption for your whole business, our team can implement an advanced solution that allows you to administer both Windows BitLocker and macOS FileVault device encryption from one unified, web-based console. You can also manage your encryption keys and policy along with all vital security policies using this interface.<\/p>\n<p>To learn more about this solution and\/or device encryption in general, please contact our team of cybersecurity experts. We work with a wide range of <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\" target=\"_blank\" rel=\"noopener noreferrer\">IT security solutions<\/a> from suppliers in our partner network and offer various cybersecurity services from our state-of-the-art Security Operations Center (SOC). Connect with us today by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many companies these days allow employees to use mobile devices and laptops to get work done remotely and on the go. In 2018, for instance, the majority (nearly 70 percent) of businesses supported Bring Your Own Device (BYOD) policies and &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":3206,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-3205","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>Why Every Business Should Use Device Encryption<\/title>\n<meta name=\"description\" content=\"Device encryption for electronics like laptops and phones is a must for any business looking to achieve optimal IT security levels and avoid data breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Every Business Should Use Device Encryption\" \/>\n<meta property=\"og:description\" content=\"Device encryption for electronics like laptops and phones is a must for any business looking to achieve optimal IT security levels and avoid data breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-29T16:07:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/lockup-devices-graphic-small.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"Why Every Business Should Use Device Encryption\",\"datePublished\":\"2019-10-29T16:07:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/\"},\"wordCount\":614,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/lockup-devices-graphic-small.jpg\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/\",\"name\":\"Why Every Business Should Use Device Encryption\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/lockup-devices-graphic-small.jpg\",\"datePublished\":\"2019-10-29T16:07:27+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"Device encryption for electronics like laptops and phones is a must for any business looking to achieve optimal IT security levels and avoid data breaches.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/lockup-devices-graphic-small.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/lockup-devices-graphic-small.jpg\",\"width\":300,\"height\":300,\"caption\":\"lock up your devices cybersecurity graphic.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Every Business Should Use Device Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"Why Every Business Should Use Device Encryption","description":"Device encryption for electronics like laptops and phones is a must for any business looking to achieve optimal IT security levels and avoid data breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/","og_locale":"en_US","og_type":"article","og_title":"Why Every Business Should Use Device Encryption","og_description":"Device encryption for electronics like laptops and phones is a must for any business looking to achieve optimal IT security levels and avoid data breaches.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2019-10-29T16:07:27+00:00","og_image":[{"width":300,"height":300,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/lockup-devices-graphic-small.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"Why Every Business Should Use Device Encryption","datePublished":"2019-10-29T16:07:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/"},"wordCount":614,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/lockup-devices-graphic-small.jpg","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/","name":"Why Every Business Should Use Device Encryption","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/lockup-devices-graphic-small.jpg","datePublished":"2019-10-29T16:07:27+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"Device encryption for electronics like laptops and phones is a must for any business looking to achieve optimal IT security levels and avoid data breaches.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/lockup-devices-graphic-small.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/lockup-devices-graphic-small.jpg","width":300,"height":300,"caption":"lock up your devices cybersecurity graphic."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why Every Business Should Use Device Encryption"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=3205"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3205\/revisions"}],"predecessor-version":[{"id":3208,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3205\/revisions\/3208"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3206"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=3205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=3205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=3205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}