{"id":3358,"date":"2020-01-08T11:58:43","date_gmt":"2020-01-08T16:58:43","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=3358"},"modified":"2020-01-08T11:58:43","modified_gmt":"2020-01-08T16:58:43","slug":"how-to-improve-your-it-security-with-regular-penetration-testing","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/","title":{"rendered":"How to Improve Your IT Security With Regular Penetration Testing"},"content":{"rendered":"<p><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-3359\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo-300x200.jpg\" alt=\"person typing on laptop with floating and glowing shield and lock icon in front of the screen, illustrating security.\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo-1024x683.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo-1536x1025.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo-2048x1367.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo-200x133.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Maintaining the strongest possible defenses against cybercrime has become an ongoing challenge and top priority for all kinds of businesses as hackers continue to <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-to-do-after-a-data-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">successfully breach corporate networks<\/a> at an alarming rate. In the first six months of 2019 alone, there were 3,813 reported breaches that exposed more than 4.1 billion records, according to a report from <a href=\"https:\/\/pages.riskbasedsecurity.com\/2019-midyear-data-breach-quickview-report\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">RiskBased Security<\/a>. That\u2019s a 54 percent increase from the first half of 2018.<\/p>\n<p>That\u2019s only one of many <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/15-cybersecurity-stats-every-business-leader-should-see\/\" target=\"_blank\" rel=\"noopener noreferrer\">scary statistics<\/a> on the state of cybercrime these days. With malicious actors releasing new kinds of malware every day and constantly cooking up new tactics for accessing private data, it\u2019s imperative that business leaders invest in cybersecurity and maintain a comprehensive and proactive approach to safeguarding their IT environments.<\/p>\n<p>One <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\" target=\"_blank\" rel=\"noopener noreferrer\">security solution<\/a> that can help your organization stop hackers from getting their hands on private data is <a href=\"https:\/\/www.stratospherenetworks.com\/penetration-testing.html\" target=\"_blank\" rel=\"noopener noreferrer\">penetration testing<\/a>, also known as pen testing or ethical hacking, according to <a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/penetration-testing\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">TechTarget SearchSecurity<\/a>. A pen test is essentially a simulated cyberattack against a specific aspect of your IT environment.<\/p>\n<p>Basically, a pen test is a way to check whether the security solutions and defenses you have in place actually work when someone tries to get around them. This is essential for any organization looking to achieve the best possible security posture. It\u2019s also required to achieve compliance with industry-specific regulations, such as SOC 2, PCI DSS and <a href=\"https:\/\/www.stratospherenetworks.com\/stay-hipaa-compliant-with-stratosphere.html\" target=\"_blank\" rel=\"noopener noreferrer\">HIPAA<\/a>.\u00a0 <strong><br \/>\n<\/strong><\/p>\n<h2>The Pen Testing Process: What to Expect<\/h2>\n<p>To carry out a penetration test, an ethical hacker\/cybersecurity professional will attempt to infiltrate a particular part of your network. Because pen tests require advanced hacking skills, you\u2019ll want to work with a third-party provider that\u2019s capable of safely and effectively executing the procedure. Additionally, <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/what-is-pen-testing.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Cisco advises<\/a> consulting with experts before beginning pen testing to make sure your network isn\u2019t damaged in the process.<\/p>\n<p>Although you\u2019re checking your IT environment for weak points, it\u2019s also important to note that a pen test is distinct from a general <a href=\"https:\/\/www.stratospherenetworks.com\/vulnerability-scans.html\" target=\"_blank\" rel=\"noopener noreferrer\">vulnerability scan<\/a> in that it is a simulated attack on a specific facet of your network. <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/penetration-tests-vs-vulnerability-assessments-whats-the-difference\/\" target=\"_blank\" rel=\"noopener noreferrer\">This blog entry<\/a> offers a detailed explanation of the difference between the two IT security tools, if you\u2019re interested in learning more.<\/p>\n<p>There are various types of penetration tests, depending on your objectives and which part of your network you\u2019d like to check for weaknesses. Here are some of the different kinds of pen tests available:<\/p>\n<ul>\n<li>External<\/li>\n<li>Internal<\/li>\n<li>Wi-Fi<\/li>\n<li>On-site physical<\/li>\n<li>Application<\/li>\n<\/ul>\n<p>Once the testing is complete, you\u2019ll receive an overall grade as well as a \u201ccall to action\u201d list detailing any items you need to address to improve your security posture.<\/p>\n<h2>Maximizing Your ROI for Pen Tests<\/h2>\n<p>To get the most out of this cybersecurity tool\/process, follow these recommendations.<\/p>\n<p>1. Address any issues identified by the testers as soon as possible after the procedure, and then re-test 45 to 90 days later to make sure you fixed everything properly. Don\u2019t introduce any new tech during this time.<\/p>\n<p>2. Conduct pen tests on a regular basis. That means carrying one out at least once annually, or whenever you make changes to your IT environment or alter your approach to security.<\/p>\n<p>Businesses that have compliance-related or other regulatory requirements typically need yearly reviews. Some industries highly recommend annual tests. For industries that don\u2019t require that but have a security-first mindset, businesses should utilize a pen test to benchmark their environment, as it might open their eyes to areas of weakness. Ongoing vulnerability scans are another way, at a less expensive pricing point, that businesses can keep an eye on some major gaps.<\/p>\n<p>3. Invest in maintaining a current IT security road map, as well as stringent security controls.<\/p>\n<h2>Should You Change Up Your Provider?<\/h2>\n<p>Changing your pen test provider routinely is a MUST! Each vendor has different philosophies and leverages different methodologies when attempting to breach your network. You typically will find different action items with different providers. There are many reasons for this. For instance, some pen testers are more skilled, and each supplier utilizes different tools.<\/p>\n<h2>Let Us Help You Find the Right Pen Test Supplier<\/h2>\n<p>There are numerous IT solution vendors out there that offer penetration testing. It can be extremely time-consuming to sift through them all to find the one that makes the most sense for your business, but you can simplify the process by letting our team of <a href=\"https:\/\/www.stratospherenetworks.com\/trusted-advisor.html\" target=\"_blank\" rel=\"noopener noreferrer\">technology advisors<\/a> tackle the shopping around for you for free.<\/p>\n<p>We\u2019ve already scrutinized the market, selected the best suppliers and created a comparison matrix showing how the top 15 penetration testing providers stack up against each other. Free of charge, we can give you this matrix and all the information you need to select the right pen test vendor for you at the best possible price. If you\u2019re interested, don\u2019t hesitate to contact our team today by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Maintaining the strongest possible defenses against cybercrime has become an ongoing challenge and top priority for all kinds of businesses as hackers continue to successfully breach corporate networks at an alarming rate. In the first six months of 2019 alone, &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":3359,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-3358","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>The Importance of Regular Penetration Testing for IT Security<\/title>\n<meta name=\"description\" content=\"Penetration testing is essential for any organization looking to achieve the highest possible level of cybersecurity. Read on to learn how pen tests work.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Importance of Regular Penetration Testing for IT Security\" \/>\n<meta property=\"og:description\" content=\"Penetration testing is essential for any organization looking to achieve the highest possible level of cybersecurity. Read on to learn how pen tests work.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-08T16:58:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2119\" \/>\n\t<meta property=\"og:image:height\" content=\"1414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"How to Improve Your IT Security With Regular Penetration Testing\",\"datePublished\":\"2020-01-08T16:58:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/\"},\"wordCount\":825,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo.jpg\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/\",\"name\":\"The Importance of Regular Penetration Testing for IT Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo.jpg\",\"datePublished\":\"2020-01-08T16:58:43+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"Penetration testing is essential for any organization looking to achieve the highest possible level of cybersecurity. Read on to learn how pen tests work.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo.jpg\",\"width\":2119,\"height\":1414,\"caption\":\"person typing on laptop with floating and glowing shield and lock icon in front of the screen, illustrating security.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Improve Your IT Security With Regular Penetration Testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"The Importance of Regular Penetration Testing for IT Security","description":"Penetration testing is essential for any organization looking to achieve the highest possible level of cybersecurity. Read on to learn how pen tests work.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/","og_locale":"en_US","og_type":"article","og_title":"The Importance of Regular Penetration Testing for IT Security","og_description":"Penetration testing is essential for any organization looking to achieve the highest possible level of cybersecurity. Read on to learn how pen tests work.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2020-01-08T16:58:43+00:00","og_image":[{"width":2119,"height":1414,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"How to Improve Your IT Security With Regular Penetration Testing","datePublished":"2020-01-08T16:58:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/"},"wordCount":825,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo.jpg","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/","name":"The Importance of Regular Penetration Testing for IT Security","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo.jpg","datePublished":"2020-01-08T16:58:43+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"Penetration testing is essential for any organization looking to achieve the highest possible level of cybersecurity. Read on to learn how pen tests work.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/pen-testing-tech-tips-photo.jpg","width":2119,"height":1414,"caption":"person typing on laptop with floating and glowing shield and lock icon in front of the screen, illustrating security."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-improve-your-it-security-with-regular-penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Improve Your IT Security With Regular Penetration Testing"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=3358"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3358\/revisions"}],"predecessor-version":[{"id":3361,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3358\/revisions\/3361"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3359"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=3358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=3358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=3358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}