{"id":4022,"date":"2020-11-16T12:51:08","date_gmt":"2020-11-16T17:51:08","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=4022"},"modified":"2020-11-16T12:51:08","modified_gmt":"2020-11-16T17:51:08","slug":"key-cybersecurity-concepts-what-is-defense-in-depth","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/","title":{"rendered":"Key Cybersecurity Concepts: What is Defense in Depth?"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-4023\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield-300x300.jpg\" alt=\"A glowing blue shield superimposed over blue binary on a black background, symbolizing cybersecurity defense in depth.\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield-300x300.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield-1024x1024.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield-150x150.jpg 150w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield-768x768.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield-1536x1536.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield-200x200.jpg 200w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield.jpg 1732w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>As people around the world continue to take precautions to avoid catching and spreading COVID-19, individuals and businesses must also remain vigilant to avoid virtual viruses. Unfortunately, the pandemic has inspired a <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-keep-your-data-safe-from-coronavirus-related-cybercrime\/\" target=\"_blank\" rel=\"noopener noreferrer\">surge in cybercrime<\/a>, with malicious actors looking to exploit the crisis and find vulnerabilities in newly launched <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/remote-work-resource-roundup-9-blog-entries-for-business-leaders-navigating-the-new-normal\/\" target=\"_blank\" rel=\"noopener noreferrer\">remote work<\/a> infrastructure. In January to April 2020, a private sector partner of INTERPOL detected 907,000 spam messages, 48,000 malicious URLs and 737 malware incidents. All of this malicious activity was driven by COVID-19, <a href=\"https:\/\/www.interpol.int\/en\/News-and-Events\/News\/2020\/INTERPOL-report-shows-alarming-rate-of-cyberattacks-during-COVID-19#:~:text=Malicious%20Domains%20%2D%20Taking%20advantage%20of,coronavirus%E2%80%9D%20or%20%E2%80%9CCOVID%E2%80%9D.\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">INTERPOL states<\/a>.<\/p>\n<p>To combat the flood of coronavirus-themed <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/avoid-taking-the-bait-for-covid-19-phishing-schemes\/\" target=\"_blank\" rel=\"noopener noreferrer\">phishing schemes<\/a>, <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/the-total-cost-of-ransomware-and-how-to-reduce-the-risk-and-impact-of-infection\/\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware<\/a> and other types of cyberattacks, it\u2019s important to maintain a comprehensive cybersecurity strategy and keep up with the constantly changing threat landscape. Partnering with a <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-a-managed-security-service-provider-mssp-can-help-your-business-become-more-sustainable\/\" target=\"_blank\" rel=\"noopener noreferrer\">Managed Security Service Provider (MSSP)<\/a> like Stratosphere Networks will give your business access to the advanced tools and experienced security analysts needed to tackle increasingly complicated IT security issues.<\/p>\n<p>On our <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-services.html\" target=\"_blank\" rel=\"noopener noreferrer\">Managed Cybersecurity Services page<\/a>, one of the categories mentioned is Defense in Depth. In this blog entry, we\u2019ll delve into what this classification means, which solutions it includes, and why it\u2019s a vital part of any company\u2019s approach to IT security.<\/p>\n<h2>Defense in Depth: What It Is and Why You Need It<\/h2>\n<p>Going beyond defensive measures such as malware detection, threat analysis and risk assessments, the solutions included in our Defense in Depth category ensure comprehensive protection for your company\u2019s network and data. Let\u2019s take a look at each element and why it matters.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>End user security awareness training: <\/strong>Even if you implement the world\u2019s most advanced security solutions, they won\u2019t make a difference if your team isn\u2019t aware of best practices to keep your infrastructure and data safe from cybercriminals. Errors are a factor in 22 percent of data breaches, according to Verizon\u2019s<a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\"> 2020 Data Breach Investigations Report<\/a>. Our certified security analysts can ensure your team is knowledgeable in key areas, such as creating strong passwords and proper remote access procedures. We can even test their abilities with software that simulates phishing campaigns. Visit our <a href=\"https:\/\/www.stratospherenetworks.com\/employee-security-awareness.html\" target=\"_blank\" rel=\"noopener noreferrer\">Employee Security Awareness page<\/a> to learn more.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Advanced endpoint protection:<\/strong> At a time when many people are still working from home, endpoint security has become a top priority for many organizations. In addition to teaching your team members best practices for keeping their smartphones, laptops and other devices secure, we can safeguard endpoints with cutting-edge endpoint <a href=\"https:\/\/www.stratospherenetworks.com\/managed-detection-and-response.html\" target=\"_blank\" rel=\"noopener noreferrer\">Managed Detection and Response (MDR)<\/a>, Mobile Device Management (MDM) and other next-gen solutions.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Dark web scanning:<\/strong> Cybercriminals commonly sell and buy stolen credentials on <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/dark-web-faq\/\" target=\"_blank\" rel=\"noopener noreferrer\">the dark web<\/a>, a sub-layer of the internet where users remain anonymous with the browser Tor. More than 80 percent of data breaches that involve hacking feature either brute force or the use of lost or stolen credentials, according to Verizon\u2019s DBIR. However, you can protect your organization by employing <a href=\"https:\/\/www.stratospherenetworks.com\/dark-web-monitoring.html\" target=\"_blank\" rel=\"noopener noreferrer\">dark web scanning services<\/a> to find out if any of your employees\u2019 credentials are for sale before hackers have the chance to use them to break into your network. We leverage both human intelligence and AI to search for passwords, email addresses and other confidential data.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Cloud-based network security: <\/strong>This cloud-delivered service is perfect for companies looking for a flexible solution that covers remote workers and various devices. It safeguards against phishing, ransomware and other malware attacks while offering high visibility across all cloud services, devices and ports.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Single sign-on (SSO):<\/strong> Implementing an <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/single-sign-on-sso-a-look-at-the-pros-and-cons-for-business-leaders\/\" target=\"_blank\" rel=\"noopener noreferrer\">SSO protocol<\/a> makes managing multiple passwords easier for your staff members while also lowering your risk level, since it cuts down on the number of credentials your end users rely on.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Password management:<\/strong> As we already mentioned, most instances of hacking involve lost or stolen credentials. Our team can make a huge difference in your security posture by assisting with proper password management.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>If you\u2019d like to learn more about these Defense in Depth security solutions as well as the rest of our managed services, feel free to contact us. Our experienced analysts can recommend a customized approach to improve your security posture based on your current situation, vulnerabilities and goals.<\/p>\n<p>A security risk assessment is a great place to start. Just <a href=\"https:\/\/www.stratospherenetworks.com\/security-risk-assessment-questionnaire.html\" target=\"_blank\" rel=\"noopener noreferrer\">fill out our questionnaire <\/a>or contact our security team by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As people around the world continue to take precautions to avoid catching and spreading COVID-19, individuals and businesses must also remain vigilant to avoid virtual viruses. Unfortunately, the pandemic has inspired a surge in cybercrime, with malicious actors looking to &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":4023,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-4022","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>Cybersecurity Defense in Depth: What It Is and Why You Need It<\/title>\n<meta name=\"description\" content=\"For companies seeking to combat complicated cybersecurity threats, our Defense in Depth solutions offer an advanced level of protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Defense in Depth: What It Is and Why You Need It\" \/>\n<meta property=\"og:description\" content=\"For companies seeking to combat complicated cybersecurity threats, our Defense in Depth solutions offer an advanced level of protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-16T17:51:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield-1024x1024.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"Key Cybersecurity Concepts: What is Defense in Depth?\",\"datePublished\":\"2020-11-16T17:51:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/\"},\"wordCount\":712,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield.jpg\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/\",\"name\":\"Cybersecurity Defense in Depth: What It Is and Why You Need It\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield.jpg\",\"datePublished\":\"2020-11-16T17:51:08+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"For companies seeking to combat complicated cybersecurity threats, our Defense in Depth solutions offer an advanced level of protection.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield.jpg\",\"width\":1732,\"height\":1732,\"caption\":\"A glowing blue shield superimposed over blue binary on a black background, symbolizing cybersecurity defense in depth.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Key Cybersecurity Concepts: What is Defense in Depth?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"Cybersecurity Defense in Depth: What It Is and Why You Need It","description":"For companies seeking to combat complicated cybersecurity threats, our Defense in Depth solutions offer an advanced level of protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Defense in Depth: What It Is and Why You Need It","og_description":"For companies seeking to combat complicated cybersecurity threats, our Defense in Depth solutions offer an advanced level of protection.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2020-11-16T17:51:08+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield-1024x1024.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"Key Cybersecurity Concepts: What is Defense in Depth?","datePublished":"2020-11-16T17:51:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/"},"wordCount":712,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield.jpg","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/","name":"Cybersecurity Defense in Depth: What It Is and Why You Need It","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield.jpg","datePublished":"2020-11-16T17:51:08+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"For companies seeking to combat complicated cybersecurity threats, our Defense in Depth solutions offer an advanced level of protection.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/cybersecurity-shield.jpg","width":1732,"height":1732,"caption":"A glowing blue shield superimposed over blue binary on a black background, symbolizing cybersecurity defense in depth."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-is-defense-in-depth\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Key Cybersecurity Concepts: What is Defense in Depth?"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4022"}],"version-history":[{"count":3,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4022\/revisions"}],"predecessor-version":[{"id":4025,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4022\/revisions\/4025"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/4023"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}