{"id":4070,"date":"2020-12-07T13:39:08","date_gmt":"2020-12-07T18:39:08","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=4070"},"modified":"2020-12-07T13:39:08","modified_gmt":"2020-12-07T18:39:08","slug":"key-cybersecurity-concepts-what-are-risk-mitigation-services","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/","title":{"rendered":"Key Cybersecurity Concepts: What Are Risk Mitigation Services?"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-4071\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/12\/cybersecurity-risk-management-300x225.jpg\" alt=\"A close up of part of a glowing blue compass against a black background. The needle is point to the words RISK MANAGEMENT to symbolize cybersecurity risk management.\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/12\/cybersecurity-risk-management-300x225.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/12\/cybersecurity-risk-management-1024x768.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/12\/cybersecurity-risk-management-768x576.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/12\/cybersecurity-risk-management-1536x1153.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/12\/cybersecurity-risk-management-200x150.jpg 200w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/12\/cybersecurity-risk-management.jpg 1999w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Taking risks can benefit you in some areas of life. However, it\u2019s better to play it safe where cybersecurity is concerned. Otherwise, you could find yourself dealing with a data breach that tarnishes your company\u2019s reputation and comes with a hefty price tag: The average global cost of a data breach in 2020 is $3.86 million, <a href=\"https:\/\/www.ibm.com\/security\/digital-assets\/cost-data-breach-report\/#\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">according to IBM<\/a>.<\/p>\n<p>Although many of us put our plans on hold this year because of the pandemic, the global health crisis hasn\u2019t slowed cybercriminals down. Just take a look at <a href=\"https:\/\/www.zdnet.com\/article\/the-biggest-hacks-data-breaches-of-2020\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">this long list<\/a> of the most notable data breaches and hacks of 2020 so far from ZDNet. Staying on top of IT security remains imperative for business leaders around the world and across all industries.<\/p>\n<p>If you want to minimize your chances of experiencing a data breach, you should consider our risk mitigation services, which make up an essential part of our portfolio of <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-services.html\" target=\"_blank\" rel=\"noopener noreferrer\">managed cybersecurity services<\/a>. Here\u2019s everything you should know about these services and how they can help your business protect sensitive data from malicious actors and increasingly intelligent security threats.<\/p>\n<h2>Risk Mitigation Services: Relentless Threats Require Proactive and Strategic Solutions<\/h2>\n<p>Managing your cybersecurity risk level is a constant and ongoing process. Given the breakneck pace at which technology and malware evolve, it\u2019s also extremely difficult to stay on top of risk mitigation. That\u2019s where our experienced security analysts come in.<\/p>\n<p>Our team can ensure your data breach risk level stays as low as possible with the following essential services:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Recurring risk audits: <\/strong>You can\u2019t lower your security risk level if you don\u2019t know where you currently stand. Our team can conduct routine risk audits to assess your status and inform your cybersecurity strategy. Complete our <a href=\"https:\/\/www.stratospherenetworks.com\/security-risk-assessment-questionnaire.html\" target=\"_blank\" rel=\"noopener noreferrer\">security risk assessment questionnaire<\/a> to get started today.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Recurring vulnerability scans:<\/strong> It\u2019s advisable to undergo a <a href=\"https:\/\/www.stratospherenetworks.com\/vulnerability-scans.html\" target=\"_blank\" rel=\"noopener noreferrer\">vulnerability scan<\/a> at least once per quarter so you can find and fix any weak points before cybercriminals have the chance to take advantage of them.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Virtual CISO (vCISO) services:<\/strong> With our <a href=\"https:\/\/www.stratospherenetworks.com\/virtual-chief-security-officer.html\" target=\"_blank\" rel=\"noopener noreferrer\">vCISO services<\/a>, you\u2019ll get on-demand access to high-level security expertise without having to invest the time and money into hiring and retaining an in-house CISO.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Compliance services:<\/strong> Our team is trained in handling sensitive information in line with HIPAA requirements. We offer <a href=\"https:\/\/www.stratospherenetworks.com\/stay-hipaa-compliant-with-stratosphere.html\" target=\"_blank\" rel=\"noopener noreferrer\">compliance as a service<\/a> as well as intelligent vendor management services to simplify the process for your business.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Recurring cyber hygiene planning:<\/strong> Just as washing your hands properly reduces your chances of getting sick, proper <a href=\"https:\/\/www.stratospherenetworks.com\/cyber-hygiene.html\" target=\"_blank\" rel=\"noopener noreferrer\">cyber hygiene<\/a> lowers your data breach risk level. Our team can assist you in cleaning up your IT in areas such as data management, user rights management and security awareness training.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>If you\u2019re not already working to keep your data breach risk level as low as possible, it\u2019s only a matter of time before hackers infiltrate your network. Our security analysts can enhance your cybersecurity strategy and give you access to high-level expertise and the latest and best solutions for safeguarding your data. For details, contact our team today by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Taking risks can benefit you in some areas of life. However, it\u2019s better to play it safe where cybersecurity is concerned. Otherwise, you could find yourself dealing with a data breach that tarnishes your company\u2019s reputation and comes with a &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":4071,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-4070","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>Risk Mitigation Services: Why Your Business Needs Them<\/title>\n<meta name=\"description\" content=\"Our risk mitigation services will help your business combat malicious actors and minimize your chances of experiencing costly data breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risk Mitigation Services: Why Your Business Needs Them\" \/>\n<meta property=\"og:description\" content=\"Our risk mitigation services will help your business combat malicious actors and minimize your chances of experiencing costly data breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-07T18:39:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/12\/cybersecurity-risk-management.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1999\" \/>\n\t<meta property=\"og:image:height\" content=\"1500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"Key Cybersecurity Concepts: What Are Risk Mitigation Services?\",\"datePublished\":\"2020-12-07T18:39:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/\"},\"wordCount\":525,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/12\/cybersecurity-risk-management.jpg\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/\",\"name\":\"Risk Mitigation Services: Why Your Business Needs Them\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/12\/cybersecurity-risk-management.jpg\",\"datePublished\":\"2020-12-07T18:39:08+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"Our risk mitigation services will help your business combat malicious actors and minimize your chances of experiencing costly data breaches.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/12\/cybersecurity-risk-management.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/12\/cybersecurity-risk-management.jpg\",\"width\":1999,\"height\":1500,\"caption\":\"A close up of part of a glowing blue compass against a black background. The needle is point to the words RISK MANAGEMENT to symbolize cybersecurity risk management.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Key Cybersecurity Concepts: What Are Risk Mitigation Services?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"Risk Mitigation Services: Why Your Business Needs Them","description":"Our risk mitigation services will help your business combat malicious actors and minimize your chances of experiencing costly data breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/","og_locale":"en_US","og_type":"article","og_title":"Risk Mitigation Services: Why Your Business Needs Them","og_description":"Our risk mitigation services will help your business combat malicious actors and minimize your chances of experiencing costly data breaches.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2020-12-07T18:39:08+00:00","og_image":[{"width":1999,"height":1500,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/12\/cybersecurity-risk-management.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"Key Cybersecurity Concepts: What Are Risk Mitigation Services?","datePublished":"2020-12-07T18:39:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/"},"wordCount":525,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/12\/cybersecurity-risk-management.jpg","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/","name":"Risk Mitigation Services: Why Your Business Needs Them","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/12\/cybersecurity-risk-management.jpg","datePublished":"2020-12-07T18:39:08+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"Our risk mitigation services will help your business combat malicious actors and minimize your chances of experiencing costly data breaches.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/12\/cybersecurity-risk-management.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/12\/cybersecurity-risk-management.jpg","width":1999,"height":1500,"caption":"A close up of part of a glowing blue compass against a black background. The needle is point to the words RISK MANAGEMENT to symbolize cybersecurity risk management."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/key-cybersecurity-concepts-what-are-risk-mitigation-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Key Cybersecurity Concepts: What Are Risk Mitigation Services?"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4070"}],"version-history":[{"count":5,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4070\/revisions"}],"predecessor-version":[{"id":4073,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4070\/revisions\/4073"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/4071"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}