{"id":4329,"date":"2021-04-13T07:48:47","date_gmt":"2021-04-13T12:48:47","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=4329"},"modified":"2021-04-12T17:04:59","modified_gmt":"2021-04-12T22:04:59","slug":"how-outsourcing-cybersecurity-can-contain-costs","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/","title":{"rendered":"How Outsourcing Cybersecurity Can Contain Costs"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-4330\" style=\"font-size: 16px;\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-cost-cutting-strat-300x200.jpg\" alt=\"Financial documents with a calculator and pen on top in the foreground, symbolizing budgeting.\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-cost-cutting-strat-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-cost-cutting-strat-1024x683.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-cost-cutting-strat-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-cost-cutting-strat-1536x1024.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-cost-cutting-strat-2048x1365.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-cost-cutting-strat-200x133.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>With more vaccines distributed every day and many businesses reopening, there\u2019s hopefully plenty to look forward to as 2021 continues to unfold and it becomes safe to lift some of our pandemic-related restrictions. However, there\u2019s one area in which companies can\u2019t relax and let their guard down: cybersecurity.<\/p>\n<p>The increase in <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-your-business-needs-a-secure-remote-work-strategy-to-survive\/\" target=\"_blank\" rel=\"noopener\">remote work<\/a> last year inspired an onslaught of cyberattacks as hackers sought to exploit new vulnerabilities presented by rapidly deployed work-from-home arrangements. This year, we\u2019ll likely continue to see attempts to compromise remote work infrastructure, in addition to brute-force strategies, file-less malware, <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/the-total-cost-of-ransomware-and-how-to-reduce-the-risk-and-impact-of-infection\/\" target=\"_blank\" rel=\"noopener\">ransomware attacks<\/a> and more, according to the IBM Security Intelligence article \u201c.\u201d<\/p>\n<p>Subsequently, to minimize the chances of experiencing a damaging data breach, businesses must not only invest in <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\" target=\"_blank\" rel=\"noopener\">next-gen IT security solutions<\/a> but also need to employ <a href=\"https:\/\/www.stratospherenetworks.com\/security-operations-center-as-a-service.html\" target=\"_blank\" rel=\"noopener\">high-level security experts<\/a> to manage those solutions, interpret their output and efficiently respond to any incidents.<\/p>\n<p>However, at the same time, many companies are still striving to rein in spending due to the economic effects of the pandemic. Implementing advanced tools and retaining top-level cybersecurity professionals can come with a hefty price tag, especially since those pros are currently in short supply. The world needs approximately 3.12 million more skilled cybersecurity professionals for organizations worldwide to adequately protect their vital assets, according to the 2020 <a href=\"https:\/\/www.isc2.org\/-\/media\/ISC2\/Research\/2020\/Workforce-Study\/ISC2ResearchDrivenWhitepaperFINAL.ashx?la=en&amp;hash=2879EE167ACBA7100C330429C7EBC623BAF4E07B\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">(ISC)\u00b2 Cybersecurity Workforce Study<\/a>.<\/p>\n<p>As a result, for budget-conscious businesses that want to achieve the best possible security posture and access high-level expertise without breaking the bank, outsourcing cybersecurity to a managed service provider makes a lot of sense. Here are just a few key ways that outsourcing cybersecurity can contain costs for your business.<\/p>\n<h2>1. Lower staffing costs.<\/h2>\n<p>If you maintain an in-house cybersecurity team, that means shouldering all the costs associated with the recruiting and hiring process, turnover, vacation and sick days, and all other personnel-related spending. Because of the aforementioned security professional shortage, it\u2019s also difficult to find and retain top talent. By outsourcing cybersecurity, you\u2019ll get on-demand access to a team of experts and even <a href=\"https:\/\/www.stratospherenetworks.com\/virtual-chief-security-officer.html\" target=\"_blank\" rel=\"noopener\">virtual CISO services<\/a> for a fraction of the cost of internal staff.<\/p>\n<h2>2. Less breach-related financial fallout.<\/h2>\n<p>If cybercriminals get past your defenses, it\u2019s vital to identify, contain and eliminate the threat ASAP to avoid significant damages. Working with a <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-a-managed-security-service-provider-mssp-can-help-your-business-become-more-sustainable\/\" target=\"_blank\" rel=\"noopener\">Managed Security Service Provider (MSSP)<\/a> that offers <a href=\"https:\/\/www.stratospherenetworks.com\/incident-response-services-case-study.html\" target=\"_blank\" rel=\"noopener\">incident response services<\/a> can make a huge difference for your company: Containing a breach in under 200 days versus more than 200 saves the affected organization $1 million on average, according to the <a href=\"https:\/\/www.ibm.com\/security\/digital-assets\/cost-data-breach-report\/#\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">2020 Cost of a Data Breach Report from IBM Security<\/a>.<\/p>\n<h2>3. Less downtime.<\/h2>\n<p>Outsourcing cybersecurity to a managed service provider that employs a comprehensive, multi-layered approach involving advanced tools (e.g., <a href=\"https:\/\/www.stratospherenetworks.com\/managed-detection-and-response.html\" target=\"_blank\" rel=\"noopener\">managed detection and response<\/a> and <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/secure-access-service-edge-faq-the-benefits-of-sase-for-your-business\/\" target=\"_blank\" rel=\"noopener\">secure access service edge<\/a>) and incident response triage services will also minimize the amount of downtime your business experiences due to breaches \u2013 which means greater productivity and lower costs related to security issues.<\/p>\n<p>For example, one client came to us in urgent need of assistance after ransomware infected their IT environment and encrypted their servers. Although the client wasn\u2019t utilizing our managed cybersecurity services at the time, our incident response team was still able to get them back up and running in just two and a half days. You can read the story in detail here: <a href=\"https:\/\/www.stratospherenetworks.com\/incident-response-services-case-study.html\" target=\"_blank\" rel=\"noopener\">Security Incident Response for HVAC\/R Industry Warranty Solutions Provider<\/a><\/p>\n<p>Ultimately, outsourcing cybersecurity can help you spend less while still maintaining the highest possible level of data and network protection. If you\u2019d like to learn more about how managed cybersecurity solutions and services could potentially benefit your business, our team would be happy to answer any questions you might have. Just give us a call at 877-599-3999 or email <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With more vaccines distributed every day and many businesses reopening, there\u2019s hopefully plenty to look forward to as 2021 continues to unfold and it becomes safe to lift some of our pandemic-related restrictions. However, there\u2019s one area in which companies &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":4330,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[192],"tags":[],"class_list":["post-4329","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-tips"],"yoast_head":"<title>Cut Costs by Outsourcing Cybersecurity | Managed IT Security<\/title>\n<meta name=\"description\" content=\"For companies looking to rein in spending while still achieving optimal security, outsourcing cybersecurity can contain costs in key ways.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cut Costs by Outsourcing Cybersecurity | Managed IT Security\" \/>\n<meta property=\"og:description\" content=\"For companies looking to rein in spending while still achieving optimal security, outsourcing cybersecurity can contain costs in key ways.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-13T12:48:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-cost-cutting-strat.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2121\" \/>\n\t<meta property=\"og:image:height\" content=\"1414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Steve Melchiorre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve Melchiorre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/\"},\"author\":{\"name\":\"Steve Melchiorre\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e\"},\"headline\":\"How Outsourcing Cybersecurity Can Contain Costs\",\"datePublished\":\"2021-04-13T12:48:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/\"},\"wordCount\":624,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-cost-cutting-strat.jpg\",\"articleSection\":[\"IT Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/\",\"name\":\"Cut Costs by Outsourcing Cybersecurity | Managed IT Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-cost-cutting-strat.jpg\",\"datePublished\":\"2021-04-13T12:48:47+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e\"},\"description\":\"For companies looking to rein in spending while still achieving optimal security, outsourcing cybersecurity can contain costs in key ways.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-cost-cutting-strat.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-cost-cutting-strat.jpg\",\"width\":2121,\"height\":1414,\"caption\":\"Financial documents with a calculator and pen on top in the foreground, symbolizing budgeting.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Outsourcing Cybersecurity Can Contain Costs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e\",\"name\":\"Steve Melchiorre\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aaa5cea4658bc449a41012c1a4ae71a2c1803babf8ec3254c2ee67fdfad0e5de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aaa5cea4658bc449a41012c1a4ae71a2c1803babf8ec3254c2ee67fdfad0e5de?s=96&d=mm&r=g\",\"caption\":\"Steve Melchiorre\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/stevemelchiorre\/\"}]}<\/script>","yoast_head_json":{"title":"Cut Costs by Outsourcing Cybersecurity | Managed IT Security","description":"For companies looking to rein in spending while still achieving optimal security, outsourcing cybersecurity can contain costs in key ways.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/","og_locale":"en_US","og_type":"article","og_title":"Cut Costs by Outsourcing Cybersecurity | Managed IT Security","og_description":"For companies looking to rein in spending while still achieving optimal security, outsourcing cybersecurity can contain costs in key ways.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2021-04-13T12:48:47+00:00","og_image":[{"width":2121,"height":1414,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-cost-cutting-strat.jpg","type":"image\/jpeg"}],"author":"Steve Melchiorre","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Steve Melchiorre","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/"},"author":{"name":"Steve Melchiorre","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e"},"headline":"How Outsourcing Cybersecurity Can Contain Costs","datePublished":"2021-04-13T12:48:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/"},"wordCount":624,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-cost-cutting-strat.jpg","articleSection":["IT Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/","name":"Cut Costs by Outsourcing Cybersecurity | Managed IT Security","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-cost-cutting-strat.jpg","datePublished":"2021-04-13T12:48:47+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e"},"description":"For companies looking to rein in spending while still achieving optimal security, outsourcing cybersecurity can contain costs in key ways.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-cost-cutting-strat.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-cost-cutting-strat.jpg","width":2121,"height":1414,"caption":"Financial documents with a calculator and pen on top in the foreground, symbolizing budgeting."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-outsourcing-cybersecurity-can-contain-costs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How Outsourcing Cybersecurity Can Contain Costs"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e","name":"Steve Melchiorre","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/aaa5cea4658bc449a41012c1a4ae71a2c1803babf8ec3254c2ee67fdfad0e5de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aaa5cea4658bc449a41012c1a4ae71a2c1803babf8ec3254c2ee67fdfad0e5de?s=96&d=mm&r=g","caption":"Steve Melchiorre"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/stevemelchiorre\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4329"}],"version-history":[{"count":3,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4329\/revisions"}],"predecessor-version":[{"id":4333,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4329\/revisions\/4333"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/4330"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}