{"id":4334,"date":"2021-04-14T15:06:42","date_gmt":"2021-04-14T20:06:42","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=4334"},"modified":"2021-04-14T15:06:42","modified_gmt":"2021-04-14T20:06:42","slug":"tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/","title":{"rendered":"Tactics Over Tools: Why Strategy Needs to Come Before Solutions for Optimal Security"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-4335\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-strategy-strat-300x200.jpg\" alt=\"A pyramid of wooden blocks with arrows pointed on them progressing upward, with a hand placing a block with a target printed on it at the top.\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-strategy-strat-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-strategy-strat-1024x683.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-strategy-strat-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-strategy-strat-1536x1024.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-strategy-strat-2048x1365.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-strategy-strat-200x133.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>You&#8217;re probably familiar with Aesop&#8217;s famous fable, &#8220;<a class=\"external-link external external_icon\" href=\"http:\/\/read.gov\/aesop\/025.html\" target=\"_blank\" rel=\"nofollow noopener\">The Hare and the Tortoise<\/a>,&#8221; in which the hare agrees to race the tortoise, confident that he&#8217;ll win easily. He dashes far ahead of his rival and is so sure of his victory that he decides to take a nap. However, the tortoise progresses slowly but steadily, passes the snoozing hare, and ultimately wins the race.<\/p>\n<p>This classic tale illustrates that the way you approach a challenge can matter much more than the tools or capabilities at your disposal. The hare had\u00a0all the right &#8220;technology&#8221; to come out on top, which fueled his arrogant attitude and led him to put less effort into his strategy.\u00a0We can apply this lesson to many other areas of life, including cybersecurity and data breach prevention: You can&#8217;t simply install a bunch of next-gen solutions and sit back, confident that they&#8217;ll be enough to achieve your end goal of optimal security posture. All the tools in the world won&#8217;t save you from a steady barrage of cyberattacks if you don&#8217;t have the right processes in place first and a well-rounded strategy as your foundation.<\/p>\n<h2>Tools Are Toothless Without the Right Strategy<\/h2>\n<p>While cutting-edge solutions can make a difference when leveraged properly, more tools don&#8217;t necessarily equal better security. A survey of over 3,400 security and IT professionals worldwide found that organizations utilizing the most security tools (over 50) ranked themselves as 7 percent lower in responding to an attack and 8 percent lower in their cyberattack detection capabilities compared to those using fewer than 50 solutions, according to the\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/newsroom.ibm.com\/2020-06-30-IBM-Study-Security-Response-Planning-on-the-Rise-But-Containing-Attacks-Remains-an-Issue\" target=\"_blank\" rel=\"nofollow noopener\">2020 Cyber Resilient Organization Report from IBM Security<\/a>.<\/p>\n<p>One of the factors that contributed to better\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/cybersecurity-incident-response-services-faq-why-preparing-for-a-potential-data-breach-matters-now-more-than-ever\/\" target=\"_blank\" rel=\"nofollow noopener\">incident response capabilities<\/a>\u00a0was formal planning, according to the report. Only 39\u00a0percent of\u00a0survey respondents with a formal cybersecurity incident response plan (CSIRP) reported suffering an incident that significantly disrupted their business during the past two years, compared to 62 percent of those lacking an official CSIRP.<\/p>\n<p>These survey findings highlight the pitfalls of focusing on tools without thinking about strategy first. There&#8217;s a dizzying array of cybersecurity solutions currently available, and adopting a bunch of them without figuring out the best way to approach security first can leave you lost and less able to safeguard your network and data than you would be with better processes and fewer tools.<\/p>\n<h2>How to Achieve Optimal Cybersecurity With a Strategy-First Approach<\/h2>\n<p>Early in my career, someone mentioned an aphorism to me in passing. It has always stuck with me; call it an operational proverb of sorts.<\/p>\n<p>&#8220;To automate a process, you need to actually\u00a0<em>have<\/em>\u00a0a process in the first place!&#8221;<\/p>\n<p>If you want to achieve the highest possible level of security, it&#8217;s vital to formally establish internal processes for information security,\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/backup-continuity-and-disaster-recovery-as-a-service.html\" target=\"_blank\" rel=\"nofollow noopener\">disaster recovery<\/a>\u00a0and\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/cybersecurity-incident-response.html\" target=\"_blank\" rel=\"nofollow noopener\">incident response<\/a>. You&#8217;ll want to work with a team of high-level experts to get those processes in place \u2013 a\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-a-managed-security-service-provider-mssp-can-help-your-business-become-more-sustainable\/\" target=\"_blank\" rel=\"nofollow noopener\">Managed Security Service Provider (MSSP)<\/a>\u00a0like Stratosphere Networks can provide guidance.<\/p>\n<p>Additionally, to create and maintain a thorough security strategy, you&#8217;ll need to routinely assess your risk level and points of vulnerability. A\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/it-security-assessment-offering.html\" target=\"_blank\" rel=\"nofollow noopener\">comprehensive risk assessment<\/a>\u00a0is a\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/security-assessments-serve-as-a-great-starting-point-for-businesses-looking-to-lower-risk-levels\/\" target=\"_blank\" rel=\"nofollow noopener\">great first step<\/a>\u00a0on the path to more effective data and network protection. Once you have a clear idea of where you currently stand and have formally defined all the important procedures, then you&#8217;ll be able to determine which tools you need to safeguard your organization and learn the best ways to leverage them to achieve your objectives.<\/p>\n<p>If you&#8217;d like to learn more about how to establish a comprehensive cybersecurity strategy, our team has extensive experience advising our\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-services.html\" target=\"_blank\" rel=\"nofollow noopener\">managed cybersecurity<\/a>\u00a0clients and would be happy to assist you. Feel free to give us a call at 877-599-3999 or email\u00a0<a class=\"external-link\" href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"nofollow noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You&#8217;re probably familiar with Aesop&#8217;s famous fable, &#8220;The Hare and the Tortoise,&#8221; in which the hare agrees to race the tortoise, confident that he&#8217;ll win easily. He dashes far ahead of his rival and is so sure of his victory &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":4335,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[263],"tags":[],"class_list":["post-4334","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-corner"],"yoast_head":"<title>Cybersecurity Strategy (Not Tools) Should Come First<\/title>\n<meta name=\"description\" content=\"Implementing tools without first establishing information security processes can hurt your company. Cybersecurity strategy needs to come first.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Strategy (Not Tools) Should Come First\" \/>\n<meta property=\"og:description\" content=\"Implementing tools without first establishing information security processes can hurt your company. Cybersecurity strategy needs to come first.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-14T20:06:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-strategy-strat.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2121\" \/>\n\t<meta property=\"og:image:height\" content=\"1414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"Tactics Over Tools: Why Strategy Needs to Come Before Solutions for Optimal Security\",\"datePublished\":\"2021-04-14T20:06:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/\"},\"wordCount\":629,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-strategy-strat.jpg\",\"articleSection\":[\"Cyber Corner\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/\",\"name\":\"Cybersecurity Strategy (Not Tools) Should Come First\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-strategy-strat.jpg\",\"datePublished\":\"2021-04-14T20:06:42+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"Implementing tools without first establishing information security processes can hurt your company. Cybersecurity strategy needs to come first.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-strategy-strat.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-strategy-strat.jpg\",\"width\":2121,\"height\":1414,\"caption\":\"Hand putting print screen dart and target board wooden cube on up arrows. Target of investment and business concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tactics Over Tools: Why Strategy Needs to Come Before Solutions for Optimal Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"Cybersecurity Strategy (Not Tools) Should Come First","description":"Implementing tools without first establishing information security processes can hurt your company. Cybersecurity strategy needs to come first.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Strategy (Not Tools) Should Come First","og_description":"Implementing tools without first establishing information security processes can hurt your company. Cybersecurity strategy needs to come first.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2021-04-14T20:06:42+00:00","og_image":[{"width":2121,"height":1414,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-strategy-strat.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"Tactics Over Tools: Why Strategy Needs to Come Before Solutions for Optimal Security","datePublished":"2021-04-14T20:06:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/"},"wordCount":629,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-strategy-strat.jpg","articleSection":["Cyber Corner"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/","name":"Cybersecurity Strategy (Not Tools) Should Come First","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-strategy-strat.jpg","datePublished":"2021-04-14T20:06:42+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"Implementing tools without first establishing information security processes can hurt your company. Cybersecurity strategy needs to come first.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-strategy-strat.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/cyber-strategy-strat.jpg","width":2121,"height":1414,"caption":"Hand putting print screen dart and target board wooden cube on up arrows. Target of investment and business concept."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/tactics-over-tools-why-strategy-needs-to-come-before-solutions-for-optimal-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Tactics Over Tools: Why Strategy Needs to Come Before Solutions for Optimal Security"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4334"}],"version-history":[{"count":3,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4334\/revisions"}],"predecessor-version":[{"id":4338,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4334\/revisions\/4338"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/4335"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}