{"id":4851,"date":"2021-12-06T10:08:43","date_gmt":"2021-12-06T15:08:43","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=4851"},"modified":"2021-12-06T10:08:43","modified_gmt":"2021-12-06T15:08:43","slug":"3-key-benefits-of-outsourcing-security-policy-writing","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/","title":{"rendered":"3 Key Benefits of Outsourcing Security Policy Writing"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-4852\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/12\/policy-writing-illustration-300x204.jpg\" alt=\"An illustration of a large clipboard that says POLICIES on it, with two small people looking at it. \" width=\"300\" height=\"204\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/12\/policy-writing-illustration-300x204.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/12\/policy-writing-illustration-1024x696.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/12\/policy-writing-illustration-768x522.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/12\/policy-writing-illustration-1536x1044.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/12\/policy-writing-illustration-2048x1393.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/12\/policy-writing-illustration-200x136.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>The <a href=\"https:\/\/arapahoelibraries.org\/blogs\/post\/the-only-constant-in-life-is-change-heraclitus\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Greek philosopher Heraclitus<\/a> observed, \u201cThe only constant in life is change.\u201d At this point,\u00a0however, you could say that there\u2019s another constant in life: cybercrime. The past year provides plenty of proof, with the number of publicly reported data breaches through September 30 outpacing the volume of incidents reported during the entire year of 2020 (1,291 breaches versus 1,108), according to the <a href=\"https:\/\/www.idtheftcenter.org\/identity-theft-resource-center-to-share-latest-data-breach-analysis-with-u-s-senate-commerce-committee-number-of-data-breaches-in-2021-surpasses-all-of-2020\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Identity Theft Resource Center<\/a>.<\/p>\n<p>If you want to keep your data breach risk level as low as possible, your best bet is to maintain a comprehensive and current <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-services.html\" target=\"_blank\" rel=\"noopener\">cybersecurity<\/a> program. However, you can\u2019t build a solid program without first laying the foundation with a thorough information security policy.<\/p>\n<h2>Why Do Companies Need an Information Security Policy?<\/h2>\n<p>Given how rapidly cybersecurity threats evolve, it\u2019s imperative to employ a proactive rather than reactive approach to safeguarding your network and data. To properly <a href=\"https:\/\/www.stratospherenetworks.com\/infrastructure-ebook.html\" target=\"_blank\" rel=\"noopener\">secure your IT environment<\/a>, you need to ensure you know which assets need protection, what acceptable utilization of electronic media looks like for your company, and the proper course of action to take if a breach occurs. A corporate IT security policy delineates all of those details, according to the SANS Institute white paper \u201c<a href=\"https:\/\/www.sans.org\/white-papers\/503\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">A Preparation Guide to Information Security Policies<\/a>\u201d by David Jarmon.<\/p>\n<p>\u201cA security policy is needed to inform users and staff members of the need and their responsibility to protect the organization\u2019s technology and critical information,\u201d Jarmon writes.<\/p>\n<p>Additionally, he notes that you can\u2019t have a lasting, successful security program without an information security policy. Otherwise, you\u2019ll find it difficult to conduct audits and ensure your staff members adhere to acceptable use guidelines.<\/p>\n<h2>Reasons to Outsource Security Policy Writing<\/h2>\n<p>A proper security policy can cover many topics, including everything from the specification of the most significant threats to your organization to Bring Your Own Device (BYOD) guidelines. It takes time, in-depth cybersecurity knowledge, and writing skills to produce a policy that will lay the groundwork for successful governance, risk management and <a href=\"https:\/\/www.stratospherenetworks.com\/managed-compliance-services.html\" target=\"_blank\" rel=\"noopener\">compliance<\/a>.<\/p>\n<p>Unless you have an extensive in-house security team, it makes sense to outsource security policy writing. Here are a few of the most notable benefits of turning to a third-party provider for this service.<\/p>\n<p><strong>1. Access to high-level security expertise. <\/strong>By outsourcing security policy writing, you can gain guidance from experienced cybersecurity professionals without investing the time and funds necessary to hire in-house executives (e.g., a CISO or chief compliance officer).<\/p>\n<p><strong>2. Increased productivity. <\/strong>You\u2019ll free up your internal staff members to focus on other projects.<\/p>\n<p><strong>3. Lower data breach risk. <\/strong>With an information security policy meticulously written by industry experts, you\u2019ll lower your odds of experiencing an expensive and reputation-damaging security incident.<\/p>\n<p>If you\u2019re sold on the idea of <a href=\"https:\/\/www.stratospherenetworks.com\/security-policy-writing-as-a-service.html\" target=\"_blank\" rel=\"noopener\">outsourcing security policy writing<\/a>, our advisors can leverage their experience and expertise to help you find a best-in-class provider that can craft a policy that aligns with your goals, cybersecurity requirements and compliance needs. For details, give us a call at 877-599-3999 or email <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Greek philosopher Heraclitus observed, \u201cThe only constant in life is change.\u201d At this point,\u00a0however, you could say that there\u2019s another constant in life: cybercrime. The past year provides plenty of proof, with the number of publicly reported data breaches &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":4852,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-4851","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>3 Reasons to Outsource Information Security Policy Writing<\/title>\n<meta name=\"description\" content=\"Security policy writing is time-consuming and requires high-level expertise. Save your team time and money by outsourcing the task.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Reasons to Outsource Information Security Policy Writing\" \/>\n<meta property=\"og:description\" content=\"Security policy writing is time-consuming and requires high-level expertise. Save your team time and money by outsourcing the task.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-06T15:08:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/12\/policy-writing-illustration.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2100\" \/>\n\t<meta property=\"og:image:height\" content=\"1428\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"3 Key Benefits of Outsourcing Security Policy Writing\",\"datePublished\":\"2021-12-06T15:08:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/\"},\"wordCount\":506,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/12\/policy-writing-illustration.jpg\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/\",\"name\":\"3 Reasons to Outsource Information Security Policy Writing\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/12\/policy-writing-illustration.jpg\",\"datePublished\":\"2021-12-06T15:08:43+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"Security policy writing is time-consuming and requires high-level expertise. Save your team time and money by outsourcing the task.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/12\/policy-writing-illustration.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/12\/policy-writing-illustration.jpg\",\"width\":2100,\"height\":1428,\"caption\":\"An illustration of a large clipboard that says POLICIES on it, with two small people looking at it.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 Key Benefits of Outsourcing Security Policy Writing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"3 Reasons to Outsource Information Security Policy Writing","description":"Security policy writing is time-consuming and requires high-level expertise. Save your team time and money by outsourcing the task.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/","og_locale":"en_US","og_type":"article","og_title":"3 Reasons to Outsource Information Security Policy Writing","og_description":"Security policy writing is time-consuming and requires high-level expertise. Save your team time and money by outsourcing the task.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2021-12-06T15:08:43+00:00","og_image":[{"width":2100,"height":1428,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/12\/policy-writing-illustration.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"3 Key Benefits of Outsourcing Security Policy Writing","datePublished":"2021-12-06T15:08:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/"},"wordCount":506,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/12\/policy-writing-illustration.jpg","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/","name":"3 Reasons to Outsource Information Security Policy Writing","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/12\/policy-writing-illustration.jpg","datePublished":"2021-12-06T15:08:43+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"Security policy writing is time-consuming and requires high-level expertise. Save your team time and money by outsourcing the task.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/12\/policy-writing-illustration.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/12\/policy-writing-illustration.jpg","width":2100,"height":1428,"caption":"An illustration of a large clipboard that says POLICIES on it, with two small people looking at it."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/3-key-benefits-of-outsourcing-security-policy-writing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"3 Key Benefits of Outsourcing Security Policy Writing"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4851"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4851\/revisions"}],"predecessor-version":[{"id":4854,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4851\/revisions\/4854"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/4852"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}