{"id":5151,"date":"2022-05-13T14:31:15","date_gmt":"2022-05-13T19:31:15","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=5151"},"modified":"2022-05-13T14:31:15","modified_gmt":"2022-05-13T19:31:15","slug":"how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/","title":{"rendered":"How to ensure remote workers follow security guidelines: 4 tips for cybersecurity policy compliance"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft wp-image-5152 size-medium\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/05\/home-office-security-strat-photo-300x169.jpg\" alt=\"Close up of a keyboard with one key that has a house symbol and says &quot;HOME OFFICE,&quot; while the key next to it has a symbol of an unlocked padlock.\" width=\"300\" height=\"169\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/05\/home-office-security-strat-photo-300x169.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/05\/home-office-security-strat-photo-1024x576.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/05\/home-office-security-strat-photo-768x432.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/05\/home-office-security-strat-photo-1536x864.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/05\/home-office-security-strat-photo-2048x1152.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/05\/home-office-security-strat-photo-200x113.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>You\u2019ve probably heard the proverb, \u201cYou can lead a horse to water, but you can\u2019t make it drink.\u201d Similarly, you can mandate that your <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-your-business-needs-a-secure-remote-work-strategy-to-survive\/\" target=\"_blank\" rel=\"noopener\">remote workers<\/a> undergo security awareness training, but if they aren\u2019t properly motivated to <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/\" target=\"_blank\" rel=\"noopener\">comply with your guidelines<\/a>, they won\u2019t necessarily adhere to your standards.<\/p>\n<p>A 2021 survey of office workers around the world who transitioned to remote work during the pandemic found that 76 percent of employees feel working from home eroded the boundary between personal and professional, and 30 percent have let someone else (e.g., a partner or child) use their corporate laptop, according to a <a href=\"https:\/\/threatresearch.ext.hp.com\/hp-wolf-security-blurred-lines-blindspots-report-risky-remote-working\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">report from HP<\/a>.<\/p>\n<p>Additionally, 50 percent say they perceive their work laptop as a personal tool. These statistics demonstrate how remote work has heightened security risk levels and precipitated a dangerous shift in how workers think about the devices they rely on to do their jobs.<\/p>\n<p>Ultimately, <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wfh-could-cost-you-if-you-dont-update-your-security-awareness-training\/\" target=\"_blank\" rel=\"noopener\">establishing security guidelines<\/a> for people working from home and carrying out employee security awareness training, while vital steps in the risk mitigation process, aren\u2019t enough to get staff members to follow best practices for optimal data security.<\/p>\n<p>While you can penalize staff members who don\u2019t adhere to your security standards after the fact, it\u2019s preferable to avoid incidents in the first place by ensuring as much compliance to your company\u2019s policies as possible. Waiting until the aftermath of a security snafu can result in significant monetary damages for your business: The global average total cost of a data breach reached $4.24 million in 2021, up from $3.86 million in 2020, according to <a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">IBM<\/a>.<\/p>\n<p>To increase the odds that your remote staff members will stick to best practices for data security, you\u2019ll need to go beyond achieving awareness and inspire them to care about company-wide cybersecurity. Here are a few steps you can take to motivate your team members working from home to do as much as possible to keep company data safe.<\/p>\n<h2>1. Make it clear what\u2019s at stake.<\/h2>\n<p>Your security awareness training shouldn\u2019t solely cover what remote workers should be doing but also why they should meet those standards, according to <a href=\"https:\/\/xpertechs.com\/2021\/10\/how-to-get-people-to-care-about-cybersecurity\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">XPERTECHS<\/a>. Explain the consequences of a breach that will affect the entire staff \u2013 such as downtime, lost revenue and reputation damage.<\/p>\n<h2>2. Turn it into a competition.<\/h2>\n<p>Gamification is a popular way to get people invested in mundane tasks. One way to increase security policy compliance is to give employees points for setting strong passwords, updating work devices in a timely manner, and other recommended practices, according to <a href=\"https:\/\/www.cybintsolutions.com\/10-tips-to-get-your-employees-to-care-about-cybersecurity\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Cybint<\/a>.<\/p>\n<h2>3. Reward good behavior.<\/h2>\n<p>If you incentivize compliance, your remote workers will likely pay closer attention to recommended security practices. For instance, if an employee successfully spots and reports a phishing email, you can send a company-wide email praising their security savviness, Cybint explains.<\/p>\n<h2>4. Establish consequences for non-compliance.<\/h2>\n<p>While positive reinforcement is preferable, you should also clarify \u00a0that you will reprimand staff members for negligent behavior that compromises security. Create a procedure for dealing with willful non-compliance with remote security standards and ensure your staff members know what will happen if they act recklessly, XPERTECHS recommends.<\/p>\n<p>At the same time, keep in mind that mistakes happen and don\u2019t penalize people who acted in good faith but made unfortunate errors. Otherwise, your team members could cover up missteps instead of reporting them because they fear the repercussions, worsening the whole situation.<\/p>\n<p>If you\u2019d like to learn more about how to minimize your IT security risk level, our <a href=\"https:\/\/www.stratospherenetworks.com\/trusted-advisor.html\" target=\"_blank\" rel=\"noopener\">trusted advisors<\/a> can connect you with leading cybersecurity solution providers. We can also advise you on crafting and maintaining effective security strategies and guidelines for your remote and on-site team members.<\/p>\n<p>For details about our services, please call 877-599-3999 or email <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You\u2019ve probably heard the proverb, \u201cYou can lead a horse to water, but you can\u2019t make it drink.\u201d Similarly, you can mandate that your remote workers undergo security awareness training, but if they aren\u2019t properly motivated to comply with your &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":5152,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[263],"tags":[],"class_list":["post-5151","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-corner"],"yoast_head":"<title>How to improve remote worker security policy compliance<\/title>\n<meta name=\"description\" content=\"These tips will help you increase security policy compliance among remote workers and reduce your odds of experiencing a costly data breach.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to improve remote worker security policy compliance\" \/>\n<meta property=\"og:description\" content=\"These tips will help you increase security policy compliance among remote workers and reduce your odds of experiencing a costly data breach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-13T19:31:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/05\/home-office-security-strat-photo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2309\" \/>\n\t<meta property=\"og:image:height\" content=\"1299\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"How to ensure remote workers follow security guidelines: 4 tips for cybersecurity policy compliance\",\"datePublished\":\"2022-05-13T19:31:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/\"},\"wordCount\":636,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/05\/home-office-security-strat-photo.jpg\",\"articleSection\":[\"Cyber Corner\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/\",\"name\":\"How to improve remote worker security policy compliance\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/05\/home-office-security-strat-photo.jpg\",\"datePublished\":\"2022-05-13T19:31:15+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"These tips will help you increase security policy compliance among remote workers and reduce your odds of experiencing a costly data breach.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/05\/home-office-security-strat-photo.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/05\/home-office-security-strat-photo.jpg\",\"width\":2309,\"height\":1299,\"caption\":\"Close up of a keyboard with one key that has a house symbol and says \\\"HOME OFFICE,\\\" while the key next to it has a symbol of an unlocked padlock.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to ensure remote workers follow security guidelines: 4 tips for cybersecurity policy compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"How to improve remote worker security policy compliance","description":"These tips will help you increase security policy compliance among remote workers and reduce your odds of experiencing a costly data breach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/","og_locale":"en_US","og_type":"article","og_title":"How to improve remote worker security policy compliance","og_description":"These tips will help you increase security policy compliance among remote workers and reduce your odds of experiencing a costly data breach.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2022-05-13T19:31:15+00:00","og_image":[{"width":2309,"height":1299,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/05\/home-office-security-strat-photo.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"How to ensure remote workers follow security guidelines: 4 tips for cybersecurity policy compliance","datePublished":"2022-05-13T19:31:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/"},"wordCount":636,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/05\/home-office-security-strat-photo.jpg","articleSection":["Cyber Corner"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/","name":"How to improve remote worker security policy compliance","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/05\/home-office-security-strat-photo.jpg","datePublished":"2022-05-13T19:31:15+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"These tips will help you increase security policy compliance among remote workers and reduce your odds of experiencing a costly data breach.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/05\/home-office-security-strat-photo.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/05\/home-office-security-strat-photo.jpg","width":2309,"height":1299,"caption":"Close up of a keyboard with one key that has a house symbol and says \"HOME OFFICE,\" while the key next to it has a symbol of an unlocked padlock."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-ensure-remote-workers-follow-security-guidelines-4-tips-for-cybersecurity-policy-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to ensure remote workers follow security guidelines: 4 tips for cybersecurity policy compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5151"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5151\/revisions"}],"predecessor-version":[{"id":5154,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5151\/revisions\/5154"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/5152"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}