{"id":5479,"date":"2022-11-01T14:22:46","date_gmt":"2022-11-01T19:22:46","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=5479"},"modified":"2022-11-01T14:27:59","modified_gmt":"2022-11-01T19:27:59","slug":"still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/","title":{"rendered":"Still haven\u2019t adopted a zero-trust strategy? Here\u2019s why you should ASAP"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-5480\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/11\/network-security-concept-blue-padlock-300x169.jpg\" alt=\"A glowing blue padlock symbolizing cybersecurity.\" width=\"300\" height=\"169\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/11\/network-security-concept-blue-padlock-300x169.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/11\/network-security-concept-blue-padlock-1024x576.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/11\/network-security-concept-blue-padlock-768x432.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/11\/network-security-concept-blue-padlock-1536x864.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/11\/network-security-concept-blue-padlock-2048x1152.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/11\/network-security-concept-blue-padlock-200x113.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>In some contexts, it makes sense to give people the benefit of the doubt instead of regarding them with suspicion. However, in the realm of IT security, skepticism is the way to go, especially when cybercriminals are running rampant.<\/p>\n<p>If your business hasn\u2019t implemented a zero-trust approach, you should reconsider your strategy. As bad actors launch increasingly sophisticated digital assaults against companies of all sizes and widespread remote and hybrid work presents a larger attack surface, zero-trust architecture could prevent a costly crisis for your organization.<\/p>\n<h2>What is a zero-trust system?<\/h2>\n<p>Traditional security strategies involve trusting everyone and everything inside your network implicitly, according to <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-a-zero-trust-architecture\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Palo Alto Networks<\/a>. That means once you\u2019re in, you can move laterally, exfiltrate data, and access everything. By contrast, zero-trust rejects the idea that you can trust end users and entities within your network. Instead, with this \u201cnever trust, always verify\u201d philosophy, zero-trust architecture heightens security for modern companies with the following:<\/p>\n<ul>\n<li>Continuous application monitoring to validate proper communication and behavior<\/li>\n<li>Rigorous user identity authentication<\/li>\n<li>\u201cLeast access\u201d policies<\/li>\n<li>Device integrity checks<\/li>\n<\/ul>\n<p>A proper zero-trust security program will apply to all aspects of your IT environment and infrastructure (e.g., <a href=\"https:\/\/www.stratospherenetworks.com\/cloud-consulting-services.html\" target=\"_blank\" rel=\"noopener\">cloud applications<\/a>, routers, switches, IoT devices, etc.). With micro-segmentation and granular perimeter enforcement according to user characteristics like role and permissions, zero-trust networks ensure end users only have access to the apps and information they need to fulfill their professional obligations, Palo Alto explains. This makes it much harder for anyone with malicious intentions to sneak around your network and access sensitive data.<\/p>\n<h2>Why you should embrace a zero-trust security strategy<\/h2>\n<p>External actors cause 80 percent of breaches, according to <a href=\"https:\/\/www.verizon.com\/business\/resources\/articles\/s\/the-risk-of-insider-threat-actors\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Verizon<\/a>. However, that means the call is still coming from inside the house 20 percent of the time \u2013 and that\u2019s enough to merit limiting internal end users\u2019 access to only the resources they truly need.<\/p>\n<p>The financial damages associated with security incidents are also significant, especially for companies with remote and hybrid work arrangements: <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">IBM reported<\/a> that the average total cost of a data breach worldwide hit an all-time high of $4.35 million this year.<\/p>\n<p>However, organizations with zero-trust security frameworks saved almost $1 million in average breach costs compared to those without zero-trust in place.<\/p>\n<p>The bottom line is that bad actors are bound to target your business sooner or later \u2013 and they could act from within your network. Adopting a zero-trust approach today could save you millions and preserve your reputation tomorrow.<br \/>\n<strong>\u00a0\u00a0\u00a0 <\/strong><br \/>\nIf you want to learn more about deploying a zero-trust security strategy for your business, our <a href=\"https:\/\/www.stratospherenetworks.com\/trusted-advisor.html\" target=\"_blank\" rel=\"noopener\">trusted advisors<\/a> can assist you. We can leverage our IT security experience and connect you with the best <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-services.html\" target=\"_blank\" rel=\"noopener\">managed cybersecurity service provider<\/a> for your organization after assessing your needs and objectives.<\/p>\n<p>Explore our advisory process today by calling 877-599-3999 or emailing\u00a0<a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In some contexts, it makes sense to give people the benefit of the doubt instead of regarding them with suspicion. However, in the realm of IT security, skepticism is the way to go, especially when cybercriminals are running rampant. If &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":5480,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[372],"tags":[],"class_list":["post-5479","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-consulting-review"],"yoast_head":"<title>Why you should adopt zero trust ASAP<\/title>\n<meta name=\"description\" content=\"A zero-trust security strategy can minimize your data breach risk and significantly reduce the damage if bad actors infiltrate your network.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why you should adopt zero trust ASAP\" \/>\n<meta property=\"og:description\" content=\"A zero-trust security strategy can minimize your data breach risk and significantly reduce the damage if bad actors infiltrate your network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-01T19:22:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-01T19:27:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/11\/network-security-concept-blue-padlock.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2309\" \/>\n\t<meta property=\"og:image:height\" content=\"1299\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Steve Melchiorre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve Melchiorre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/\"},\"author\":{\"name\":\"Steve Melchiorre\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e\"},\"headline\":\"Still haven\u2019t adopted a zero-trust strategy? Here\u2019s why you should ASAP\",\"datePublished\":\"2022-11-01T19:22:46+00:00\",\"dateModified\":\"2022-11-01T19:27:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/\"},\"wordCount\":481,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/11\/network-security-concept-blue-padlock.jpg\",\"articleSection\":[\"IT Consulting Review\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/\",\"name\":\"Why you should adopt zero trust ASAP\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/11\/network-security-concept-blue-padlock.jpg\",\"datePublished\":\"2022-11-01T19:22:46+00:00\",\"dateModified\":\"2022-11-01T19:27:59+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e\"},\"description\":\"A zero-trust security strategy can minimize your data breach risk and significantly reduce the damage if bad actors infiltrate your network.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/11\/network-security-concept-blue-padlock.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/11\/network-security-concept-blue-padlock.jpg\",\"width\":2309,\"height\":1299,\"caption\":\"A glowing blue padlock symbolizing cybersecurity.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Still haven\u2019t adopted a zero-trust strategy? Here\u2019s why you should ASAP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e\",\"name\":\"Steve Melchiorre\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aaa5cea4658bc449a41012c1a4ae71a2c1803babf8ec3254c2ee67fdfad0e5de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aaa5cea4658bc449a41012c1a4ae71a2c1803babf8ec3254c2ee67fdfad0e5de?s=96&d=mm&r=g\",\"caption\":\"Steve Melchiorre\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/stevemelchiorre\/\"}]}<\/script>","yoast_head_json":{"title":"Why you should adopt zero trust ASAP","description":"A zero-trust security strategy can minimize your data breach risk and significantly reduce the damage if bad actors infiltrate your network.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/","og_locale":"en_US","og_type":"article","og_title":"Why you should adopt zero trust ASAP","og_description":"A zero-trust security strategy can minimize your data breach risk and significantly reduce the damage if bad actors infiltrate your network.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2022-11-01T19:22:46+00:00","article_modified_time":"2022-11-01T19:27:59+00:00","og_image":[{"width":2309,"height":1299,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/11\/network-security-concept-blue-padlock.jpg","type":"image\/jpeg"}],"author":"Steve Melchiorre","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Steve Melchiorre","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/"},"author":{"name":"Steve Melchiorre","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e"},"headline":"Still haven\u2019t adopted a zero-trust strategy? Here\u2019s why you should ASAP","datePublished":"2022-11-01T19:22:46+00:00","dateModified":"2022-11-01T19:27:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/"},"wordCount":481,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/11\/network-security-concept-blue-padlock.jpg","articleSection":["IT Consulting Review"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/","name":"Why you should adopt zero trust ASAP","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/11\/network-security-concept-blue-padlock.jpg","datePublished":"2022-11-01T19:22:46+00:00","dateModified":"2022-11-01T19:27:59+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e"},"description":"A zero-trust security strategy can minimize your data breach risk and significantly reduce the damage if bad actors infiltrate your network.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/11\/network-security-concept-blue-padlock.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/11\/network-security-concept-blue-padlock.jpg","width":2309,"height":1299,"caption":"A glowing blue padlock symbolizing cybersecurity."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/still-havent-adopted-a-zero-trust-strategy-heres-why-you-should-asap\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Still haven\u2019t adopted a zero-trust strategy? Here\u2019s why you should ASAP"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e","name":"Steve Melchiorre","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/aaa5cea4658bc449a41012c1a4ae71a2c1803babf8ec3254c2ee67fdfad0e5de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aaa5cea4658bc449a41012c1a4ae71a2c1803babf8ec3254c2ee67fdfad0e5de?s=96&d=mm&r=g","caption":"Steve Melchiorre"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/stevemelchiorre\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5479"}],"version-history":[{"count":3,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5479\/revisions"}],"predecessor-version":[{"id":5482,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5479\/revisions\/5482"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/5480"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}