{"id":5854,"date":"2023-04-27T09:04:51","date_gmt":"2023-04-27T14:04:51","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=5854"},"modified":"2023-04-27T09:04:51","modified_gmt":"2023-04-27T14:04:51","slug":"how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/","title":{"rendered":"How to calculate your risk appetite: Accepting the impossibility of flawless IT security"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-5855\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2023\/04\/risk-control-knob--300x169.jpg\" alt=\"A dial against a red background labeled &quot;Risk&quot; with a range of low to high. The dial is set midway between the two extremes.\" width=\"300\" height=\"169\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2023\/04\/risk-control-knob--300x169.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2023\/04\/risk-control-knob--1024x576.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2023\/04\/risk-control-knob--768x432.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2023\/04\/risk-control-knob--1536x864.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2023\/04\/risk-control-knob--2048x1152.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2023\/04\/risk-control-knob--200x113.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>In the world of cybersecurity, the pursuit of perfection is a futile endeavor. You could devote every last cent of your company\u2019s budget to fending off threats and still get hacked tomorrow, Gartner Distinguished VP Analyst Paul Proctor explained in a webinar titled \u201c<a href=\"https:\/\/webinar.gartner.com\/458795\/agenda\/session\/1082738?login=ML\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Treat Cybersecurity as a Business Investment for Better Outcomes<\/a>.\u201d<\/p>\n<p>He went on to note that when auditors determine penalties following a breach, they\u2019re aware that \u201ceverybody gets hacked.\u201d It\u2019s impossible to avoid the relentless flood of cybercrime: The global volume of cyberattacks hit a new record high in the fourth quarter of 2022, reaching 1,168 weekly cyberattacks per organization on average, according to <a href=\"https:\/\/blog.checkpoint.com\/2023\/01\/05\/38-increase-in-2022-global-cyberattacks\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Check Point Research<\/a>.<\/p>\n<p>With everyone facing a bombardment of attacks, what matters to regulators is the <a href=\"https:\/\/www.gartner.com\/en\/articles\/4-metrics-that-prove-your-cybersecurity-program-works\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">CARE standard<\/a> \u2013 i.e., having security controls that are consistent, adequate, reasonable, and effective.<\/p>\n<p>\u201cIt\u2019s not about whether you get hacked or not,\u201d Proctor said. \u201cIt\u2019s about whether you have the right level of protection.\u201d<\/p>\n<p>Finding that ideal level involves calculating your organization\u2019s \u201crisk appetite.\u201d However, many businesses don\u2019t have a proper scale to measure how much IT security risk they\u2019re willing and able to stomach. If you haven\u2019t yet assessed your appetite, here\u2019s everything you need to know about defining it and why it\u2019s a crucial part of your cybersecurity strategy.<\/p>\n<h2>What is risk appetite and why does it matter?<\/h2>\n<p>Risk appetite is \u201cthe amount of risk an entity (i.e., enterprise, organizations, public or private organizations) is willing to take to achieve its strategic objectives,\u201d according to the ISACA article \u201c<a href=\"https:\/\/www.isaca.org\/resources\/news-and-trends\/newsletters\/atisaca\/2020\/volume-8\/tips-for-setting-or-evaluating-risk-appetite\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Tips for Setting or Evaluating Risk Appetite<\/a>\u201d by Lisa Young, CISA, CISM, CISSP, a senior metrics engineer at Netflix and (ISC)\u00b2 Board of Directors member.<\/p>\n<p>Effective enterprise risk management involves crafting a risk appetite statement at a high level for your company. You must clearly communicate this statement across the organization and serve as a framework for making decisions and policies, establishing boundaries for reasonable behavior that balances taking risks with achieving desired outcomes. It will also help your company prove to regulators that you\u2019ve taken steps to proactively manage IT security risks, according to the McKinsey &amp; Company article \u201c<a href=\"https:\/\/www.mckinsey.com\/capabilities\/risk-and-resilience\/our-insights\/cybersecurity\/creating-a-technology-risk-and-cyber-risk-appetite-framework\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Creating a technology risk and cyber risk appetite framework<\/a>.\u201d<\/p>\n<p>Similarly, the <a href=\"https:\/\/www.fairinstitute.org\/blog\/risk-appetite-vs.-risk-tolerance.-whats-the-difference\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Factor Analysis of Information Risk (FAIR) <sup>TM \u00a0<\/sup>Institute<\/a> states that risk appetite is an acceptable \u201ctarget level of loss exposure\u201d for your organization, taking your resources and goals into account. Meanwhile, \u201crisk tolerance\u201d is the amount of variance you\u2019ll accept from your defined risk appetite. Your risk appetite is like a speed limit on the highway, whereas the risk tolerance is the amount you can drive over or under the limit (e.g., 5 miles per hour) without receiving a ticket, according to the FAIR Institute.<\/p>\n<h2>Determining your cybersecurity risk appetite: 9 key factors to consider<\/h2>\n<p>When you define your company\u2019s risk appetite, you should consider the following crucial factors, according to McKinsey &amp; Company, ISACA, and the FAIR Institute.<\/p>\n<ol>\n<li>Your current cyber insurance coverage<\/li>\n<li>The maximum amount of downtime tolerable for each business-critical system<\/li>\n<li>The maximum number of confidential records you\u2019re willing to accept exposure of in the event of a data breach<\/li>\n<li>The impact of previous significant security incidents affecting your organization<\/li>\n<li>The maximum total financial loss acceptable for your business<\/li>\n<li>Regulatory compliance requirements<\/li>\n<li>Potential health and safety impacts of security incidents<\/li>\n<li>High-level organizational objectives that you must balance with security<\/li>\n<li>Overall capabilities to enforce your risk appetite and security controls<\/li>\n<\/ol>\n<h2>Lighten the workload with managed security services<\/h2>\n<p>Effectively managing security risks can prove incredibly challenging, given how quickly the cybersecurity solution and threat landscapes change. Working with a third-party security service provider to define your risk appetite and tolerance can lessen the workload for your in-house IT and cybersecurity staff and ensure you have access to cutting-edge solutions and expertise. With our background as a former <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-services.html\" target=\"_blank\" rel=\"noopener\">managed security service provider (MSSP)<\/a>, we can leverage our experience and extensive partner network to streamline the process of finding a partner capable of meeting your organization\u2019s unique needs. Instead of spending dozens of hours researching your options and arranging demos and meetings, let us do all the homework for you.<\/p>\n<p>Take the first step toward enhanced security today by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a> to schedule a meeting with our consultants.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the world of cybersecurity, the pursuit of perfection is a futile endeavor. You could devote every last cent of your company\u2019s budget to fending off threats and still get hacked tomorrow, Gartner Distinguished VP Analyst Paul Proctor explained in &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":5855,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[263],"tags":[],"class_list":["post-5854","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-corner"],"yoast_head":"<title>How to assess risk appetite<\/title>\n<meta name=\"description\" content=\"Defining your risk appetite is an essential part of any IT security program. Here\u2019s how to quantify the amount of risk you can stomach.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to assess risk appetite\" \/>\n<meta property=\"og:description\" content=\"Defining your risk appetite is an essential part of any IT security program. Here\u2019s how to quantify the amount of risk you can stomach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-27T14:04:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2023\/04\/risk-control-knob-.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2309\" \/>\n\t<meta property=\"og:image:height\" content=\"1299\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"How to calculate your risk appetite: Accepting the impossibility of flawless IT security\",\"datePublished\":\"2023-04-27T14:04:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/\"},\"wordCount\":734,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2023\/04\/risk-control-knob-.jpg\",\"articleSection\":[\"Cyber Corner\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/\",\"name\":\"How to assess risk appetite\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2023\/04\/risk-control-knob-.jpg\",\"datePublished\":\"2023-04-27T14:04:51+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"Defining your risk appetite is an essential part of any IT security program. Here\u2019s how to quantify the amount of risk you can stomach.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2023\/04\/risk-control-knob-.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2023\/04\/risk-control-knob-.jpg\",\"width\":2309,\"height\":1299,\"caption\":\"A dial against a red background labeled \\\"Risk\\\" with a range of low to high. The dial is set midway between the two extremes.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to calculate your risk appetite: Accepting the impossibility of flawless IT security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"How to assess risk appetite","description":"Defining your risk appetite is an essential part of any IT security program. Here\u2019s how to quantify the amount of risk you can stomach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/","og_locale":"en_US","og_type":"article","og_title":"How to assess risk appetite","og_description":"Defining your risk appetite is an essential part of any IT security program. Here\u2019s how to quantify the amount of risk you can stomach.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2023-04-27T14:04:51+00:00","og_image":[{"width":2309,"height":1299,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2023\/04\/risk-control-knob-.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"How to calculate your risk appetite: Accepting the impossibility of flawless IT security","datePublished":"2023-04-27T14:04:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/"},"wordCount":734,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2023\/04\/risk-control-knob-.jpg","articleSection":["Cyber Corner"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/","name":"How to assess risk appetite","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2023\/04\/risk-control-knob-.jpg","datePublished":"2023-04-27T14:04:51+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"Defining your risk appetite is an essential part of any IT security program. Here\u2019s how to quantify the amount of risk you can stomach.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2023\/04\/risk-control-knob-.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2023\/04\/risk-control-knob-.jpg","width":2309,"height":1299,"caption":"A dial against a red background labeled \"Risk\" with a range of low to high. The dial is set midway between the two extremes."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-calculate-your-risk-appetite-accepting-the-impossibility-of-flawless-it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to calculate your risk appetite: Accepting the impossibility of flawless IT security"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5854"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5854\/revisions"}],"predecessor-version":[{"id":5857,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5854\/revisions\/5857"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/5855"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}