{"id":6735,"date":"2025-01-31T17:56:25","date_gmt":"2025-01-31T22:56:25","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=6735"},"modified":"2025-01-31T17:56:25","modified_gmt":"2025-01-31T22:56:25","slug":"disinformation-security-faq-what-business-leaders-should-know","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/","title":{"rendered":"Disinformation security FAQ: What business leaders should know"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-6736\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2025\/01\/disinformation-and-deepfake-person-using-smartphone-300x169.jpg\" alt=\"A person using a smartphone with a square hovering over it that says &quot;DEEPFAKE&quot; along with other icons. \" width=\"300\" height=\"169\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2025\/01\/disinformation-and-deepfake-person-using-smartphone-300x169.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2025\/01\/disinformation-and-deepfake-person-using-smartphone-1024x576.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2025\/01\/disinformation-and-deepfake-person-using-smartphone-768x432.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2025\/01\/disinformation-and-deepfake-person-using-smartphone-1536x864.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2025\/01\/disinformation-and-deepfake-person-using-smartphone-2048x1152.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2025\/01\/disinformation-and-deepfake-person-using-smartphone-200x113.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Thanks to the internet and other advanced technologies, we live in a golden age of information availability. Most of us can quickly answer any questions we have in minutes by turning to a computer or smartphone and querying a search engine.<\/p>\n<p>However, it\u2019s just as easy for bad actors to spread fraudulent stories online. Generative <a href=\"https:\/\/www.stratospherenetworks.com\/artificial-intelligence-for-businesses.html\" target=\"_blank\" rel=\"noopener\">artificial intelligence<\/a> (genAI) and machine learning have fueled disinformation campaigns \u2013 focused efforts meant to confuse, mislead or deceive, according to the Gartner article \u201c<a href=\"https:\/\/www.gartner.com\/en\/articles\/disinformation-security\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Protect Your Organization From Disinformation Campaigns<\/a>.\u201d<\/p>\n<p>\u201cAlready a top global threat, disinformation campaigns have the potential to go viral on social media and lead to direct corporate losses from fraud, boycotts and reputational damage,\u201d Dan Ayoub, a senior director analyst in the Gartner Emerging Technologies and Trends (ETT) Security division, wrote in the September 2024 article.<\/p>\n<p>Subsequently, Gartner named disinformation security as one of its <a href=\"https:\/\/www.gartner.com\/en\/articles\/top-technology-trends-2025\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Top 10 Strategic Technology Trends for 2025<\/a>. In 2024, 5 percent of enterprises had adopted solutions, services or features to address disinformation security use cases; Gartner projects that figure will rise to 50 percent by 2028.<\/p>\n<p>If you\u2019re an IT or business leader wondering how to tackle disinformation security, here are the answers to some essential questions you might have about the concept.<\/p>\n<h2>1. What is disinformation security?<\/h2>\n<p>Disinformation security involves creating systems to ensure the accuracy and authenticity of information while combating impersonation and monitoring the dissemination of harmful material, according to Gartner.<\/p>\n<p>Ayoub warned in his article that disinformation campaigns can spread via social media and damage your organization\u2019s reputation. There are a number of reasons why bad actors might perpetuate a disinformation campaign against your company:<\/p>\n<ul>\n<li>Disrupting operations<\/li>\n<li>Stealing sensitive information<\/li>\n<li>Polarizing a particular group of people<\/li>\n<\/ul>\n<h2>2. What methods do bad actors use to spread disinformation?<\/h2>\n<p>Malicious individuals can employ various strategies to propagate false information. Here are some common tactics and tools utilized in disinformation campaigns, according to Gartner and <a href=\"https:\/\/www.splunk.com\/en_us\/blog\/learn\/disinformation-security.html\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Splunk<\/a>.<\/p>\n<ul>\n<li>Deepfakes (a.k.a., genuine-seeming video and audio clips)<\/li>\n<li>Cheapfakes (real video and audio clips altered or taken out of context)<\/li>\n<li>Phishing messages<\/li>\n<li>Proxy websites (fake sites that imitate legitimate ones to trick visitors)<\/li>\n<\/ul>\n<p>Disinformation campaigns involve playing on people\u2019s psychological vulnerabilities, biases, confidential knowledge and critical thinking abilities to impersonate individuals known to the targets, cause disruption, influence behavior and\/or steal private information, according to Splunk. They overlap to a degree with cyberattacks, which are digital and involve hacking into computer infrastructure.<\/p>\n<h2>3. How should business leaders address disinformation security?<\/h2>\n<p>Disinformation campaigns targeting enterprises are expected to become more frequent as AI and machine learning tools evolve, so it\u2019s essential to proactively protect your organization. Gartner lists the following as the essential elements of disinformation security:<\/p>\n<ul>\n<li>Detecting deepfakes<\/li>\n<li>Preventing impersonation<\/li>\n<li>Protecting your organization\u2019s reputation<\/li>\n<\/ul>\n<p>You can deploy various solutions to achieve these objectives, such as the following, according to Splunk:<\/p>\n<ul>\n<li>Digital forensic analysis tools<\/li>\n<li>Identity verification systems<\/li>\n<li>Phishing detection<\/li>\n<li>Bot protection solutions<\/li>\n<li>Disinformation awareness training for your staff (e.g., instruction on how to spot phishing messages)<\/li>\n<\/ul>\n<p>Our <a href=\"https:\/\/www.stratospherenetworks.com\/trusted-advisor.html\" target=\"_blank\" rel=\"noopener\">trusted technology advisors<\/a> are here to help if you want to explore <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-services.html\" target=\"_blank\" rel=\"noopener\">cybersecurity solutions<\/a> and services for your business. With over 20 years of IT experience and our background as a former managed security service provider (MSSP), we can advise you on your security strategy and efficiently identify best-in-class offerings that meet your organization\u2019s unique needs and minimize your risk level.<\/p>\n<p>Start by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thanks to the internet and other advanced technologies, we live in a golden age of information availability. Most of us can quickly answer any questions we have in minutes by turning to a computer or smartphone and querying a search &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":6736,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-6735","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>Disinformation security FAQ for business leaders<\/title>\n<meta name=\"description\" content=\"Wondering how to tackle disinformation security? Here\u2019s what you should know about the concept and what your company can do to combat fraud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Disinformation security FAQ for business leaders\" \/>\n<meta property=\"og:description\" content=\"Wondering how to tackle disinformation security? Here\u2019s what you should know about the concept and what your company can do to combat fraud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-31T22:56:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2025\/01\/disinformation-and-deepfake-person-using-smartphone-1024x576.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"Disinformation security FAQ: What business leaders should know\",\"datePublished\":\"2025-01-31T22:56:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/\"},\"wordCount\":574,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2025\/01\/disinformation-and-deepfake-person-using-smartphone.jpg\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/\",\"name\":\"Disinformation security FAQ for business leaders\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2025\/01\/disinformation-and-deepfake-person-using-smartphone.jpg\",\"datePublished\":\"2025-01-31T22:56:25+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"Wondering how to tackle disinformation security? Here\u2019s what you should know about the concept and what your company can do to combat fraud.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2025\/01\/disinformation-and-deepfake-person-using-smartphone.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2025\/01\/disinformation-and-deepfake-person-using-smartphone.jpg\",\"width\":2309,\"height\":1299,\"caption\":\"A person using a smartphone with a square hovering over it that says \\\"DEEPFAKE\\\" along with other icons.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Disinformation security FAQ: What business leaders should know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"Disinformation security FAQ for business leaders","description":"Wondering how to tackle disinformation security? Here\u2019s what you should know about the concept and what your company can do to combat fraud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/","og_locale":"en_US","og_type":"article","og_title":"Disinformation security FAQ for business leaders","og_description":"Wondering how to tackle disinformation security? Here\u2019s what you should know about the concept and what your company can do to combat fraud.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2025-01-31T22:56:25+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2025\/01\/disinformation-and-deepfake-person-using-smartphone-1024x576.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"Disinformation security FAQ: What business leaders should know","datePublished":"2025-01-31T22:56:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/"},"wordCount":574,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2025\/01\/disinformation-and-deepfake-person-using-smartphone.jpg","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/","name":"Disinformation security FAQ for business leaders","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2025\/01\/disinformation-and-deepfake-person-using-smartphone.jpg","datePublished":"2025-01-31T22:56:25+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"Wondering how to tackle disinformation security? Here\u2019s what you should know about the concept and what your company can do to combat fraud.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2025\/01\/disinformation-and-deepfake-person-using-smartphone.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2025\/01\/disinformation-and-deepfake-person-using-smartphone.jpg","width":2309,"height":1299,"caption":"A person using a smartphone with a square hovering over it that says \"DEEPFAKE\" along with other icons."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/disinformation-security-faq-what-business-leaders-should-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Disinformation security FAQ: What business leaders should know"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6735","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6735"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6735\/revisions"}],"predecessor-version":[{"id":6738,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6735\/revisions\/6738"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/6736"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6735"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6735"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}