{"id":2941,"date":"2016-03-07T20:15:42","date_gmt":"2016-03-07T20:15:42","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2941"},"modified":"2020-05-06T10:30:03","modified_gmt":"2020-05-06T17:30:03","slug":"keeping-geisinger-health-systems-network-safe-from-predators","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/keeping-geisinger-health-systems-network-safe-from-predators\/","title":{"rendered":"Keeping Geisinger Health System\u2019s Network Safe from Predators"},"content":{"rendered":"<p>The news that the electronic healthcare records of a Los Angeles organization were held for cyber-ransom in February wasn\u2019t a surprise to those who follow such attacks. An article in\u00a0<a href=\"http:\/\/www.modernhealthcare.com\/article\/20160217\/NEWS\/160219920\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Modern Healthcare<\/a>\u00a0quoted an expert from the Rand Corporation as saying that \u201chealthcare organizations, along with small businesses and schools, make good targets for ransomware attacks because they don&#8217;t typically have the sophisticated backup systems and other resilience measures that are typical at large corporations.\u201d The article also cited two smaller healthcare organizations that had been hit by ransomware attacks in 2012 and 2014.<\/p>\n<p>Ransomware is just one way that healthcare and other industries are targeted by cybercriminals. Another common tactic for cybercriminals is data exfiltration; that is, the theft of confidential data for nefarious purposes. (For a look at a number of the issues health care IT executives face, see this\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/securityevaluators.com\/hospitalhack\/securing_hospitals.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">report<\/a>\u00a0from the firm Independent Security Evaluators.)<\/p>\n<p>One healthcare organization that has less reason to worry about these issues is\u00a0Geisinger Health System, serving more than 2.6 million residents in central and northeastern Pennsylvania. Geisinger deployed a solution based on patented Infoblox Grid\u2122 technology that includes Infoblox DDI, Reporting, DNS Firewall, and DHCP Fingerprinting. Because of our proximity to the fundamentals of the network, Infoblox can provide context on security alerts \u2013 for example, identifying compromised devices by their IP addresses and providing a history of their activity through DHCP logs.<\/p>\n<p>Rich Quinlan, one of three technical analysts responsible for DNS and DHCP services at Geisinger and its affiliates, reports that the Infoblox technology found a security issue almost immediately. \u201cWe were doing an evaluation of DNS Firewall, and during that evaluation\u2014even though we have incident detection and prevention systems and firewall logging\u2014we detected a ultrasound machine that was attempting to communicate with a known (malicious) command-and-control server,\u201d Quinlan said in a recent\u00a0<a href=\"https:\/\/www.infoblox.com\/resources\/case-study\/geisinger-health-system?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">case study<\/a>.<\/p>\n<p>DNS Firewall detected the outbound communication, and Infoblox DHCP fingerprinting\u2014which captures the device type for an assigned IP address issued as part of the DHCP process\u2014enabled Quinlan\u2019s team to quickly and accurately identify the offending device so that the threat could be contained before it spread across the network.<\/p>\n<p>Quinlan underscores the seriousness of this kind of threat. \u201cIn spite of all the conventional steps we take to protect our internal network, patient care could still be affected. We could have an entire hospital full of useless ultrasound devices because one was brought in with a virus and we have no control over them. And if it was able to exfiltrate data, we would have a Health Insurance and Portability Accountability Act (HIPAA) compliance issue.\u201d<\/p>\n<p>Equally important for the health care industry, Quinlan adds, the Infoblox technology \u201chas been one of the most reliable systems that we have in the entire organization. We have had zero unexpected downtime in the three years that it\u2019s been in place, and that&#8217;s very rare in this day and age. I can sleep better at night knowing that we are not going to have a system failure.\u201d<\/p>\n<p>To read the full case study, click\u00a0<a href=\"https:\/\/www.infoblox.com\/resources\/case-study\/geisinger-health-system?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>. And you can watch Rich Quinlan talk about his experience with Infoblox here:<\/p>\n<div class=\"video-embed-center video-embed\"><iframe loading=\"lazy\" class=\"embedly-embed bf_frame_init\" title=\"Video\" src=\"https:\/\/cdn.embedly.com\/widgets\/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FSQi4bTU3wK0%3Ffeature%3Doembed&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DSQi4bTU3wK0&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FSQi4bTU3wK0%2Fhqdefault.jpg&amp;key=b0d40caa4f094c68be7c29880b16f56e&amp;type=text%2Fhtml&amp;schema=youtube\" width=\"600\" height=\"337\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The news that the electronic healthcare records of a Los Angeles organization were held for cyber-ransom in February wasn\u2019t a surprise to those who follow such attacks. An article in\u00a0Modern Healthcare\u00a0quoted an expert from the Rand Corporation as saying that \u201chealthcare organizations, along with small businesses and schools, make good targets for ransomware attacks because [&hellip;]<\/p>\n","protected":false},"author":261,"featured_media":2730,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[28,50,30,16,15],"class_list":{"0":"post-2941","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-ddi","9":"tag-dhcp","10":"tag-dns","11":"tag-infoblox","12":"tag-security","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Keeping Geisinger Health System\u2019s Network Safe from Predators<\/title>\n<meta name=\"description\" content=\"The news that the electronic healthcare records of a Los Angeles organization were held for cyber-ransom in February wasn\u2019t a surprise to those who follow such attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/keeping-geisinger-health-systems-network-safe-from-predators\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keeping Geisinger Health System\u2019s Network Safe from Predators\" \/>\n<meta property=\"og:description\" content=\"The news that the electronic healthcare records of a Los Angeles organization were held for cyber-ransom in February wasn\u2019t a surprise to those who follow such attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/keeping-geisinger-health-systems-network-safe-from-predators\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-07T20:15:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Fulton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Fulton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/keeping-geisinger-health-systems-network-safe-from-predators\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/keeping-geisinger-health-systems-network-safe-from-predators\\\/\"},\"author\":{\"name\":\"Scott Fulton\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/86690b5b70d4496200b9636a8d852a1b\"},\"headline\":\"Keeping Geisinger Health System\u2019s Network Safe from Predators\",\"datePublished\":\"2016-03-07T20:15:42+00:00\",\"dateModified\":\"2020-05-06T17:30:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/keeping-geisinger-health-systems-network-safe-from-predators\\\/\"},\"wordCount\":535,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/keeping-geisinger-health-systems-network-safe-from-predators\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14-2.jpg\",\"keywords\":[\"DDI\",\"DHCP\",\"DNS\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/keeping-geisinger-health-systems-network-safe-from-predators\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/keeping-geisinger-health-systems-network-safe-from-predators\\\/\",\"name\":\"Keeping Geisinger Health System\u2019s Network Safe from Predators\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/keeping-geisinger-health-systems-network-safe-from-predators\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/keeping-geisinger-health-systems-network-safe-from-predators\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14-2.jpg\",\"datePublished\":\"2016-03-07T20:15:42+00:00\",\"dateModified\":\"2020-05-06T17:30:03+00:00\",\"description\":\"The news that the electronic healthcare records of a Los Angeles organization were held for cyber-ransom in February wasn\u2019t a surprise to those who follow such attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/keeping-geisinger-health-systems-network-safe-from-predators\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/keeping-geisinger-health-systems-network-safe-from-predators\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/keeping-geisinger-health-systems-network-safe-from-predators\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"Cable & Wireless Panama: Infoblox Helps Telecom Provider Protect From Attacks and Boost Uptime\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/keeping-geisinger-health-systems-network-safe-from-predators\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Keeping Geisinger Health System\u2019s Network Safe from Predators\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/86690b5b70d4496200b9636a8d852a1b\",\"name\":\"Scott Fulton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/567146b7386a3dd2b1a78e7525b5e3ea1c61a88d1f85e0763edc7066f6e3cf23?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/567146b7386a3dd2b1a78e7525b5e3ea1c61a88d1f85e0763edc7066f6e3cf23?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/567146b7386a3dd2b1a78e7525b5e3ea1c61a88d1f85e0763edc7066f6e3cf23?s=96&d=blank&r=g\",\"caption\":\"Scott Fulton\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/scott-fulton\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Keeping Geisinger Health System\u2019s Network Safe from Predators","description":"The news that the electronic healthcare records of a Los Angeles organization were held for cyber-ransom in February wasn\u2019t a surprise to those who follow such attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/keeping-geisinger-health-systems-network-safe-from-predators\/","og_locale":"en_US","og_type":"article","og_title":"Keeping Geisinger Health System\u2019s Network Safe from Predators","og_description":"The news that the electronic healthcare records of a Los Angeles organization were held for cyber-ransom in February wasn\u2019t a surprise to those who follow such attacks.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/keeping-geisinger-health-systems-network-safe-from-predators\/","og_site_name":"Infoblox Blog","article_published_time":"2016-03-07T20:15:42+00:00","article_modified_time":"2020-05-06T17:30:03+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-2.jpg","type":"image\/jpeg"}],"author":"Scott Fulton","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Fulton","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/keeping-geisinger-health-systems-network-safe-from-predators\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/keeping-geisinger-health-systems-network-safe-from-predators\/"},"author":{"name":"Scott Fulton","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/86690b5b70d4496200b9636a8d852a1b"},"headline":"Keeping Geisinger Health System\u2019s Network Safe from Predators","datePublished":"2016-03-07T20:15:42+00:00","dateModified":"2020-05-06T17:30:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/keeping-geisinger-health-systems-network-safe-from-predators\/"},"wordCount":535,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/keeping-geisinger-health-systems-network-safe-from-predators\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-2.jpg","keywords":["DDI","DHCP","DNS","Infoblox","Security"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/keeping-geisinger-health-systems-network-safe-from-predators\/","url":"https:\/\/www.infoblox.com\/blog\/company\/keeping-geisinger-health-systems-network-safe-from-predators\/","name":"Keeping Geisinger Health System\u2019s Network Safe from Predators","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/keeping-geisinger-health-systems-network-safe-from-predators\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/keeping-geisinger-health-systems-network-safe-from-predators\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-2.jpg","datePublished":"2016-03-07T20:15:42+00:00","dateModified":"2020-05-06T17:30:03+00:00","description":"The news that the electronic healthcare records of a Los Angeles organization were held for cyber-ransom in February wasn\u2019t a surprise to those who follow such attacks.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/keeping-geisinger-health-systems-network-safe-from-predators\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/keeping-geisinger-health-systems-network-safe-from-predators\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/keeping-geisinger-health-systems-network-safe-from-predators\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-2.jpg","width":660,"height":454,"caption":"Cable & Wireless Panama: Infoblox Helps Telecom Provider Protect From Attacks and Boost Uptime"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/keeping-geisinger-health-systems-network-safe-from-predators\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Keeping Geisinger Health System\u2019s Network Safe from Predators"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/86690b5b70d4496200b9636a8d852a1b","name":"Scott Fulton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/567146b7386a3dd2b1a78e7525b5e3ea1c61a88d1f85e0763edc7066f6e3cf23?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/567146b7386a3dd2b1a78e7525b5e3ea1c61a88d1f85e0763edc7066f6e3cf23?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/567146b7386a3dd2b1a78e7525b5e3ea1c61a88d1f85e0763edc7066f6e3cf23?s=96&d=blank&r=g","caption":"Scott Fulton"},"url":"https:\/\/www.infoblox.com\/blog\/author\/scott-fulton\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/261"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2941"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2941\/revisions"}],"predecessor-version":[{"id":2943,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2941\/revisions\/2943"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2730"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}