{"id":189,"date":"2020-06-17T08:29:01","date_gmt":"2020-06-17T13:29:01","guid":{"rendered":"https:\/\/kasacontrols.com\/blog\/?p=189"},"modified":"2021-04-07T12:33:05","modified_gmt":"2021-04-07T17:33:05","slug":"addressing-it-vulnerabilities-in-control-and-automation","status":"publish","type":"post","link":"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/","title":{"rendered":"Addressing IT Vulnerabilities in Control and Automation"},"content":{"rendered":"\n<p>What could stop your industrial equipment in its tracks? How\nserious are you about security software threats?<\/p>\n\n\n\n<p>As long as your system is operating as normal, there\u2019s a\nchance you haven\u2019t considered these critical questions or the overall health of\nyour strategy to ensure your operation remains secure. In today\u2019s\ninterconnected world, that could be an enormous mistake.<\/p>\n\n\n\n<p>While Kasa is full of control and automation experts, not IT\nsecurity professionals, we\u2019ve learned a thing or two about some key steps you\ncan take to ensure your system functions properly and securely as often as\npossible.<\/p>\n\n\n\n<p><strong>Be Proactive, Not\nReactive<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/downtime-ahead.jpg\" alt=\"\" class=\"wp-image-212\" width=\"201\" height=\"281\" srcset=\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/downtime-ahead.jpg 357w, https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/downtime-ahead-214x300.jpg 214w\" sizes=\"auto, (max-width: 201px) 100vw, 201px\" \/><\/figure><\/div>\n\n\n\n<p>Perhaps the most important attitude change you can make to\nensure your operation and systems are secure and functioning to the best of\ntheir ability is to be proactive, not reactive. Let\u2019s dive into some examples.<\/p>\n\n\n\n<p>One customer in the wastewater industry has a system running\nthe same software and hardware as it did on install day, several years prior. A\nredundant hard drive and backup server experienced failure \u2013 and no one\nnoticed, because there was no plan in place to monitor the servers either\nphysically or via management software.<\/p>\n\n\n\n<p>By the time the main system crashed on a reboot, it took\nfive days for the system to get back up and running \u2013 and that\u2019s a typical\ntimeframe for complete system failure due to lead time on parts, time needed\nfor a total rebuild, and more.<\/p>\n\n\n\n<p>How much productivity did they lose in five days?<\/p>\n\n\n\n<p>By contrast, a cylinder manufacturer contacted us when the servers installed with the system originally had turned five years old. They sought a consultation for an operating system and server hardware upgrade, and we were able to support their IT team by helping them migrate their Ignition Software (an industrial software we use for Supervisory Control and Data Acquisition, i.e., SCADA, from Inductive Automation) install.<\/p>\n\n\n\n<p>In this way, the company experienced a rather painless\nupgrade that could also have prevented catastrophic failure.<\/p>\n\n\n\n<p><strong>Stay on Top of the\nAge of Your Systems<\/strong><\/p>\n\n\n\n<p>The easiest way to engage in that proactivity is to audit\nwhat your operation is currently using thoroughly and often.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/monitor-computer-system-1.jpg\" alt=\"Monitor OS, Software &amp; Server Hardware\" class=\"wp-image-193\" width=\"333\" height=\"332\" srcset=\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/monitor-computer-system-1.jpg 665w, https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/monitor-computer-system-1-300x300.jpg 300w, https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/monitor-computer-system-1-150x150.jpg 150w, https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/monitor-computer-system-1-585x584.jpg 585w, https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/monitor-computer-system-1-220x220.jpg 220w, https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/monitor-computer-system-1-80x80.jpg 80w\" sizes=\"auto, (max-width: 333px) 100vw, 333px\" \/><\/figure><\/div>\n\n\n\n<p>By partnering with Kasa Controls &amp; Automation during\nthis process, we can recommend appropriate operating system, software and\nserver hardware upgrades, getting you up to speed with the latest updates.<\/p>\n\n\n\n<p>This process will protect you against attacks, security\nholes and failures common as systems age. The closer to end-of-life or being\nout of date your system is, the more likely it is to experience one of these\nhindrances.<\/p>\n\n\n\n<p>Better yet, Kasa Controls &amp; Automation can work with you\nto tie into your system, running this initial assessment and backing it up with\nscheduled ongoing checks to become aware of potential issues more quickly.<\/p>\n\n\n\n<p>For operations without IT services, Kasa Controls &amp; Automation can also install remote monitoring software to provide critical visibility, before it\u2019s too late.<\/p>\n\n\n\n<p><strong>Contact Kasa Today<\/strong><\/p>\n\n\n\n<p>The typical lifespan of an average server is between three\nand six years. As you approach and move through this range, you risk hardware\nfailure, software age out, and more.<\/p>\n\n\n\n<p>What would even one day of downtime cost you? By being\nproactive in controlling your IT vulnerability, you don\u2019t have to find out.<\/p>\n\n\n\n<p>To learn more, <a href=\"https:\/\/www.kasacontrols.com\/contact\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"contact Kasa (opens in a new tab)\">contact Kasa<\/a> today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What could stop your industrial equipment in its tracks? How serious are you about security software threats? As long as your system is operating as normal, there\u2019s a chance you haven\u2019t considered these critical questions or the overall health of your strategy to ensure your&#8230;<\/p>\n","protected":false},"author":3,"featured_media":191,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,4],"tags":[17,19,18,20],"class_list":["post-189","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all","category-grain","tag-it-vulnerabilities","tag-os-updates","tag-security-holes","tag-server-upgrades"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Addressing IT Vulnerabilities in Control and Automation - Kasa Controls Blog<\/title>\n<meta name=\"description\" content=\"Learn more about Addressing IT Vulnerabilities in Control and Automation and explore the latest industry trends, PLC programming tips, and custom engineering insights from the team at Kasa Controls &amp; Automation.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Addressing IT Vulnerabilities in Control and Automation - Kasa Controls Blog\" \/>\n<meta property=\"og:description\" content=\"Learn more about Addressing IT Vulnerabilities in Control and Automation and explore the latest industry trends, PLC programming tips, and custom engineering insights from the team at Kasa Controls &amp; Automation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/\" \/>\n<meta property=\"og:site_name\" content=\"Kasa Controls Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/KasaCompanies\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-17T13:29:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-07T17:33:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/hacker.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ronda Baker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ronda Baker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/\"},\"author\":{\"name\":\"Ronda Baker\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/#\/schema\/person\/085e9f0a2b2cb6c29820d8d3f3af8e6d\"},\"headline\":\"Addressing IT Vulnerabilities in Control and Automation\",\"datePublished\":\"2020-06-17T13:29:01+00:00\",\"dateModified\":\"2021-04-07T17:33:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/\"},\"wordCount\":560,\"publisher\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/hacker.jpg\",\"keywords\":[\"IT vulnerabilities\",\"OS updates\",\"security holes\",\"server upgrades\"],\"articleSection\":[\"All\",\"Grain\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/\",\"url\":\"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/\",\"name\":\"Addressing IT Vulnerabilities in Control and Automation - Kasa Controls Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/hacker.jpg\",\"datePublished\":\"2020-06-17T13:29:01+00:00\",\"dateModified\":\"2021-04-07T17:33:05+00:00\",\"description\":\"Learn more about Addressing IT Vulnerabilities in Control and Automation and explore the latest industry trends, PLC programming tips, and custom engineering insights from the team at Kasa Controls & Automation.\",\"breadcrumb\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/#primaryimage\",\"url\":\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/hacker.jpg\",\"contentUrl\":\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/hacker.jpg\",\"width\":1000,\"height\":300,\"caption\":\"IT Vulnerability\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kasacontrols.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Addressing IT Vulnerabilities in Control and Automation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/#website\",\"url\":\"https:\/\/kasacontrols.com\/blog\/\",\"name\":\"Kasa Controls Blog\",\"description\":\"Kasa Controls Blog\",\"publisher\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/#organization\"},\"alternateName\":\"Kasa Controls Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kasacontrols.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/#organization\",\"name\":\"Kasa Controls Blog\",\"alternateName\":\"Kasa Controls Blog\",\"url\":\"https:\/\/kasacontrols.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-02-143755.png\",\"contentUrl\":\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-02-143755.png\",\"width\":1045,\"height\":580,\"caption\":\"Kasa Controls Blog\"},\"image\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/KasaCompanies\/\",\"https:\/\/www.youtube.com\/channel\/UCOVSn5yEEKeWUwwuI2T-AfQ?view_as\",\"https:\/\/www.linkedin.com\/company\/kasa-industrial-controls-inc.\",\"https:\/\/kasacontrols.com\/blog\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/#\/schema\/person\/085e9f0a2b2cb6c29820d8d3f3af8e6d\",\"name\":\"Ronda Baker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/95e6f14d3f4d204c900391b6e4508c9e322fb69cbbf6b01906ef83adcf8f41d1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/95e6f14d3f4d204c900391b6e4508c9e322fb69cbbf6b01906ef83adcf8f41d1?s=96&d=mm&r=g\",\"caption\":\"Ronda Baker\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Addressing IT Vulnerabilities in Control and Automation - Kasa Controls Blog","description":"Learn more about Addressing IT Vulnerabilities in Control and Automation and explore the latest industry trends, PLC programming tips, and custom engineering insights from the team at Kasa Controls & Automation.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Addressing IT Vulnerabilities in Control and Automation - Kasa Controls Blog","og_description":"Learn more about Addressing IT Vulnerabilities in Control and Automation and explore the latest industry trends, PLC programming tips, and custom engineering insights from the team at Kasa Controls & Automation.","og_url":"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/","og_site_name":"Kasa Controls Blog","article_publisher":"https:\/\/www.facebook.com\/KasaCompanies\/","article_published_time":"2020-06-17T13:29:01+00:00","article_modified_time":"2021-04-07T17:33:05+00:00","og_image":[{"width":1000,"height":300,"url":"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/hacker.jpg","type":"image\/jpeg"}],"author":"Ronda Baker","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ronda Baker","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/#article","isPartOf":{"@id":"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/"},"author":{"name":"Ronda Baker","@id":"https:\/\/kasacontrols.com\/blog\/#\/schema\/person\/085e9f0a2b2cb6c29820d8d3f3af8e6d"},"headline":"Addressing IT Vulnerabilities in Control and Automation","datePublished":"2020-06-17T13:29:01+00:00","dateModified":"2021-04-07T17:33:05+00:00","mainEntityOfPage":{"@id":"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/"},"wordCount":560,"publisher":{"@id":"https:\/\/kasacontrols.com\/blog\/#organization"},"image":{"@id":"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/#primaryimage"},"thumbnailUrl":"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/hacker.jpg","keywords":["IT vulnerabilities","OS updates","security holes","server upgrades"],"articleSection":["All","Grain"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/","url":"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/","name":"Addressing IT Vulnerabilities in Control and Automation - Kasa Controls Blog","isPartOf":{"@id":"https:\/\/kasacontrols.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/#primaryimage"},"image":{"@id":"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/#primaryimage"},"thumbnailUrl":"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/hacker.jpg","datePublished":"2020-06-17T13:29:01+00:00","dateModified":"2021-04-07T17:33:05+00:00","description":"Learn more about Addressing IT Vulnerabilities in Control and Automation and explore the latest industry trends, PLC programming tips, and custom engineering insights from the team at Kasa Controls & Automation.","breadcrumb":{"@id":"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/#primaryimage","url":"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/hacker.jpg","contentUrl":"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/hacker.jpg","width":1000,"height":300,"caption":"IT Vulnerability"},{"@type":"BreadcrumbList","@id":"https:\/\/kasacontrols.com\/blog\/2020\/06\/17\/addressing-it-vulnerabilities-in-control-and-automation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kasacontrols.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Addressing IT Vulnerabilities in Control and Automation"}]},{"@type":"WebSite","@id":"https:\/\/kasacontrols.com\/blog\/#website","url":"https:\/\/kasacontrols.com\/blog\/","name":"Kasa Controls Blog","description":"Kasa Controls Blog","publisher":{"@id":"https:\/\/kasacontrols.com\/blog\/#organization"},"alternateName":"Kasa Controls Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kasacontrols.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kasacontrols.com\/blog\/#organization","name":"Kasa Controls Blog","alternateName":"Kasa Controls Blog","url":"https:\/\/kasacontrols.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kasacontrols.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-02-143755.png","contentUrl":"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-02-143755.png","width":1045,"height":580,"caption":"Kasa Controls Blog"},"image":{"@id":"https:\/\/kasacontrols.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/KasaCompanies\/","https:\/\/www.youtube.com\/channel\/UCOVSn5yEEKeWUwwuI2T-AfQ?view_as","https:\/\/www.linkedin.com\/company\/kasa-industrial-controls-inc.","https:\/\/kasacontrols.com\/blog\/"]},{"@type":"Person","@id":"https:\/\/kasacontrols.com\/blog\/#\/schema\/person\/085e9f0a2b2cb6c29820d8d3f3af8e6d","name":"Ronda Baker","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kasacontrols.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/95e6f14d3f4d204c900391b6e4508c9e322fb69cbbf6b01906ef83adcf8f41d1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/95e6f14d3f4d204c900391b6e4508c9e322fb69cbbf6b01906ef83adcf8f41d1?s=96&d=mm&r=g","caption":"Ronda Baker"}}]}},"_links":{"self":[{"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/posts\/189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/comments?post=189"}],"version-history":[{"count":5,"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/posts\/189\/revisions"}],"predecessor-version":[{"id":214,"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/posts\/189\/revisions\/214"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/media\/191"}],"wp:attachment":[{"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/media?parent=189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/categories?post=189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/tags?post=189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}