{"id":257,"date":"2021-03-11T08:38:10","date_gmt":"2021-03-11T14:38:10","guid":{"rendered":"https:\/\/kasacontrols.com\/blog\/?p=257"},"modified":"2021-05-26T08:27:22","modified_gmt":"2021-05-26T13:27:22","slug":"it-vulnerabilities-bhs","status":"publish","type":"post","link":"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/","title":{"rendered":"Addressing IT Vulnerabilities in BHS Control &#038; Automation"},"content":{"rendered":"\n<p>What could stop your baggage handling system in its tracks? How serious are you about security software threats?<\/p>\n\n\n\n<p>As long as your system is operating as normal, there\u2019s a chance you haven\u2019t considered these critical questions or the overall health of your strategy to ensure your operation remains secure. In today\u2019s interconnected world, that could be an enormous mistake.<\/p>\n\n\n\n<p>At&nbsp;Kasa, we are system&nbsp;control and automation experts&nbsp;for baggage handling and other conveyorized systems (and not necessarily specific&nbsp;IT security professionals) but&nbsp;we\u2019ve learned a thing or two about some key steps you can take to ensure your&nbsp;conveyor&nbsp;systems&nbsp;function properly and securely.&nbsp;<\/p>\n\n\n\n<p><strong>Be Proactive, Not\nReactive<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/downtime-ahead.jpg\" alt=\"\" class=\"wp-image-212\" width=\"201\" height=\"281\" srcset=\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/downtime-ahead.jpg 357w, https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/downtime-ahead-214x300.jpg 214w\" sizes=\"auto, (max-width: 201px) 100vw, 201px\" \/><\/figure><\/div>\n\n\n\n<p>Perhaps the most important attitude change you can make to ensure your operation and systems are secure and functioning to the best of their ability is to be proactive, not reactive. Let\u2019s dive into some&nbsp;real life&nbsp;examples.<\/p>\n\n\n\n<p>One of our customers\u00a0had\u00a0a system running the same software and hardware as it did on install day, several years prior.\u00a0The system included a redundant hard drive and backup server\u00a0which both\u00a0experienced failure!\u00a0Unfortunately,\u00a0no one\u00a0at the customer\u2019s location monitoring the system\u00a0noticed, because\u00a0they were in fact, not monitoring\u00a0the servers either physically or via management software.<\/p>\n\n\n\n<p>By the time the main system crashed on a reboot, it took five days for the system to get back up and running \u2013 and that\u2019s a typical timeframe for&nbsp;a&nbsp;complete system failure due to lead time on parts, time needed for a total rebuild, and more.<\/p>\n\n\n\n<p>How much productivity did they lose in five days?<\/p>\n\n\n\n<p>Another customer of ours, by contrast, contacted us when the servers installed with the system originally had turned five years old. They sought a consultation for&nbsp;their&nbsp;operating system and server hardware upgrade, and we were able to support their IT team by helping them migrate their Ignition Software (an industrial software we use for Supervisory Control and Data Acquisition, i.e., SCADA, from Inductive Automation) install.<\/p>\n\n\n\n<p>In this way, the company experienced a rather painless upgrade that&nbsp;completely avoided&nbsp;a potential&nbsp;catastrophic failure.<\/p>\n\n\n\n<p><strong>Stay on Top of the Age of Your Systems<\/strong><\/p>\n\n\n\n<p>The easiest way to engage in that proactivity is to audit what your operation is currently using thoroughly and often.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/monitor-computer-system-1.jpg\" alt=\"Monitor OS, Software &amp; Server Hardware\" class=\"wp-image-193\" width=\"333\" height=\"332\" srcset=\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/monitor-computer-system-1.jpg 665w, https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/monitor-computer-system-1-300x300.jpg 300w, https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/monitor-computer-system-1-150x150.jpg 150w, https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/monitor-computer-system-1-585x584.jpg 585w, https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/monitor-computer-system-1-220x220.jpg 220w, https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2020\/06\/monitor-computer-system-1-80x80.jpg 80w\" sizes=\"auto, (max-width: 333px) 100vw, 333px\" \/><\/figure><\/div>\n\n\n\n<p>By partnering with Kasa Controls &amp; Automation during this process, we can recommend the appropriate operating system, software and server hardware upgrades, getting you up to speed with the latest updates.<\/p>\n\n\n\n<p>This process will protect you against attacks, security holes and failures common as systems age. The closer to end-of-life or being out of date your system is, the more likely it is to experience one of these hindrances.<\/p>\n\n\n\n<p>Better yet, Kasa Controls &amp; Automation can work with you to tie into your system, running this initial assessment and backing it up with ongoing scheduled checks to become aware of potential issues more quickly.<\/p>\n\n\n\n<p>For operations without IT services, Kasa Controls &amp; Automation can also install remote monitoring software to provide critical visibility, before it\u2019s too late.<\/p>\n\n\n\n<p><strong>Contact Kasa Today<\/strong><\/p>\n\n\n\n<p>The typical lifespan of an average server is between&nbsp;<strong>three<\/strong>&nbsp;and&nbsp;<strong>six&nbsp;<\/strong>years. As you approach and move through this range, you risk hardware failure, software age out, and more.<\/p>\n\n\n\n<p>What would even one day of downtime cost you? By being proactive in controlling your IT vulnerability, you don\u2019t have to find out.<\/p>\n\n\n\n<p>To learn more, <a href=\"https:\/\/www.kasacontrols.com\/contact\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"contact Kasa (opens in a new tab)\">contact Kasa<\/a> today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What could stop your baggage handling system in its tracks? How serious are you about security software threats? As long as your system is operating as normal, there\u2019s a chance you haven\u2019t considered these critical questions or the overall health of your strategy to ensure&#8230;<\/p>\n","protected":false},"author":3,"featured_media":261,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,3],"tags":[],"class_list":["post-257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all","category-bhs"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Addressing IT Vulnerabilities in BHS Control &amp; Automation - Kasa Controls Blog<\/title>\n<meta name=\"description\" content=\"Learn more about Addressing IT Vulnerabilities in BHS Control &amp; Automation and explore the latest industry trends, PLC programming tips, and custom engineering insights from the team at Kasa Controls &amp; Automation.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Addressing IT Vulnerabilities in BHS Control &amp; Automation - Kasa Controls Blog\" \/>\n<meta property=\"og:description\" content=\"Learn more about Addressing IT Vulnerabilities in BHS Control &amp; Automation and explore the latest industry trends, PLC programming tips, and custom engineering insights from the team at Kasa Controls &amp; Automation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/\" \/>\n<meta property=\"og:site_name\" content=\"Kasa Controls Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/KasaCompanies\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-11T14:38:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-26T13:27:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2021\/03\/hacker-bhs.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ronda Baker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ronda Baker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/\"},\"author\":{\"name\":\"Ronda Baker\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/#\/schema\/person\/085e9f0a2b2cb6c29820d8d3f3af8e6d\"},\"headline\":\"Addressing IT Vulnerabilities in BHS Control &#038; Automation\",\"datePublished\":\"2021-03-11T14:38:10+00:00\",\"dateModified\":\"2021-05-26T13:27:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/\"},\"wordCount\":605,\"publisher\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2021\/03\/hacker-bhs.jpg\",\"articleSection\":[\"All\",\"BHS\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/\",\"url\":\"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/\",\"name\":\"Addressing IT Vulnerabilities in BHS Control & Automation - Kasa Controls Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2021\/03\/hacker-bhs.jpg\",\"datePublished\":\"2021-03-11T14:38:10+00:00\",\"dateModified\":\"2021-05-26T13:27:22+00:00\",\"description\":\"Learn more about Addressing IT Vulnerabilities in BHS Control & Automation and explore the latest industry trends, PLC programming tips, and custom engineering insights from the team at Kasa Controls & Automation.\",\"breadcrumb\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/#primaryimage\",\"url\":\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2021\/03\/hacker-bhs.jpg\",\"contentUrl\":\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2021\/03\/hacker-bhs.jpg\",\"width\":1000,\"height\":300,\"caption\":\"Hacker - IT Vulnerabilities\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kasacontrols.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Addressing IT Vulnerabilities in BHS Control &#038; Automation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/#website\",\"url\":\"https:\/\/kasacontrols.com\/blog\/\",\"name\":\"Kasa Controls Blog\",\"description\":\"Kasa Controls Blog\",\"publisher\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/#organization\"},\"alternateName\":\"Kasa Controls Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kasacontrols.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/#organization\",\"name\":\"Kasa Controls Blog\",\"alternateName\":\"Kasa Controls Blog\",\"url\":\"https:\/\/kasacontrols.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-02-143755.png\",\"contentUrl\":\"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-02-143755.png\",\"width\":1045,\"height\":580,\"caption\":\"Kasa Controls Blog\"},\"image\":{\"@id\":\"https:\/\/kasacontrols.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/KasaCompanies\/\",\"https:\/\/www.youtube.com\/channel\/UCOVSn5yEEKeWUwwuI2T-AfQ?view_as\",\"https:\/\/www.linkedin.com\/company\/kasa-industrial-controls-inc.\",\"https:\/\/kasacontrols.com\/blog\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/#\/schema\/person\/085e9f0a2b2cb6c29820d8d3f3af8e6d\",\"name\":\"Ronda Baker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kasacontrols.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/95e6f14d3f4d204c900391b6e4508c9e322fb69cbbf6b01906ef83adcf8f41d1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/95e6f14d3f4d204c900391b6e4508c9e322fb69cbbf6b01906ef83adcf8f41d1?s=96&d=mm&r=g\",\"caption\":\"Ronda Baker\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Addressing IT Vulnerabilities in BHS Control & Automation - Kasa Controls Blog","description":"Learn more about Addressing IT Vulnerabilities in BHS Control & Automation and explore the latest industry trends, PLC programming tips, and custom engineering insights from the team at Kasa Controls & Automation.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Addressing IT Vulnerabilities in BHS Control & Automation - Kasa Controls Blog","og_description":"Learn more about Addressing IT Vulnerabilities in BHS Control & Automation and explore the latest industry trends, PLC programming tips, and custom engineering insights from the team at Kasa Controls & Automation.","og_url":"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/","og_site_name":"Kasa Controls Blog","article_publisher":"https:\/\/www.facebook.com\/KasaCompanies\/","article_published_time":"2021-03-11T14:38:10+00:00","article_modified_time":"2021-05-26T13:27:22+00:00","og_image":[{"width":1000,"height":300,"url":"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2021\/03\/hacker-bhs.jpg","type":"image\/jpeg"}],"author":"Ronda Baker","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ronda Baker","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/#article","isPartOf":{"@id":"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/"},"author":{"name":"Ronda Baker","@id":"https:\/\/kasacontrols.com\/blog\/#\/schema\/person\/085e9f0a2b2cb6c29820d8d3f3af8e6d"},"headline":"Addressing IT Vulnerabilities in BHS Control &#038; Automation","datePublished":"2021-03-11T14:38:10+00:00","dateModified":"2021-05-26T13:27:22+00:00","mainEntityOfPage":{"@id":"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/"},"wordCount":605,"publisher":{"@id":"https:\/\/kasacontrols.com\/blog\/#organization"},"image":{"@id":"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/#primaryimage"},"thumbnailUrl":"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2021\/03\/hacker-bhs.jpg","articleSection":["All","BHS"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/","url":"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/","name":"Addressing IT Vulnerabilities in BHS Control & Automation - Kasa Controls Blog","isPartOf":{"@id":"https:\/\/kasacontrols.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/#primaryimage"},"image":{"@id":"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/#primaryimage"},"thumbnailUrl":"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2021\/03\/hacker-bhs.jpg","datePublished":"2021-03-11T14:38:10+00:00","dateModified":"2021-05-26T13:27:22+00:00","description":"Learn more about Addressing IT Vulnerabilities in BHS Control & Automation and explore the latest industry trends, PLC programming tips, and custom engineering insights from the team at Kasa Controls & Automation.","breadcrumb":{"@id":"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/#primaryimage","url":"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2021\/03\/hacker-bhs.jpg","contentUrl":"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2021\/03\/hacker-bhs.jpg","width":1000,"height":300,"caption":"Hacker - IT Vulnerabilities"},{"@type":"BreadcrumbList","@id":"https:\/\/kasacontrols.com\/blog\/2021\/03\/11\/it-vulnerabilities-bhs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kasacontrols.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Addressing IT Vulnerabilities in BHS Control &#038; Automation"}]},{"@type":"WebSite","@id":"https:\/\/kasacontrols.com\/blog\/#website","url":"https:\/\/kasacontrols.com\/blog\/","name":"Kasa Controls Blog","description":"Kasa Controls Blog","publisher":{"@id":"https:\/\/kasacontrols.com\/blog\/#organization"},"alternateName":"Kasa Controls Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kasacontrols.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kasacontrols.com\/blog\/#organization","name":"Kasa Controls Blog","alternateName":"Kasa Controls Blog","url":"https:\/\/kasacontrols.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kasacontrols.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-02-143755.png","contentUrl":"https:\/\/kasacontrols.com\/blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-02-143755.png","width":1045,"height":580,"caption":"Kasa Controls Blog"},"image":{"@id":"https:\/\/kasacontrols.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/KasaCompanies\/","https:\/\/www.youtube.com\/channel\/UCOVSn5yEEKeWUwwuI2T-AfQ?view_as","https:\/\/www.linkedin.com\/company\/kasa-industrial-controls-inc.","https:\/\/kasacontrols.com\/blog\/"]},{"@type":"Person","@id":"https:\/\/kasacontrols.com\/blog\/#\/schema\/person\/085e9f0a2b2cb6c29820d8d3f3af8e6d","name":"Ronda Baker","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kasacontrols.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/95e6f14d3f4d204c900391b6e4508c9e322fb69cbbf6b01906ef83adcf8f41d1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/95e6f14d3f4d204c900391b6e4508c9e322fb69cbbf6b01906ef83adcf8f41d1?s=96&d=mm&r=g","caption":"Ronda Baker"}}]}},"_links":{"self":[{"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/posts\/257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/comments?post=257"}],"version-history":[{"count":4,"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/posts\/257\/revisions"}],"predecessor-version":[{"id":279,"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/posts\/257\/revisions\/279"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/media\/261"}],"wp:attachment":[{"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/media?parent=257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/categories?post=257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kasacontrols.com\/blog\/wp-json\/wp\/v2\/tags?post=257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}