{"id":2531,"date":"2015-03-03T06:06:10","date_gmt":"2015-03-03T11:06:10","guid":{"rendered":"http:\/\/chrisgrundemann.com\/?p=2531"},"modified":"2021-07-08T11:17:56","modified_gmt":"2021-07-08T15:17:56","slug":"ipv6-security-myth-8-it-supports-ipv6","status":"publish","type":"post","link":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/","title":{"rendered":"IPv6 Security Myth #8: It Supports IPv6"},"content":{"rendered":"<p>Most of our <a title=\"The IPv6 Security Myths Series\" href=\"http:\/\/chrisgrundemann.com\/index.php\/category\/ipv6\/ipv6-security-myths\/\">IPv6 Security Myths<\/a> are general notions, often passed on unwittingly between colleagues, friends, conference attendees, and others. Today\u2019s myth is one that most often comes specifically from your vendors or suppliers. Whether it\u2019s a hardware manufacturer, software developer, or Internet Service Provider (ISP), this myth is all about trust, but verify.<\/p>\n<p style=\"padding-left: 30px;\"><strong>Myth: It Supports IPv6<\/strong><br \/>\n<strong> Reality: It Probably Doesn\u2019t<\/strong><\/p>\n<p>I am not saying that no products or services support IPv6. What I am saying is that a simple check-box in an RFx isn\u2019t enough. If a sales person tells you \u201cit supports IPv6\u201d without any further details or collateral \u2013 you probably need to dig deeper.<\/p>\n<p>Many products and services do in fact support IPv6 today. More companies add IPv6 support to their products every day. The catch, especially from a security standpoint, is what that word \u201csupport\u201d really means. Sometimes \u201cIPv6 support\u201d means that a device can be configured with an IPv6 address. Sometimes it means the service passes IPv6 packets. Sometimes it just means the application won\u2019t puke all over itself when deployed in an IPv6 enabled environment.<\/p>\n<p>What you need \u201cIPv6 support\u201d to mean is full feature parity with your existing (likely IPv4) products and services. You also need that IPv6 support to provide the foundation for future changes and improvements as well, of course. What that means is that you must bust this myth yourself every time it pops up.<\/p>\n<p>How can you avoid falling for the \u201cit supports IPv6\u201d myth? Start with detailed requirements. What is it that you need this product or service to do? RIPE-554, \u201c<a title=\"RIPE-554 \" href=\"https:\/\/www.ripe.net\/ripe\/docs\/ripe-554\">Requirements for IPv6 in ICT Equipment<\/a>\u201d includes a section specific to <a title=\"RIPE-554 on network security equipment requirements\" href=\"https:\/\/www.ripe.net\/ripe\/docs\/ripe-554#requirements5\">&#8220;network security equipment\u201d<\/a> that I highly recommend as a starting place when crafting such a requirements list. Once you find a product or service that meets your needs on paper, lab testing and limited launches (pilot programs \/ first office installs) will help ensure that you aren\u2019t bitten by this myth. Seeking independent verification is sometimes warranted as well, for an example check out this list of <a title=\"IPv6 CE Router Tested List\" href=\"https:\/\/www.iol.unh.edu\/registry\/ipv6-cerouter\">tested home routers<\/a> published by the University of New Hampshire (UNH) InterOperability Lab (IOL).<\/p>\n<p>The bottom line for this myth is simple: Treat IPv6 like you would any other new technology being deployed on your network. Ensure that all new equipment meets your specific needs, and remember to trust but verify when it comes to IPv6 support.<\/p>\n<p><a title=\"Send the Deploy360 team feedback!\" href=\"http:\/\/www.internetsociety.org\/deploy360\/feedback\/\">Have you already deployed IPv6<\/a>? We\u2019d love to hear about your experiences, publish your lessons learned, and promote your success story along with our other IPv6 resources \u2013 especially if they relate to IPv6 security directly! If not, what are you waiting for?!? <a title=\"All IPv6 Resources\" href=\"http:\/\/www.internetsociety.org\/deploy360\/ipv6\/\">Get started today<\/a>.<\/p>\n<p style=\"text-align: right;\"><em>This post also appears on <a title=\"This post, on the Deploy360 blog\" href=\"http:\/\/www.internetsociety.org\/deploy360\/blog\/2015\/03\/ipv6-security-myth-8-it-supports-ipv6\/\">the Deploy360 blog<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most of our IPv6 Security Myths are general notions, often <a href=\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/\"> &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":2390,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_post_was_ever_published":false},"categories":[9,11,12,24,27],"tags":[242,331,757,358,360,361,365,366,368,750,370,758],"class_list":["post-2531","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet","category-ipv6","category-ipv6-security-myths","category-security","category-technology","tag-experience","tag-internet","tag-internet-service-provider","tag-ipv4","tag-ipv6","tag-ipv6-address","tag-ipv6-packet","tag-ipv6-packets","tag-ipv6-security","tag-ipv6-security-myths","tag-ipv6-support","tag-support-ipv6"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IPv6 Security Myth #8: It Supports IPv6 ~ Chris Grundemann<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IPv6 Security Myth #8: It Supports IPv6 ~ Chris Grundemann\" \/>\n<meta property=\"og:description\" content=\"Most of our IPv6 Security Myths are general notions, often ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/\" \/>\n<meta property=\"og:site_name\" content=\"Chris Grundemann\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/chris.grundemann\" \/>\n<meta property=\"article:published_time\" content=\"2015-03-03T11:06:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-08T15:17:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"654\" \/>\n\t<meta property=\"og:image:height\" content=\"255\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"~Chris\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/ChrisGrundemann\" \/>\n<meta name=\"twitter:site\" content=\"@ChrisGrundemann\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"~Chris\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-8-it-supports-ipv6\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-8-it-supports-ipv6\\\/\"},\"author\":{\"name\":\"~Chris\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/person\\\/16a6af2797267c7d91f29876d5a0870f\"},\"headline\":\"IPv6 Security Myth #8: It Supports IPv6\",\"datePublished\":\"2015-03-03T11:06:10+00:00\",\"dateModified\":\"2021-07-08T15:17:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-8-it-supports-ipv6\\\/\"},\"wordCount\":464,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-8-it-supports-ipv6\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2015\\\/01\\\/IPv6SecurityMyths.jpg\",\"keywords\":[\"experience\",\"Internet\",\"Internet Service Provider\",\"IPv4\",\"IPv6\",\"ipv6 address\",\"ipv6 packet\",\"ipv6 packets\",\"IPv6 security\",\"IPv6 Security Myths\",\"IPv6 support\",\"support IPv6\"],\"articleSection\":[\"Internet\",\"IPv6\",\"IPv6 Security Myths\",\"Security\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-8-it-supports-ipv6\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-8-it-supports-ipv6\\\/\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-8-it-supports-ipv6\\\/\",\"name\":\"IPv6 Security Myth #8: It Supports IPv6 ~ Chris Grundemann\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-8-it-supports-ipv6\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-8-it-supports-ipv6\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2015\\\/01\\\/IPv6SecurityMyths.jpg\",\"datePublished\":\"2015-03-03T11:06:10+00:00\",\"dateModified\":\"2021-07-08T15:17:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-8-it-supports-ipv6\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-8-it-supports-ipv6\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-8-it-supports-ipv6\\\/#primaryimage\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2015\\\/01\\\/IPv6SecurityMyths.jpg\",\"contentUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2015\\\/01\\\/IPv6SecurityMyths.jpg\",\"width\":654,\"height\":255,\"caption\":\"Security in an IPv6 World\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-8-it-supports-ipv6\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/category\\\/ipv6\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IPv6 Security Myths\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/category\\\/ipv6\\\/ipv6-security-myths\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"IPv6 Security Myth #8: It Supports IPv6\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#website\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/\",\"name\":\"Chris Grundemann\",\"description\":\"Use technology, marketing, and strategy to take your growing business to the next level.\",\"publisher\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/chrisgrundemann.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\",\"name\":\"Grundemann Technology Solutions\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cropped-GTS-Logo.png\",\"contentUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cropped-GTS-Logo.png\",\"width\":512,\"height\":512,\"caption\":\"Grundemann Technology Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/ChrisGrundemann\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/grundemann\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/cgrundemann\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/person\\\/16a6af2797267c7d91f29876d5a0870f\",\"name\":\"~Chris\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"caption\":\"~Chris\"},\"description\":\"Creative|Technologist. Curious. Boisterous. Autotelic Autodidact. Heretic. Hacker. Rider of Boards. Writer of Words. ...Traveler of Time...\",\"sameAs\":[\"https:\\\/\\\/chrisgrundemann.com\",\"https:\\\/\\\/www.facebook.com\\\/chris.grundemann\",\"http:\\\/\\\/instagram.com\\\/chrisgrundemann\",\"www.linkedin.com\\\/in\\\/cgrundemann\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/ChrisGrundemann\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IPv6 Security Myth #8: It Supports IPv6 ~ Chris Grundemann","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/","og_locale":"en_US","og_type":"article","og_title":"IPv6 Security Myth #8: It Supports IPv6 ~ Chris Grundemann","og_description":"Most of our IPv6 Security Myths are general notions, often ...","og_url":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/","og_site_name":"Chris Grundemann","article_author":"https:\/\/www.facebook.com\/chris.grundemann","article_published_time":"2015-03-03T11:06:10+00:00","article_modified_time":"2021-07-08T15:17:56+00:00","og_image":[{"width":654,"height":255,"url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","type":"image\/jpeg"}],"author":"~Chris","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/ChrisGrundemann","twitter_site":"@ChrisGrundemann","twitter_misc":{"Written by":"~Chris","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/#article","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/"},"author":{"name":"~Chris","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f"},"headline":"IPv6 Security Myth #8: It Supports IPv6","datePublished":"2015-03-03T11:06:10+00:00","dateModified":"2021-07-08T15:17:56+00:00","mainEntityOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/"},"wordCount":464,"commentCount":0,"publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/#primaryimage"},"thumbnailUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","keywords":["experience","Internet","Internet Service Provider","IPv4","IPv6","ipv6 address","ipv6 packet","ipv6 packets","IPv6 security","IPv6 Security Myths","IPv6 support","support IPv6"],"articleSection":["Internet","IPv6","IPv6 Security Myths","Security","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/","url":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/","name":"IPv6 Security Myth #8: It Supports IPv6 ~ Chris Grundemann","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/#primaryimage"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/#primaryimage"},"thumbnailUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","datePublished":"2015-03-03T11:06:10+00:00","dateModified":"2021-07-08T15:17:56+00:00","breadcrumb":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/#primaryimage","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","width":654,"height":255,"caption":"Security in an IPv6 World"},{"@type":"BreadcrumbList","@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/chrisgrundemann.com\/"},{"@type":"ListItem","position":2,"name":"IPv6","item":"https:\/\/chrisgrundemann.com\/index.php\/category\/ipv6\/"},{"@type":"ListItem","position":3,"name":"IPv6 Security Myths","item":"https:\/\/chrisgrundemann.com\/index.php\/category\/ipv6\/ipv6-security-myths\/"},{"@type":"ListItem","position":4,"name":"IPv6 Security Myth #8: It Supports IPv6"}]},{"@type":"WebSite","@id":"https:\/\/chrisgrundemann.com\/#website","url":"https:\/\/chrisgrundemann.com\/","name":"Chris Grundemann","description":"Use technology, marketing, and strategy to take your growing business to the next level.","publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/chrisgrundemann.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/chrisgrundemann.com\/#organization","name":"Grundemann Technology Solutions","url":"https:\/\/chrisgrundemann.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","width":512,"height":512,"caption":"Grundemann Technology Solutions"},"image":{"@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ChrisGrundemann","https:\/\/www.linkedin.com\/company\/grundemann","https:\/\/www.linkedin.com\/in\/cgrundemann\/","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]},{"@type":"Person","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f","name":"~Chris","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","url":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","caption":"~Chris"},"description":"Creative|Technologist. Curious. Boisterous. Autotelic Autodidact. Heretic. Hacker. Rider of Boards. Writer of Words. ...Traveler of Time...","sameAs":["https:\/\/chrisgrundemann.com","https:\/\/www.facebook.com\/chris.grundemann","http:\/\/instagram.com\/chrisgrundemann","www.linkedin.com\/in\/cgrundemann","https:\/\/x.com\/https:\/\/twitter.com\/ChrisGrundemann","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]}]}},"jetpack_featured_media_url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","jetpack_shortlink":"https:\/\/wp.me\/ps8ie-EP","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts\/2531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/comments?post=2531"}],"version-history":[{"count":0,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts\/2531\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media\/2390"}],"wp:attachment":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media?parent=2531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/categories?post=2531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/tags?post=2531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}