{"id":2160,"date":"2017-05-04T09:56:29","date_gmt":"2017-05-04T14:56:29","guid":{"rendered":"http:\/\/www.stratospherenetworks.com\/blog\/?p=2160"},"modified":"2018-06-26T12:03:54","modified_gmt":"2018-06-26T17:03:54","slug":"12-steps-make-infrastructure-secure-safeguard-mobile-devices","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/","title":{"rendered":"12 Steps to Make Your IT Infrastructure More Secure: Safeguard Mobile Devices"},"content":{"rendered":"<p><a href=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/02\/Touchscreen-phone-Mobility.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-2088\" src=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/02\/Touchscreen-phone-Mobility-300x215.jpg\" alt=\"mobile device\" width=\"300\" height=\"215\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/02\/Touchscreen-phone-Mobility-300x215.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/02\/Touchscreen-phone-Mobility-768x549.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/02\/Touchscreen-phone-Mobility-1024x733.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Most Americans (77%) now own a smartphone, up from just 35% in 2011, according to the <a href=\"http:\/\/www.pewinternet.org\/fact-sheet\/mobile\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Pew Research Center<\/a>. Additionally, about half of American adults own tablet computers. As mobile device ownership has become the norm, smartphones and tablets have made their way into the workplace.<\/p>\n<p>The practice of using personal mobile devices at the office to access company data presents a new set of cybersecurity risks. Your IT infrastructure isn\u2019t truly safeguarded against IT security threats unless you\u2019ve accounted for and taken steps to <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/7-things-everyone-should-know-about-mobile-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">protect mobile devices<\/a> and other <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/why-your-business-needs-to-ensure-endpoint-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">endpoints<\/a>.<\/p>\n<p>That\u2019s why the 11<sup>th<\/sup> step in our process for ensuring your IT infrastructure is secure involves protecting mobile devices and other endpoints from malicious parties and software looking to gain unauthorized access to your company\u2019s network. Before we explore this topic, however, here are the previous steps, in case you want to review them:<\/p>\n<p>1. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-to-make-infrastructure-secure-performing-security-audit\/\" target=\"_blank\" rel=\"noopener noreferrer\">Performing a security audit<\/a><\/p>\n<p>2. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/\" target=\"_blank\" rel=\"noopener noreferrer\">Creating and enforcing IT security policies<\/a><\/p>\n<p>3. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-anti-virus\/\" target=\"_blank\" rel=\"noopener noreferrer\">Updating your anti-virus solution<\/a><\/p>\n<p>4. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Updating workstations and servers<\/a><\/p>\n<p>5. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/\" target=\"_blank\" rel=\"noopener noreferrer\">Guarding your email with a hosted spam solution<\/a><\/p>\n<p>6. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-hosted-dns-solution\/\" target=\"_blank\" rel=\"noopener noreferrer\">Implementing a hosted DNS solution<\/a><\/p>\n<p>7. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-update-firewall\/\" target=\"_blank\" rel=\"noopener noreferrer\">Updating your firewall<\/a><\/p>\n<p>8. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-implement-backup-solution\/\" target=\"_blank\" rel=\"noopener noreferrer\">Implementing a backup solution<\/a><\/p>\n<p>9. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-audit-servers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Auditing your servers<\/a><\/p>\n<p>10. <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-secure-wifi\/\" target=\"_blank\" rel=\"noopener noreferrer\">Securing your WiFi<\/a><\/p>\n<p><strong>Mobility and Vulnerability<br \/>\n<\/strong>Many businesses have embraced the growing popularity of mobile devices by adopting \u201c<a href=\"http:\/\/www.stratospherenetworks.com\/blog\/best-practices-for-byod\/\" target=\"_blank\" rel=\"noopener noreferrer\">bring your own device<\/a>\u201d (BYOD) policies, which allow employees to bring in their own smartphones, tablets, and other mobile gadgets and use them to complete projects. Although a BYOD plan could lower your organization\u2019s technology costs since workers supply some of their own tech tools, allowing personal devices in the office creates a bunch of new points of vulnerability where security is concerned.<\/p>\n<p>Here are some questions and scenarios you\u2019ll want to consider regarding mobile devices and security risks:<\/p>\n<p>1. What happens if a device that has sensitive corporate data on it gets lost?<\/p>\n<p>2. What if an employee leaves the company and takes their personal devices (still containing company data) with them?<\/p>\n<p>3. What if an employee uses their mobile device to access a non-secure\/non-corporate network? This could happen, for example, if they use public WiFi to access the Internet while at a coffee shop. People looking to gain unauthorized access to sensitive data could do so through the unsecured network.<\/p>\n<p><strong>Mobile and Endpoint Security Solutions<br \/>\n<\/strong>To reduce your risk of potentially disastrous data breaches, it\u2019s important to implement comprehensive security policies and educate your employees on <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/ensure-security-of-your-phone\/\" target=\"_blank\" rel=\"noopener noreferrer\">best practices<\/a> to keep their smartphones and other devices as safe as possible from cyber criminals. For example, everyone should implement a password\/passcode lock for their devices. There are also apps and features available that can let users remotely wipe their devices.<\/p>\n<p>Additionally, your business can add an extra layer of protection with <a href=\"http:\/\/www.stratospherenetworks.com\/security-solutions-carbon-black.html\" target=\"_blank\" rel=\"noopener noreferrer\">endpoint security solutions<\/a>. There are a number of next-generation endpoint protection products available, including the following:<\/p>\n<ul>\n<li>A security platform that allows your business to prevent, hunt, detect, and respond to endpoint security threats<\/li>\n<li>A platform that records all critical endpoint activity and centralizes it to give security teams a look at the complete picture<\/li>\n<li>An SaaS endpoint detection and response platform that leverages the power of cloud computing to enhance your company\u2019s ability to identify and take care of security threats without adding infrastructure<\/li>\n<\/ul>\n<p>These are just some of the endpoint security solutions available for businesses looking to ensure endpoint security. If you\u2019d like to learn more about mobile\/endpoint security, our expert team can answer any questions you might have. Feel free to contact us by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">sales@stratospherenetworks.com<\/a>.<\/p>\n<p>And be sure to check back next week to learn about the 12<sup>th<\/sup> and final step in the Stratosphere Networks process for making sure your IT infrastructure is secure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most Americans (77%) now own a smartphone, up from just 35% in 2011, according to the Pew Research Center. Additionally, about half of American adults own tablet computers. As mobile device ownership has become the norm, smartphones and tablets have &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-2160","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>12 Steps to Secure IT Infrastructure: Mobile Devices<\/title>\n<meta name=\"description\" content=\"The 11th step in the process of securing your IT infrastructure is taking steps to reduce the security risks posed by mobile device usage in the workplace.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"12 Steps to Secure IT Infrastructure: Mobile Devices\" \/>\n<meta property=\"og:description\" content=\"The 11th step in the process of securing your IT infrastructure is taking steps to reduce the security risks posed by mobile device usage in the workplace.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-04T14:56:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-26T17:03:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"12 Steps to Make Your IT Infrastructure More Secure: Safeguard Mobile Devices\",\"datePublished\":\"2017-05-04T14:56:29+00:00\",\"dateModified\":\"2018-06-26T17:03:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/\"},\"wordCount\":625,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/\",\"name\":\"12 Steps to Secure IT Infrastructure: Mobile Devices\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2017-05-04T14:56:29+00:00\",\"dateModified\":\"2018-06-26T17:03:54+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"The 11th step in the process of securing your IT infrastructure is taking steps to reduce the security risks posed by mobile device usage in the workplace.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"12 Steps to Make Your IT Infrastructure More Secure: Safeguard Mobile Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"12 Steps to Secure IT Infrastructure: Mobile Devices","description":"The 11th step in the process of securing your IT infrastructure is taking steps to reduce the security risks posed by mobile device usage in the workplace.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/","og_locale":"en_US","og_type":"article","og_title":"12 Steps to Secure IT Infrastructure: Mobile Devices","og_description":"The 11th step in the process of securing your IT infrastructure is taking steps to reduce the security risks posed by mobile device usage in the workplace.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2017-05-04T14:56:29+00:00","article_modified_time":"2018-06-26T17:03:54+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"12 Steps to Make Your IT Infrastructure More Secure: Safeguard Mobile Devices","datePublished":"2017-05-04T14:56:29+00:00","dateModified":"2018-06-26T17:03:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/"},"wordCount":625,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/","name":"12 Steps to Secure IT Infrastructure: Mobile Devices","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2017-05-04T14:56:29+00:00","dateModified":"2018-06-26T17:03:54+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"The 11th step in the process of securing your IT infrastructure is taking steps to reduce the security risks posed by mobile device usage in the workplace.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-safeguard-mobile-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"12 Steps to Make Your IT Infrastructure More Secure: Safeguard Mobile Devices"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2160"}],"version-history":[{"count":1,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2160\/revisions"}],"predecessor-version":[{"id":2161,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2160\/revisions\/2161"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}