{"id":3182,"date":"2019-10-22T11:19:58","date_gmt":"2019-10-22T16:19:58","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=3182"},"modified":"2019-10-22T11:19:58","modified_gmt":"2019-10-22T16:19:58","slug":"5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/","title":{"rendered":"5 IT Horror Stories: Top Tech Nightmares and How to Avoid Them"},"content":{"rendered":"<p><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/hacked.jpg\"><img decoding=\"async\" class=\"alignleft wp-image-3183 size-medium\" title=\"hacked computer IT horror stories illustration with evil skeleton behind the monitor.\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/hacked-234x300.jpg\" alt=\"hacked computer IT horror stories illustration with evil skeleton behind the monitor.\" width=\"234\" height=\"300\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/hacked-234x300.jpg 234w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/hacked-200x257.jpg 200w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/hacked.jpg 474w\" sizes=\"(max-width: 234px) 100vw, 234px\" \/><\/a>Halloween is almost here, which means it\u2019s the season to indulge in everything scary, ghastly and ghoulish. In honor of the upcoming holiday, we\u2019d like to share some terrifying tales from tech support. Although scary stories traditionally feature ghosts, zombies and other monsters, sometimes the scariest specters wreak havoc on our lives not from the crypt but from computers.<\/p>\n<p>So gather around the virtual campfire and see if you\u2019re brave enough to get through these five shiver-inducing stories of IT gone wrong. Please note that these are fictional accounts based on real risks.<\/p>\n<h2>1. The Lost Laptop<\/h2>\n<p>A sales rep on a business trip grabs a sandwich at the airport and heads to a table to do a little work on his laptop. After he finishes eating and answering some emails, he closes the laptop and puts it back in its bag, then takes out his phone for a few minutes to scroll through Twitter. He loses track of time catching up on what\u2019s trending and soon realizes it\u2019s almost time for his plane to board, so he grabs his bags and rushes to his gate.<\/p>\n<p>As he\u2019s standing in line waiting to board, a sudden chill of realization washes over him: He left his laptop behind. He rushes back to the table he was at and finds nothing. Worst of all, he didn\u2019t bother to set a secure password for the laptop (to his shame, it\u2019s password1234), and all of his other passwords are saved in the browser and apps for convenience. Whoever finds the laptop could be combing through sensitive company data in no time.<\/p>\n<p>This tale is disturbing because it could happen to any of us. Luckily, there are steps you can take to ensure you fare better than the unfortunate protagonist of this story, such as <a href=\"https:\/\/www.stratospherenetworks.com\/4-password-tips.html\" target=\"_blank\" rel=\"noopener noreferrer\">setting strong passwords<\/a> for your devices, <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/should-you-let-your-browser-save-your-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">not allowing browsers<\/a> and apps to save your passwords, and <a href=\"https:\/\/gizmodo.com\/why-you-should-be-encrypting-your-devices-and-how-to-ea-1798698901\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">encrypting devices<\/a>.<\/p>\n<h2>2. The Stolen Password<\/h2>\n<p>An office worker comes back from lunch to find that her inbox is flooded with confused replies to messages she didn\u2019t actually send. With a sinking feeling in her stomach, she realizes that her account has been hacked and someone is using it to send out <a href=\"https:\/\/www.stratospherenetworks.com\/what-you-should-know-about-phishing-malware-infographic.html\" target=\"_blank\" rel=\"noopener noreferrer\">phishing messages<\/a>.<\/p>\n<p>She\u2019s overcome with dread not only because she knows a cybercriminal has control of her email but also because she uses her email account password for various other sites and apps, including her personal LinkedIn and Facebook, as well as her company\u2019s CRM software.<\/p>\n<p>This nightmare could happen to plenty of people: <a href=\"https:\/\/mashable.com\/2017\/02\/28\/passwords-reuse-study-keeper-security\/#7S0D8Civ78q3\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">A 2017 survey of smartphone owners<\/a> by Keeper Security found that 87 percent of people between the ages of 18 and 30 use the same password across multiple apps\/accounts. It might save time in the short run, but ultimately it\u2019s smarter to use a unique secure password for each account and keep track of them all with <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/4-key-reasons-to-use-a-password-manager\/\" target=\"_blank\" rel=\"noopener noreferrer\">a password manager<\/a>.<\/p>\n<h2>3. The Ransomware Attack<\/h2>\n<p>Another office worker receives an email from a vendor he knows, but it doesn\u2019t have any text except for a weird-looking link. He\u2019s confused but clicks on it anyway. Soon his screen is locked with a message telling him that he must pay a ransom to regain access to his files. He\u2019s fallen prey to <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-prevent-ransomware-attacks-everything-you-should-know-about-this-malware-on-the-rise\/\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware<\/a>, a type of malware that hackers use to encrypt a target\u2019s files and then hold them hostage.<\/p>\n<p>To avoid finding yourself living this IT horror story, avoid clicking on suspicious email attachments or \u201cphishy\u201d links in messages. You should also patch and update everything on a routine basis.<\/p>\n<p>Finally, it\u2019s smart to <a href=\"https:\/\/www.stratospherenetworks.com\/backup-and-disaster-recovery.html\" target=\"_blank\" rel=\"noopener noreferrer\">back up your data<\/a> regularly so that if you\u2019re hit by ransomware, you can restore your systems without having the pay the criminals who kidnapped your files. \u00a0Remember that off-site cloud backups are critical, because local backups can get breached during an on-site incident.<\/p>\n<h2>4. The Dark and Stormy Day at the Office<\/h2>\n<p>The workers at one office find themselves watching with concern out the windows as lightning flashes, thunder rumbles and sheets of rain drench everything in sight. Soon, everyone\u2019s phones screech with an emergency alert: There\u2019s a flash flood. The team climbs to the top floor for safety, but with all of their IT equipment stored on the ground floor and no backups, it seems like this small company might not survive this storm.<\/p>\n<p>Floods, fires, tornadoes and other catastrophes can destroy an unprepared business. Downtime can be extremely expensive: The average cost of an unplanned data center outage was almost $9,000 per minute in 2016, according to the <a href=\"https:\/\/www.vertiv.com\/globalassets\/documents\/reports\/2016-cost-of-data-center-outages-11-11_51190_1.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Ponemon Institute<\/a>.<\/p>\n<p>That\u2019s why it\u2019s vital to have a <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-a-business-continuity-plan-and-why-is-it-important-for-my-business\/\" target=\"_blank\" rel=\"noopener noreferrer\">business continuity plan<\/a> and <a href=\"https:\/\/www.stratospherenetworks.com\/backup-and-disaster-recovery.html\" target=\"_blank\" rel=\"noopener noreferrer\">back and disaster recovery solutions<\/a> in place. Don\u2019t let a dark and stormy night (or day) spell doom for your organization.<\/p>\n<h2>5. The Missing IT Guy<\/h2>\n<p>A small business relies on just one IT guy. He\u2019s good at his job and never complains, so it seems like he can handle the work all on his own, even if he appears a little stressed sometimes trying to tackle multiple support requests. One day, however, he doesn\u2019t show up for work. His boss calls him, but it goes straight to voicemail. No one has any idea how to take care of IT for the company without him, and soon everyone is panicking.<\/p>\n<p>Having only one IT staff member can be scary for everyone \u2013 including the lone IT expert. If that\u2019s your current situation, you might want to consider <a href=\"https:\/\/www.stratospherenetworks.com\/how-to-justify-outsourcing-your-it.html\" target=\"_blank\" rel=\"noopener noreferrer\">outsourcing your IT<\/a> to a third-party managed service provider. You\u2019ll gain access to a team of certified tech experts who can tackle tasks like <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-small-and-midsize-businesses-should-outsource-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">staying on top of cybersecurity<\/a> and <a href=\"https:\/\/www.stratospherenetworks.com\/empowered-internal-it.html\" target=\"_blank\" rel=\"noopener noreferrer\">empower in-house IT staff<\/a> with tools like automation.<\/p>\n<p>Hopefully these tales of tech-related woes won\u2019t keep you up at night. If you want to avoid these nightmares, our team of expert techs can put your mind at ease with <a href=\"https:\/\/www.stratospherenetworks.com\/chicago-it-support-and-managed-services.html\" target=\"_blank\" rel=\"noopener noreferrer\">advanced IT solutions<\/a>. Avoid IT horrors by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Halloween is almost here, which means it\u2019s the season to indulge in everything scary, ghastly and ghoulish. In honor of the upcoming holiday, we\u2019d like to share some terrifying tales from tech support. Although scary stories traditionally feature ghosts, zombies &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":3183,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-3182","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>IT Horror Stories: Top Tech Nightmares Businesses Should Avoid<\/title>\n<meta name=\"description\" content=\"Sometimes the scariest specters enter our lives not from the crypt but through computers. Are you brave enough to get through these IT horror stories?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Horror Stories: Top Tech Nightmares Businesses Should Avoid\" \/>\n<meta property=\"og:description\" content=\"Sometimes the scariest specters enter our lives not from the crypt but through computers. Are you brave enough to get through these IT horror stories?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-22T16:19:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/hacked.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"474\" \/>\n\t<meta property=\"og:image:height\" content=\"608\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"5 IT Horror Stories: Top Tech Nightmares and How to Avoid Them\",\"datePublished\":\"2019-10-22T16:19:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/\"},\"wordCount\":1017,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/hacked.jpg\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/\",\"name\":\"IT Horror Stories: Top Tech Nightmares Businesses Should Avoid\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/hacked.jpg\",\"datePublished\":\"2019-10-22T16:19:58+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"Sometimes the scariest specters enter our lives not from the crypt but through computers. Are you brave enough to get through these IT horror stories?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/hacked.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/hacked.jpg\",\"width\":474,\"height\":608,\"caption\":\"hacked computer illustration with evil skeleton behind the monitor.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 IT Horror Stories: Top Tech Nightmares and How to Avoid Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"IT Horror Stories: Top Tech Nightmares Businesses Should Avoid","description":"Sometimes the scariest specters enter our lives not from the crypt but through computers. Are you brave enough to get through these IT horror stories?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/","og_locale":"en_US","og_type":"article","og_title":"IT Horror Stories: Top Tech Nightmares Businesses Should Avoid","og_description":"Sometimes the scariest specters enter our lives not from the crypt but through computers. Are you brave enough to get through these IT horror stories?","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2019-10-22T16:19:58+00:00","og_image":[{"width":474,"height":608,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/hacked.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"5 IT Horror Stories: Top Tech Nightmares and How to Avoid Them","datePublished":"2019-10-22T16:19:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/"},"wordCount":1017,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/hacked.jpg","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/","name":"IT Horror Stories: Top Tech Nightmares Businesses Should Avoid","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/hacked.jpg","datePublished":"2019-10-22T16:19:58+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"Sometimes the scariest specters enter our lives not from the crypt but through computers. Are you brave enough to get through these IT horror stories?","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/hacked.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/10\/hacked.jpg","width":474,"height":608,"caption":"hacked computer illustration with evil skeleton behind the monitor."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-it-horror-stories-top-tech-nightmares-and-how-to-avoid-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"5 IT Horror Stories: Top Tech Nightmares and How to Avoid Them"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=3182"}],"version-history":[{"count":5,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3182\/revisions"}],"predecessor-version":[{"id":3185,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3182\/revisions\/3185"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3183"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=3182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=3182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=3182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}