{"id":5027,"date":"2022-02-28T16:51:47","date_gmt":"2022-02-28T21:51:47","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=5027"},"modified":"2022-02-28T16:51:47","modified_gmt":"2022-02-28T21:51:47","slug":"why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/","title":{"rendered":"Why you need to disable inactive accounts right now: The cybersecurity risks of \u2018ghost accounts\u2019"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-5028\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/02\/close-up-of-login-window-300x200.jpg\" alt=\"A close up of a login window for an admin account.\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/02\/close-up-of-login-window-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/02\/close-up-of-login-window-1024x683.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/02\/close-up-of-login-window-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/02\/close-up-of-login-window-1536x1024.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/02\/close-up-of-login-window-2048x1365.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/02\/close-up-of-login-window-200x133.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>A company grappling with a Nefilim <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/the-true-cost-and-impact-of-ransomware-how-an-attack-can-haunt-your-business-for-years\/\" target=\"_blank\" rel=\"noopener\">ransomware incident<\/a> reached out to the security solution provider Sophos for assistance. The Sophos Rapid Response team immediately set out to resolve the incident, according to a <a href=\"https:\/\/news.sophos.com\/en-us\/2021\/01\/26\/nefilim-ransomware-attack-uses-ghost-credentials\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Sophos News article<\/a>.<\/p>\n<p>While investigating how the attack occurred, they found that a bad actor had commandeered an admin account a full month before launching the ransomware campaign. The admin account happened to belong to someone who died a few months before the hacker put their plan into motion.<\/p>\n<p>This is one example of how a \u201cghost\u201d account can lead to a major cybersecurity incident. Whether the user in question passed away or moved on to another organization, it\u2019s common for businesses to retain old accounts.<\/p>\n<p>In the case of the Sophos customer, the company continued to use the account at times for some services, but many companies allow accounts to go completely stale. These accounts end up being not just a waste of storage space but also a potential gateway for hackers trying to infiltrate corporate networks.<\/p>\n<h2>What are ghost accounts?<\/h2>\n<p>A ghost account (a.k.a., ghost user) is an inactive account that still has access to your IT network and systems, according to the Security Boulevard article, \u201c\u2018<a href=\"https:\/\/securityboulevard.com\/2019\/04\/ghost-users-and-non-expiring-passwords-a-major-security-issue-for-most-businesses\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Ghost Users\u2019 and Non-Expiring Passwords a Major Security Issue for Most Businesses<\/a>.\u201d This can happen when someone leaves the company or passes away, and the IT team forgets to shut down their account.<\/p>\n<p>These accounts sit around collecting dust and taking up database space. This sort of oversight is far from rare: As of 2020, over 10 percent of Azure Active Directory user accounts were inactive based on their last log-on time or password change, according to <a href=\"https:\/\/docs.microsoft.com\/en-us\/services-hub\/health\/remediation-steps-ad\/regularly-check-for-and-remove-inactive-user-accounts-in-active-directory\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Microsoft<\/a>. Additionally, in a 2021 <a href=\"https:\/\/info.varonis.com\/hubfs\/docs\/research_reports\/2021-Financial-Data-Risk-Report.pdf?hsLang=en\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">analysis of the financial services industry<\/a>, the cybersecurity solution provider Varonis found that approximately 40 percent of organizations had upwards of 10,000 ghost accounts.<\/p>\n<h2>Why are inactive accounts a security risk?<\/h2>\n<p>Dormant accounts create prime opportunities for cybercriminals to access your data and sneak around your network undetected for an extended period, according to Security Boulevard. It\u2019s similar to the trope of characters stealing uniforms to traverse an enemy base unnoticed (e.g., when Luke Skywalker and Han Solo disguise themselves as stormtroopers in \u201cStar Wars\u201d).<\/p>\n<p>There are plenty of examples of criminals using this trick to cause significant damage. For instance, the Colonial Pipeline attack started with a bad actor hacking an inactive VPN account to access the network, according to the TechHQ article, \u201c<a href=\"https:\/\/techhq.com\/2022\/02\/inactive-user-accounts-pose-security-threats-for-organizations\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Inactive user accounts pose security threats for organizations<\/a>.\u201d<\/p>\n<h2>How to stop stale accounts from leading to cyberattacks<\/h2>\n<p>Knowing that ghost accounts can come back to haunt you in a catastrophic way, how can you minimize security risks related to inactive users? There are a few steps you can take to avoid breaches stemming from stale accounts, according to Sophos:<\/p>\n<ul>\n<li>Review access permissions. Don\u2019t give end users access to more than the resources they need to do their jobs.<\/li>\n<li>Implement <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-mfa-has-become-mandatory-for-cyber-liability-coverage\/\" target=\"_blank\" rel=\"noopener\">multi-factor authentication (MFA)<\/a> for all end users.<\/li>\n<li>Routinely audit Active Directory and shut down stale accounts.<\/li>\n<li>Make disabling user accounts part of the offboarding process.<\/li>\n<li>Implement advanced cybersecurity solutions to combat ransomware, such as <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-xdr-your-guide-to-extended-detection-and-response\/\" target=\"_blank\" rel=\"noopener\">extended detection and response (XDR)<\/a> and incident response services.<\/li>\n<\/ul>\n<p>If you\u2019d like to learn more about how to lower your security risk level, our <a href=\"https:\/\/www.stratospherenetworks.com\/trusted-advisor.html\" target=\"_blank\" rel=\"noopener\">trusted advisors<\/a> work with various leading cybersecurity solution providers in our partner network. We can help you identify the best products and services for your business based on your needs and goals. For details, give us a call at 877-599-3999 or email <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A company grappling with a Nefilim ransomware incident reached out to the security solution provider Sophos for assistance. The Sophos Rapid Response team immediately set out to resolve the incident, according to a Sophos News article. While investigating how the &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":5028,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[263],"tags":[],"class_list":["post-5027","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-corner"],"yoast_head":"<title>Why inactive accounts are a security risk | Stratosphere<\/title>\n<meta name=\"description\" content=\"\u201cGhost\u201d accounts, also known as inactive or stale accounts, can serve as an entry point for hackers looking to infiltrate your network.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why inactive accounts are a security risk | Stratosphere\" \/>\n<meta property=\"og:description\" content=\"\u201cGhost\u201d accounts, also known as inactive or stale accounts, can serve as an entry point for hackers looking to infiltrate your network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-28T21:51:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/02\/close-up-of-login-window.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2121\" \/>\n\t<meta property=\"og:image:height\" content=\"1414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"Why you need to disable inactive accounts right now: The cybersecurity risks of \u2018ghost accounts\u2019\",\"datePublished\":\"2022-02-28T21:51:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/\"},\"wordCount\":607,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/02\/close-up-of-login-window.jpg\",\"articleSection\":[\"Cyber Corner\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/\",\"name\":\"Why inactive accounts are a security risk | Stratosphere\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/02\/close-up-of-login-window.jpg\",\"datePublished\":\"2022-02-28T21:51:47+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"\u201cGhost\u201d accounts, also known as inactive or stale accounts, can serve as an entry point for hackers looking to infiltrate your network.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/02\/close-up-of-login-window.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/02\/close-up-of-login-window.jpg\",\"width\":2121,\"height\":1414,\"caption\":\"A close up of a login window for an admin account.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why you need to disable inactive accounts right now: The cybersecurity risks of \u2018ghost accounts\u2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"Why inactive accounts are a security risk | Stratosphere","description":"\u201cGhost\u201d accounts, also known as inactive or stale accounts, can serve as an entry point for hackers looking to infiltrate your network.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/","og_locale":"en_US","og_type":"article","og_title":"Why inactive accounts are a security risk | Stratosphere","og_description":"\u201cGhost\u201d accounts, also known as inactive or stale accounts, can serve as an entry point for hackers looking to infiltrate your network.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2022-02-28T21:51:47+00:00","og_image":[{"width":2121,"height":1414,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/02\/close-up-of-login-window.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"Why you need to disable inactive accounts right now: The cybersecurity risks of \u2018ghost accounts\u2019","datePublished":"2022-02-28T21:51:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/"},"wordCount":607,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/02\/close-up-of-login-window.jpg","articleSection":["Cyber Corner"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/","name":"Why inactive accounts are a security risk | Stratosphere","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/02\/close-up-of-login-window.jpg","datePublished":"2022-02-28T21:51:47+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"\u201cGhost\u201d accounts, also known as inactive or stale accounts, can serve as an entry point for hackers looking to infiltrate your network.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/02\/close-up-of-login-window.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/02\/close-up-of-login-window.jpg","width":2121,"height":1414,"caption":"A close up of a login window for an admin account."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-disable-inactive-accounts-right-now-the-cybersecurity-risks-of-ghost-accounts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why you need to disable inactive accounts right now: The cybersecurity risks of \u2018ghost accounts\u2019"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5027"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5027\/revisions"}],"predecessor-version":[{"id":5030,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5027\/revisions\/5030"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/5028"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}