{"id":19549,"date":"2019-10-31T14:46:44","date_gmt":"2019-10-31T14:46:44","guid":{"rendered":"https:\/\/www.topdesk.com\/en\/?p=19549"},"modified":"2025-08-05T17:43:20","modified_gmt":"2025-08-05T16:43:20","slug":"it-security-nightmares","status":"publish","type":"post","link":"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/","title":{"rendered":"Halloween: 5 IT security nightmares to keep you up all night"},"content":{"rendered":"<p>It\u2019s October again. It\u2019s time for Halloween, so it\u2019s the season to be scared. It\u2019s probably not a coincidence that October is also Cyber Security Awareness Month, because if there\u2019s one thing that keeps IT departments everywhere up at night, it\u2019s security breaches.<\/p>\n<p>Here are five common cyber security horror stories for IT departments. Because sometimes, watching how your customers handle their work data just makes you want to yell like you yell at the tv when the girl runs upstairs from the killer again.<\/p>\n<h2>5 IT Security Nightmares<\/h2>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-20839\" src=\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_1.png\" alt=\"\" width=\"809\" height=\"531\" srcset=\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_1.png 1437w, https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_1-300x197.png 300w, https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_1-1024x673.png 1024w, https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_1-768x505.png 768w, https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_1-320x210.png 320w\" sizes=\"auto, (max-width: 809px) 100vw, 809px\" \/>\n<h3>1. Data breach<\/h3>\n<p>The ultimate horror scenario: you discover that sensitive data has been available to people that shouldn\u2019t have that kind of access. All organizations create monsters of data, and once the monster gets out of your control, the havoc it wreaks may have severe consequences. There are a lot of\u00a0things you and your colleagues can do to make sure your data and any <a href=\"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/\">potential data breaches<\/a> are contained, though.<\/p>\n<p>Implement multifactor authentication to make it harder to hack into accounts, and limit access for each employee to the information he or she needs. This reduces the risk of employees accidentally spreading information to unauthorized parties, and if you do get a leak, it\u2019s easier to find the source.<\/p>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-20827\" src=\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_2.png\" alt=\"\" width=\"812\" height=\"533\" srcset=\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_2.png 1437w, https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_2-300x197.png 300w, https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_2-1024x673.png 1024w, https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_2-768x505.png 768w, https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_2-320x210.png 320w\" sizes=\"auto, (max-width: 812px) 100vw, 812px\" \/>\n<h3>2. Loss of data<\/h3>\n<p>What if there\u2019s a fire in your building and all your servers are beyond salvation?\u00a0You\u2019ve thought of this of course, this is why you have off-site back-ups. You\u2019re not doomed. But there are a lot of ways to lose data. What if your cloud provider goes bankrupt?<\/p>\n<p>Thankfully, that\u2019s very unlikely, but it is wise to take measures to reduce the risk of data loss. Your organization depends on data, so losing a lot of it can be the equivalent of Godzilla come to destroy the place.<\/p>\n<p>How do you maintain security when <a href=\"https:\/\/www.topdesk.com\/en\/blog\/security-work-remotely\/\" rel=\" noopener\">employees work from home?<\/a><\/p>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-20833\" src=\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_4.png\" alt=\"\" width=\"818\" height=\"537\" srcset=\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_4.png 1437w, https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_4-300x197.png 300w, https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_4-1024x673.png 1024w, https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_4-768x505.png 768w, https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_4-320x210.png 320w\" sizes=\"auto, (max-width: 818px) 100vw, 818px\" \/>\n<h3>3. Ransomware all over the place<\/h3>\n<p>Ransomware. We all know what it does by now. And we all have different ways of dealing with the problem. Like I said, you\u2019ve got off-site back-ups, so if somebody comes in with a laptop that\u2019s been ransomed, they\u2019ll fully expect you to be able to put everything back into place. Little do they know of the bigger risk involved: how likely is it that this person\u2019s laptop has unwittingly provided criminals access to your network? They might take down the whole thing!<\/p>\n<p>This is another fear that\u2019s best mitigated by being cautious with who can access what. Only give people access to the parts of your network they actually need. This will keep infected accounts from spreading the virus like an army of zombies.<\/p>\n<p>Are you aware of the risks of <a href=\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/\" rel=\"noopener\">shadow IT?<\/a><\/p>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-20830\" src=\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_3.png\" alt=\"\" width=\"819\" height=\"538\" srcset=\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_3.png 1437w, https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_3-300x197.png 300w, https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_3-1024x673.png 1024w, https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_3-768x505.png 768w, https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_3-320x210.png 320w\" sizes=\"auto, (max-width: 819px) 100vw, 819px\" \/>\n<h3>4. Hackers get your privileged users or your password manager<\/h3>\n<p>It may sound a little bit out there, but if anybody can get hacked, why not password managers? Randomly generated and then stored passwords are safer than \u2018password\u2019, but they\u2019re not immune to the horrors of hacking. And since we\u2019re spiralling now anyway, do you ever wonder how your privileged users come up with their password?<\/p>\n<p>The colleague sitting right next to you might be logging in with \u2018qwerty\u2019 right now. And they have access to everything! You can\u2019t always prevent hackers from getting their hands on log-in details, but you can make sure everybody\u2019s alert.<\/p>\n<p>&nbsp;<\/p>\n<h3>5. The real world is still scarier: break-ins and theft<\/h3>\n<p>If you\u2019ve read a post on this blog before, chances are you know we\u2019re really big on working together with other departments. Even your IT security isn\u2019t just a digital affair. Do you have a plan for an actual, old-fashioned burglary? The burglar might not be after valuables lying around. They may have placed devices instead of taking them, so they can access your data later, or hack your network from inside the building.<\/p>\n<p>So, make sure you\u2019ve got a good collaboration with other departments when it comes to security, and help emphasize the importance of locking doors and keeping track of keys and entry passes. You never know what\u2019s lurking out there.<\/p>\n<p>So what do you think? Do security risks keep you up at night? What are your biggest IT security nightmares and what do you do to make them less likely to come true? Let us know in the comments or learn more ways to <a href=\"https:\/\/www.topdesk.com\/en\/blog\/itsm\/security\/6-ways-to-boost-it-security\/\">boost your IT security<\/a>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s October again. It\u2019s time for Halloween, so it\u2019s the season to be scared. It\u2019s probably not a coincidence that October is also Cyber Security Awareness Month, because if there\u2019s one thing that keeps IT departments everywhere up at night, it\u2019s security breaches. Here are five common cyber security horror stories for IT departments. Because<\/p>\n","protected":false},"author":1,"featured_media":19555,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"editor_notices":[],"footnotes":""},"class_list":["post-19549","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":{"blog_author":"","blog_hubspot_cta_link":"","toc_display":"not-visible","blog_promotion_overwrite":false,"blog_promotion":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IT Security Nightmares: Cyber Security Horror Stories<\/title>\n<meta name=\"description\" content=\"Get spooked by real-life cyber security horror stories this Halloween! Learn how to avoid your own IT security nightmares\u2014read the blog now at TOPdesk.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Halloween: 5 IT security nightmares to keep you up all night | Better support, happy customers | TOPdesk\" \/>\n<meta property=\"og:description\" content=\"Get spooked by real-life cyber security horror stories this Halloween! Learn how to avoid your own IT security nightmares\u2014read the blog now at TOPdesk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/\" \/>\n<meta property=\"og:site_name\" content=\"T1 TOPdesk - EN\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TOPdesk\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-31T14:46:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-05T16:43:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_nightmares.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"566\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Timon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Timon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/\"},\"author\":{\"name\":\"Timon\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916\"},\"headline\":\"Halloween: 5 IT security nightmares to keep you up all night\",\"datePublished\":\"2019-10-31T14:46:44+00:00\",\"dateModified\":\"2025-08-05T16:43:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/\"},\"wordCount\":760,\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_nightmares.png\",\"articleSection\":[\"ITSM\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/\",\"url\":\"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/\",\"name\":\"IT Security Nightmares: Cyber Security Horror Stories\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_nightmares.png\",\"datePublished\":\"2019-10-31T14:46:44+00:00\",\"dateModified\":\"2025-08-05T16:43:20+00:00\",\"description\":\"Get spooked by real-life cyber security horror stories this Halloween! Learn how to avoid your own IT security nightmares\u2014read the blog now at TOPdesk.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/#primaryimage\",\"url\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_nightmares.png\",\"contentUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_nightmares.png\",\"width\":1200,\"height\":566},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.topdesk.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Halloween: 5 IT security nightmares to keep you up all night\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#website\",\"url\":\"https:\/\/www.topdesk.com\/en\/\",\"name\":\"TOPdesk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.topdesk.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\",\"name\":\"TOPdesk\",\"url\":\"https:\/\/www.topdesk.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg\",\"contentUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg\",\"width\":1,\"height\":1,\"caption\":\"TOPdesk\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TOPdesk\/\",\"https:\/\/www.instagram.com\/topdeskuk\/\",\"https:\/\/www.linkedin.com\/company\/topdesk\/\",\"https:\/\/www.youtube.com\/user\/topdesk\",\"https:\/\/en.wikipedia.org\/wiki\/TOPdesk\",\"https:\/\/www.gartner.com\/reviews\/market\/it-service-management-platforms\/vendor\/topdesk\",\"https:\/\/www.capterra.com\/p\/127562\/TOPdesk\/\",\"https:\/\/www.trustradius.com\/products\/topdesk\/reviews\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916\",\"name\":\"Timon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g\",\"caption\":\"Timon\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IT Security Nightmares: Cyber Security Horror Stories","description":"Get spooked by real-life cyber security horror stories this Halloween! Learn how to avoid your own IT security nightmares\u2014read the blog now at TOPdesk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/","og_locale":"en_US","og_type":"article","og_title":"Halloween: 5 IT security nightmares to keep you up all night | Better support, happy customers | TOPdesk","og_description":"Get spooked by real-life cyber security horror stories this Halloween! Learn how to avoid your own IT security nightmares\u2014read the blog now at TOPdesk.","og_url":"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/","og_site_name":"T1 TOPdesk - EN","article_publisher":"https:\/\/www.facebook.com\/TOPdesk\/","article_published_time":"2019-10-31T14:46:44+00:00","article_modified_time":"2025-08-05T16:43:20+00:00","og_image":[{"width":1200,"height":566,"url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_nightmares.png","type":"image\/png"}],"author":"Timon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Timon","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/#article","isPartOf":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/"},"author":{"name":"Timon","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916"},"headline":"Halloween: 5 IT security nightmares to keep you up all night","datePublished":"2019-10-31T14:46:44+00:00","dateModified":"2025-08-05T16:43:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/"},"wordCount":760,"publisher":{"@id":"https:\/\/www.topdesk.com\/en\/#organization"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_nightmares.png","articleSection":["ITSM","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/","url":"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/","name":"IT Security Nightmares: Cyber Security Horror Stories","isPartOf":{"@id":"https:\/\/www.topdesk.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/#primaryimage"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_nightmares.png","datePublished":"2019-10-31T14:46:44+00:00","dateModified":"2025-08-05T16:43:20+00:00","description":"Get spooked by real-life cyber security horror stories this Halloween! Learn how to avoid your own IT security nightmares\u2014read the blog now at TOPdesk.","breadcrumb":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/#primaryimage","url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_nightmares.png","contentUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Cyber_security_nightmares.png","width":1200,"height":566},{"@type":"BreadcrumbList","@id":"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.topdesk.com\/en\/"},{"@type":"ListItem","position":2,"name":"Halloween: 5 IT security nightmares to keep you up all night"}]},{"@type":"WebSite","@id":"https:\/\/www.topdesk.com\/en\/#website","url":"https:\/\/www.topdesk.com\/en\/","name":"TOPdesk","description":"","publisher":{"@id":"https:\/\/www.topdesk.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.topdesk.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.topdesk.com\/en\/#organization","name":"TOPdesk","url":"https:\/\/www.topdesk.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg","contentUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg","width":1,"height":1,"caption":"TOPdesk"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TOPdesk\/","https:\/\/www.instagram.com\/topdeskuk\/","https:\/\/www.linkedin.com\/company\/topdesk\/","https:\/\/www.youtube.com\/user\/topdesk","https:\/\/en.wikipedia.org\/wiki\/TOPdesk","https:\/\/www.gartner.com\/reviews\/market\/it-service-management-platforms\/vendor\/topdesk","https:\/\/www.capterra.com\/p\/127562\/TOPdesk\/","https:\/\/www.trustradius.com\/products\/topdesk\/reviews"]},{"@type":"Person","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916","name":"Timon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g","caption":"Timon"}}]}},"_links":{"self":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/19549","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/comments?post=19549"}],"version-history":[{"count":11,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/19549\/revisions"}],"predecessor-version":[{"id":47202,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/19549\/revisions\/47202"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/media\/19555"}],"wp:attachment":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/media?parent=19549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}