{"id":42964,"date":"2013-04-16T01:57:21","date_gmt":"2013-04-16T01:57:21","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=42964"},"modified":"2013-04-16T01:57:21","modified_gmt":"2013-04-16T01:57:21","slug":"how-you-can-spot-bad-information-security","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/","title":{"rendered":"How You Can Spot Bad Information Security"},"content":{"rendered":"<p><\/br><\/p>\n<p>by Mitz Pantic from Tips4pc.com<\/p>\n<h3>How You Can Spot Bad Information Security<\/h3>\n<p>Few people understand how information security really works. The television shows and movies depict it as a sort of modern wizardry where hackers fight geeks using technobable spells. In reality, information security focuses on building powerful defenses which no hacker can get through, so the infosec expert can go home and sleep at night knowing the hacker has been thwarted.<\/p>\n<p>It\u2019s those defenses which this very minute protect your valuable information on the Internet. Let\u2019s see what makes them so effective:<\/p>\n<p><strong>The Main Information Security Model<\/strong><\/p>\n<p>When a company or government stores your personal information, they use a three tier model to help keep your information secure:<\/p>\n<p><strong>1. Encryption:<\/strong> your data is saved in a format which is useless to the hacker without a password or other key.<\/p>\n<p><strong>2. Access Control:<\/strong> access to your data is restricted to only the people and programs which need it. This is also called ACL for Access Control List.<\/p>\n<p><strong>3. Logs: <\/strong>whenever someone or something accesses your data, a record is made. This ensures that the access control works and that no program or person is abusing their authority to access your data.<\/p>\n<p>Implementing these three techniques may sound simple, but it\u2019s quite difficult in practice. For example, it\u2019s easy to encrypt data so hackers can\u2019t use it if they get their hands on it. The problem is that any company which loses the password or key to that data can lose all of their customer data in seconds. It\u2019s like keeping your money in a Swiss bank account\u2014it\u2019s safe and anonymous, but if you forget your secret account number all of that money is useless to you.<\/p>\n<p>Access control and logging also have their own problems. Programs require extra complication in order to handle access control correctly, and it costs companies money to write that extra complication. Logs on the other hand must be read periodically by a human being, and that also costs the company hours which could be spent doing something productive.<\/p>\n<p>This extra cost of information security is part of the reason you so often read about companies getting hacked. It\u2019s not that the information security model is bad or that the hackers are that skilled, but that the company didn\u2019t put the effort into security in the first place.<\/p>\n<p><strong>How You Can Spot Bad Information Security<\/strong><\/p>\n<p>Are you reluctant to give a particular company your credit card number or other information? Here\u2019s a quick tip which can help you determine whether the company uses one of the most basic information security techniques. If they don\u2019t use this technique, I recommend that you don\u2019t trust them with anything important.<\/p>\n<p>First, create an account. Enter your password and do whatever it takes to confirm the account without giving them your personal information. Then log out and activate the password reset.<\/p>\n<p>If they send you your old password by email, they\u2019re information security idiots. Don\u2019t use them. If they send you a random new password or send you a link to click on to reset your password, then they know at least this very basic information security technique.<\/p>\n<h3><a href=\"http:\/\/tips4pc.com\/computer_security\/secrets-of-information-security-revealed.htm\" target=\"_blank\">Article Continued Here<\/a><\/h3>\n<p><em>This excerpt appears with permission from Tips4PC.com<\/em>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/infosec.jpg\" alt=\"infosec\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-42971\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/infosec.jpg 150w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/infosec-120x120.jpg 120w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p>Few people understand how information security really works. The television shows and movies depict it as a sort of modern wizardry where hackers fight geeks using technobable spells. In reality, information security focuses on building powerful defenses which no hacker can get through, so the infosec expert can go home and sleep at night knowing the hacker has been thwarted.<\/p>\n","protected":false},"author":33,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[834],"tags":[4453],"class_list":["post-42964","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips4pc","tag-information-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How You Can Spot Bad Information Security<\/title>\n<meta name=\"description\" content=\"Few people understand how information security really works. The television shows and movies depict it as a sort of modern wizardry where hackers fight geeks using technobable spells. In reality, information security focuses on building powerful defenses which no hacker can get through, so the infosec expert can go home and sleep at night knowing the hacker has been thwarted.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How You Can Spot Bad Information Security\" \/>\n<meta property=\"og:description\" content=\"Few people understand how information security really works. The television shows and movies depict it as a sort of modern wizardry where hackers fight geeks using technobable spells. In reality, information security focuses on building powerful defenses which no hacker can get through, so the infosec expert can go home and sleep at night knowing the hacker has been thwarted.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-16T01:57:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Tips4 PC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tips4 PC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-you-can-spot-bad-information-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-you-can-spot-bad-information-security\\\/\"},\"author\":{\"name\":\"Tips4 PC\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/181845ffbd3d2cd01345e2d6cfd75ca0\"},\"headline\":\"How You Can Spot Bad Information Security\",\"datePublished\":\"2013-04-16T01:57:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-you-can-spot-bad-information-security\\\/\"},\"wordCount\":561,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-you-can-spot-bad-information-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"information security\"],\"articleSection\":[\"Tips4PC\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-you-can-spot-bad-information-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-you-can-spot-bad-information-security\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-you-can-spot-bad-information-security\\\/\",\"name\":\"How You Can Spot Bad Information Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-you-can-spot-bad-information-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-you-can-spot-bad-information-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2013-04-16T01:57:21+00:00\",\"description\":\"Few people understand how information security really works. The television shows and movies depict it as a sort of modern wizardry where hackers fight geeks using technobable spells. In reality, information security focuses on building powerful defenses which no hacker can get through, so the infosec expert can go home and sleep at night knowing the hacker has been thwarted.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-you-can-spot-bad-information-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-you-can-spot-bad-information-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-you-can-spot-bad-information-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/how-you-can-spot-bad-information-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How You Can Spot Bad Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/181845ffbd3d2cd01345e2d6cfd75ca0\",\"name\":\"Tips4 PC\",\"description\":\"Tips4PC.com provides free computer tips and advice for anyone who wants to learn something new. All the information is written in an easy to understand way.\",\"sameAs\":[\"http:\\\/\\\/tips4pc.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/tips4pc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How You Can Spot Bad Information Security","description":"Few people understand how information security really works. The television shows and movies depict it as a sort of modern wizardry where hackers fight geeks using technobable spells. In reality, information security focuses on building powerful defenses which no hacker can get through, so the infosec expert can go home and sleep at night knowing the hacker has been thwarted.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/","og_locale":"en_US","og_type":"article","og_title":"How You Can Spot Bad Information Security","og_description":"Few people understand how information security really works. The television shows and movies depict it as a sort of modern wizardry where hackers fight geeks using technobable spells. In reality, information security focuses on building powerful defenses which no hacker can get through, so the infosec expert can go home and sleep at night knowing the hacker has been thwarted.","og_url":"https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2013-04-16T01:57:21+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Tips4 PC","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Tips4 PC","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/"},"author":{"name":"Tips4 PC","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/181845ffbd3d2cd01345e2d6cfd75ca0"},"headline":"How You Can Spot Bad Information Security","datePublished":"2013-04-16T01:57:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/"},"wordCount":561,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["information security"],"articleSection":["Tips4PC"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/","url":"https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/","name":"How You Can Spot Bad Information Security","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2013-04-16T01:57:21+00:00","description":"Few people understand how information security really works. The television shows and movies depict it as a sort of modern wizardry where hackers fight geeks using technobable spells. In reality, information security focuses on building powerful defenses which no hacker can get through, so the infosec expert can go home and sleep at night knowing the hacker has been thwarted.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/how-you-can-spot-bad-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How You Can Spot Bad Information Security"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/181845ffbd3d2cd01345e2d6cfd75ca0","name":"Tips4 PC","description":"Tips4PC.com provides free computer tips and advice for anyone who wants to learn something new. All the information is written in an easy to understand way.","sameAs":["http:\/\/tips4pc.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/tips4pc\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/42964","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=42964"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/42964\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=42964"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=42964"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=42964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}