{"id":52011,"date":"2015-10-27T17:40:29","date_gmt":"2015-10-27T17:40:29","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=52011"},"modified":"2015-10-27T17:40:29","modified_gmt":"2015-10-27T17:40:29","slug":"7-cyber-security-layers","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/","title":{"rendered":"7 Cyber-Security Layers"},"content":{"rendered":"<p><\/br><\/p>\n<h4>7 Cyber-Security Layers<\/h4>\n<p>PC Pitstop VP of Business Development, Mike Schroll was quoted extensively in <a href=\"http:\/\/www.entrepreneur.com\/article\/252028\" target=\"_blank\">this great article<\/a> by Peter Gasca for Entrepreneur.com.<\/p>\n<blockquote><p><a href=\"http:\/\/www.entrepreneur.com\/article\/252028\" target=\"_blank\">7 Cybersecurity Layers Every Entrepreneur Needs to Understand<\/a><\/p>\n<p>Mike Schroll, the VP of business development for PC Pitstop, a creator of security and performance software, is a former hacker and made his living professionally hacking into and identifying vulnerable areas in the cyber infrastructure of large organizations.<\/p>\n<p>Related: Don&#8217;t Wait for a Disaster to Interrupt Business. Prepare Now.<\/p>\n<p>Schroll points out that several layers of cyber security exist, like an onion &#8212; both of which, if hacked, will cause many tears &#8212; and entrepreneurs and business managers need to be aware of all the layers to best protect a company\u2019s cyber infrastructure from threats.<\/p>\n<p><strong>1. Social engineering<\/strong><br \/>\nThe first layer is protecting your company from attacks from afar. Hackers have been known to find general information about an individual online &#8212; we do, after all, share everything about ourselves on social media &#8212; and use this information to manipulate employees of companies, such as banks, to disclose personal and sensitive information. While these disclosures are a failure on the part of the employee, more often it is a systematic failure of the organization to train and emphasize security protocols.<\/p>\n<p>Schroll suggest that you make certain you have stated security processes that are reviewed with your employees and tested often. Have a process to verify callers and never disclose passwords or other sensitive customer information.<\/p>\n<p><strong>2. Physical security<\/strong><br \/>\nWhile you may believe your building and technology &#8212; and hence your sensitive information &#8212; is safe and secure physically, good hackers know &#8220;tricks&#8221; that will allow them to penetrate even this layer of security. Additionally, many business owners pay little attention to other physical aspects of their companies&#8217; operations that pose a threat, such as leaving computers exposed or failing to destroy old hard drives.<\/p>\n<p>As with other employees, these physical security breaches are not always an issue with the security personnel but rather the organization\u2019s general security protocols. Schroll recommends that you encrypt your drives, leverage cloud backups, enclose any hardware ports exposed to the public, have old hardware disposed by professionals and use theft recovery software, such as Prey Project, on business devices.<\/p>\n<p><strong>3. Wireless security<\/strong><br \/>\nYour wireless Internet also poses a threat to your company. We often forget that Wi-Fi signals can extend much farther than the walls of our offices, and a hacker with a good antenna can connect to your signal from far away. Once in your network, file shares without protection or computer accounts that have simple passwords become an easy channel for getting to other sensitive information.<\/p>\n<p>Schroll says companies should be using WPA2 protocols, not the antiquated WEP or WPA. Additionally, your router password needs to be as strong as all other passwords. Never use a default password and make certain it is nothing that can be easily guessed (your company address, for instance).<\/p>\n<p><strong>4. Passwords<\/strong><br \/>\nAccording to Schroll, passwords are like underpants &#8212; they need to be changed often, kept private and never shared with anyone. The best passwords are long, use a combination of uppercase and lowercase letters, numbers and symbols, and are different across accounts.<\/p>\n<p>Schroll suggests using phrases, which are easier to remember. For example, consider this famous phrase from the movie, Forrest Gump, \u201cLife\u2019s a box of chocolates, Forrest. You never know what you\u2019re gonna get,\u201d which would translate to a very effective password \u201cL\u2019aboc,F.Ynkwy\u2019gg.\u201d<\/p>\n<p>While keeping track of all of these passwords may be overwhelming, consider a service, such as 1Password or LastPass to maintain and keep your passwords secure.<\/p>\n<p><a href=\"http:\/\/www.entrepreneur.com\/article\/252028\" target=\"_blank\">Read more here<\/a>\n<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>PC Pitstop VP of Business Development, Mike Schroll was quoted extensively in <a href=\"http:\/\/www.entrepreneur.com\/article\/252028\" target=\"_blank\">this great article<\/a> by Peter Gasca for Entrepreneur.com.<\/p>\n","protected":false},"author":12,"featured_media":52016,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[109,183],"tags":[4845],"class_list":["post-52011","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pc-matic-blog","category-tips","tag-security-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>7 Cyber-Security Layers<\/title>\n<meta name=\"description\" content=\"7 Cyber-Security Layers - PC Pitstop VP of Business Development, Mike Schroll was quoted extensively in this great article by Peter Gasca for Entrepreneur.com.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Cyber-Security Layers\" \/>\n<meta property=\"og:description\" content=\"7 Cyber-Security Layers - PC Pitstop VP of Business Development, Mike Schroll was quoted extensively in this great article by Peter Gasca for Entrepreneur.com.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-27T17:40:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/layer200.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"PC Matic Cybersecurity\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PC Matic Cybersecurity\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-cyber-security-layers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-cyber-security-layers\\\/\"},\"author\":{\"name\":\"PC Matic Cybersecurity\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3dbbae19394008342629ce8d970445f\"},\"headline\":\"7 Cyber-Security Layers\",\"datePublished\":\"2015-10-27T17:40:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-cyber-security-layers\\\/\"},\"wordCount\":614,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-cyber-security-layers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/layer200.jpg\",\"keywords\":[\"security tips\"],\"articleSection\":[\"PC Matic Blog\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-cyber-security-layers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-cyber-security-layers\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-cyber-security-layers\\\/\",\"name\":\"7 Cyber-Security Layers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-cyber-security-layers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-cyber-security-layers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/layer200.jpg\",\"datePublished\":\"2015-10-27T17:40:29+00:00\",\"description\":\"7 Cyber-Security Layers - PC Pitstop VP of Business Development, Mike Schroll was quoted extensively in this great article by Peter Gasca for Entrepreneur.com.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-cyber-security-layers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-cyber-security-layers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-cyber-security-layers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/layer200.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/layer200.jpg\",\"width\":200,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/7-cyber-security-layers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 Cyber-Security Layers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3dbbae19394008342629ce8d970445f\",\"name\":\"PC Matic Cybersecurity\",\"description\":\"PC Matic Cyber Security is America's Top Antivirus Software and our team is committed to providing you with the information you need to keep your computer, mobile device and network safe and running like new.\",\"sameAs\":[\"https:\\\/\\\/techtalk.pcpitstop.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/pcpitstop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 Cyber-Security Layers","description":"7 Cyber-Security Layers - PC Pitstop VP of Business Development, Mike Schroll was quoted extensively in this great article by Peter Gasca for Entrepreneur.com.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/","og_locale":"en_US","og_type":"article","og_title":"7 Cyber-Security Layers","og_description":"7 Cyber-Security Layers - PC Pitstop VP of Business Development, Mike Schroll was quoted extensively in this great article by Peter Gasca for Entrepreneur.com.","og_url":"https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2015-10-27T17:40:29+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/layer200.jpg","type":"image\/jpeg"}],"author":"PC Matic Cybersecurity","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"PC Matic Cybersecurity","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/"},"author":{"name":"PC Matic Cybersecurity","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f3dbbae19394008342629ce8d970445f"},"headline":"7 Cyber-Security Layers","datePublished":"2015-10-27T17:40:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/"},"wordCount":614,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/layer200.jpg","keywords":["security tips"],"articleSection":["PC Matic Blog","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/","url":"https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/","name":"7 Cyber-Security Layers","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/layer200.jpg","datePublished":"2015-10-27T17:40:29+00:00","description":"7 Cyber-Security Layers - PC Pitstop VP of Business Development, Mike Schroll was quoted extensively in this great article by Peter Gasca for Entrepreneur.com.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/layer200.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/layer200.jpg","width":200,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/7-cyber-security-layers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"7 Cyber-Security Layers"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f3dbbae19394008342629ce8d970445f","name":"PC Matic Cybersecurity","description":"PC Matic Cyber Security is America's Top Antivirus Software and our team is committed to providing you with the information you need to keep your computer, mobile device and network safe and running like new.","sameAs":["https:\/\/techtalk.pcpitstop.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/pcpitstop\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/52011","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=52011"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/52011\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/52016"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=52011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=52011"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=52011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}