{"id":53132,"date":"2016-04-26T18:45:53","date_gmt":"2016-04-26T18:45:53","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=53132"},"modified":"2016-05-23T16:48:48","modified_gmt":"2016-05-23T16:48:48","slug":"4-key-steps-to-prevent-ransomware","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/","title":{"rendered":"4 Key Steps to Prevent Ransomware"},"content":{"rendered":"<p>Falling victim to ransomware is disheartening and financially costly.\u00a0 Find out how to avoid it now&#8230;<!--more--><\/p>\n<p>Here are four key steps you can take to prevent yourself from becoming the next victim of ransomware.<\/p>\n<ol>\n<li><strong>Education<\/strong> &#8211; Whether you use a PC at home or at work, you should be educated on cyber security.\u00a0 I encourage you to use the <a href=\"https:\/\/www.knowbe4.com\/pricing-kevin-mitnick-security-awareness-training\">KnowBe4 <\/a>Cyber Security Training.\u00a0 There are options for both personal PC users, and corporate offices.\u00a0 Also, for anyone who has a PC Matic subscription, this training is <a href=\"https:\/\/www.pcmatic.com\/blog\/2016\/02\/12\/free-cyber-security-training-for-pc-matic-users\/\">FREE<\/a>.\u00a0 Use it and familiarize yourself with best practices, how to identify fake links, and social engineering attacks.<\/li>\n<li><strong>Back up your data<\/strong> &#8211; If ransomware attacks, it will encrypt your most important data including files, videos and photos.\u00a0 In order to limit the impact, it is best practice to back up all of your data.\u00a0 Lately, ransomware has also been attacking back up data.\u00a0 That being said, it could be in your best interest to back up your data on an external drive that can be disconnected from your PC limiting the accessibility of your back up data to the hackers.\u00a0 If you don&#8217;t have an external drive option, you could also use cloud-based services such as DropBox or Google Drive.<\/li>\n<li><strong>Use a security software that implements a white listing technology<\/strong> &#8211; Traditional security software uses a black list approach.\u00a0 Some of you may be familiar with what that means, but for those who don&#8217;t I will explain.\u00a0 The black list is\u00a0the list almost all anti-virus program use to monitor malware.\u00a0 It is a list of all the known malware, and blocks any malware attacks by identifying if a bad file is trying to execute on your PC.\u00a0 Unfortunately, this approach means there will always be a victim.\u00a0 There will always be one person, or one company that is attacked by the newest malware.\u00a0 Once the attack happens, then the malware is identified as bad and is added to the black list.\u00a0 This will prevent others from becoming infected, but what about that first victim?\u00a0 Using a white listing approach takes that away.\u00a0 Instead of trying to keep a list of all the bad files, which evolves every day, a white list is a list of all the tested safe programs.\u00a0 This methodology only allows safe programs to execute, meaning no victims!\u00a0 Not only does this approach logically make more sense, as it eliminates the &#8220;victim&#8221; factor, but is safer as it blocks ransomware, polymorphic viruses, advanced persistent threats (APTs) and zero-day attacks.\u00a0 There are currently two options for whitelisting security software.\u00a0 <a href=\"http:\/\/www.pcmatic.com\" target=\"_blank\">PC Matic<\/a> is for home users, and <a href=\"http:\/\/www.techsentry.com\" target=\"_blank\">Tech Sentry<\/a> for business use.\u00a0 Both of which use a proprietary white listing approach.<\/li>\n<li><strong>Application and OS security<\/strong> &#8211; Ensuring all vulnerabilities are addressed, both within your PC&#8217;s applications as well as operating system is critical.\u00a0 Many times we see the alerts that certain programs need to be updated, or we need a system update, but we too often put it off.\u00a0 These updates help to patch any security holes that were found in the previous edition.\u00a0 If we continue to delay them, we are leaving ourselves open to potential attacks.\u00a0 To avoid this, be sure to update all software applications as soon as the updates become available.\u00a0 You can do this manually, or for home users <a href=\"http:\/\/www.pcmatic.com\" target=\"_blank\">PC Matic <\/a>will do it for you.\u00a0 For business users, <a href=\"https:\/\/www.techsentry.com\/TechSentryBiz\/prod-endpoint.asp\" target=\"_blank\">Tech Sentry Endpoint Suite<\/a> includes\u00a0a patch management\u00a0feature.<\/li>\n<\/ol>\n<p>If you don&#8217;t follow these steps, or perhaps have already found yourself a victim of ransomware, be sure to contact the FBI and your\u00a0anti-virus software provider\u00a0to report the infection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Falling victim to ransomware is disheartening and financially costly.\u00a0 Find out how to avoid it now&#8230;<\/p>\n","protected":false},"author":54,"featured_media":52244,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4522,4959],"tags":[4942],"class_list":["post-53132","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pc-safety-2","category-whitelisting","tag-prevent-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>4 Key Steps to Prevent Ransomware<\/title>\n<meta name=\"description\" content=\"Becoming a victim to ransomware is disheartening and costly.\u00a0 Follow these four steps to prevent ransomware on your PC...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 Key Steps to Prevent Ransomware\" \/>\n<meta property=\"og:description\" content=\"Becoming a victim to ransomware is disheartening and costly.\u00a0 Follow these four steps to prevent ransomware on your PC...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-26T18:45:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-05-23T16:48:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/4-key-steps-to-prevent-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/4-key-steps-to-prevent-ransomware\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"4 Key Steps to Prevent Ransomware\",\"datePublished\":\"2016-04-26T18:45:53+00:00\",\"dateModified\":\"2016-05-23T16:48:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/4-key-steps-to-prevent-ransomware\\\/\"},\"wordCount\":612,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/4-key-steps-to-prevent-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/data-breach-blog-img1.jpg\",\"keywords\":[\"prevent ransomware\"],\"articleSection\":[\"PC Safety\",\"Whitelisting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/4-key-steps-to-prevent-ransomware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/4-key-steps-to-prevent-ransomware\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/4-key-steps-to-prevent-ransomware\\\/\",\"name\":\"4 Key Steps to Prevent Ransomware\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/4-key-steps-to-prevent-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/4-key-steps-to-prevent-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/data-breach-blog-img1.jpg\",\"datePublished\":\"2016-04-26T18:45:53+00:00\",\"dateModified\":\"2016-05-23T16:48:48+00:00\",\"description\":\"Becoming a victim to ransomware is disheartening and costly.\u00a0 Follow these four steps to prevent ransomware on your PC...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/4-key-steps-to-prevent-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/4-key-steps-to-prevent-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/4-key-steps-to-prevent-ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/data-breach-blog-img1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/data-breach-blog-img1.jpg\",\"width\":200,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/4-key-steps-to-prevent-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 Key Steps to Prevent Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"4 Key Steps to Prevent Ransomware","description":"Becoming a victim to ransomware is disheartening and costly.\u00a0 Follow these four steps to prevent ransomware on your PC...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"4 Key Steps to Prevent Ransomware","og_description":"Becoming a victim to ransomware is disheartening and costly.\u00a0 Follow these four steps to prevent ransomware on your PC...","og_url":"https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-04-26T18:45:53+00:00","article_modified_time":"2016-05-23T16:48:48+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"4 Key Steps to Prevent Ransomware","datePublished":"2016-04-26T18:45:53+00:00","dateModified":"2016-05-23T16:48:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/"},"wordCount":612,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg","keywords":["prevent ransomware"],"articleSection":["PC Safety","Whitelisting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/","url":"https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/","name":"4 Key Steps to Prevent Ransomware","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg","datePublished":"2016-04-26T18:45:53+00:00","dateModified":"2016-05-23T16:48:48+00:00","description":"Becoming a victim to ransomware is disheartening and costly.\u00a0 Follow these four steps to prevent ransomware on your PC...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg","width":200,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/4-key-steps-to-prevent-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"4 Key Steps to Prevent Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=53132"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53132\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/52244"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=53132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=53132"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=53132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}