{"id":53283,"date":"2016-05-05T13:05:47","date_gmt":"2016-05-05T13:05:47","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=53283"},"modified":"2016-05-23T17:41:39","modified_gmt":"2016-05-23T17:41:39","slug":"53283","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/53283\/","title":{"rendered":"The Government Security Revolution Begins Today"},"content":{"rendered":"<p>The current security threats to the government industry seem to be rather obvious and frankly quite scary.\u00a0 <!--more--><\/p>\n<p>The teenage hacker group who refer to themselves as \u201cCrackas With Attitude\u201d have caused serious issues for the FBI, local government agencies, military agencies, intelligence units, and the Secret Service with their multiple hacks of personal data which was then exposed to the world.\u00a0 These hacks not only expose the vulnerabilities of the government\u2019s cyber security, but also have the potential to expose employees who are working undercover, putting lives at risk.\u00a0 Unfortunately, this hacking group is only one of many.<\/p>\n<p>Not a day goes by where we learn that another large company has been compromised, and these are only the reported attacks.\u00a0 It is safe to assume not every breach is publically reported, thus we really have no way to know the true impact of the growing ransomware issues, and security breaches.<\/p>\n<p>What we do know, is it is far too easy to install malicious software and bypass the traditional blacklist architecture employed by the security industry.<\/p>\n<p>So what do you do to protect your data against the very threats your industry faces on a day-to-day basis, if traditional security programs and methods have become obsolete?\u00a0 Two words: <a href=\"http:\/\/www.techsentry.com\">Tech Sentry<\/a>.<\/p>\n<p style=\"text-align: center;\"><em>\u201cThe world needs better security\u2026and we got it.\u201d<\/em><\/p>\n<p>We are in the midst of a digital revolution, but the continued threat of cyber security has stalled the transformation.\u00a0 There are two key problems in cyber security.\u00a0 The first being unwanted, malicious and unauthorized software running on endpoints, and the second is unauthorized access to web properties and VPNs.\u00a0 <a href=\"http:\/\/www.techsentry.com\">Tech Sentry<\/a> addresses both of these key issues.<\/p>\n<p>Tech Sentry was launched in the channel on March 16, 2016.\u00a0 It was developed by the American software company, PC Pitstop LLC., which was founded in 1999.\u00a0 PC Pitstop quickly became the world&#8217;s most popular website to diagnose common computer problems.\u00a0 It has since evolved as a company, and is now the maker of the best end-point security solution and only three-factor authentication program on the market, Tech Sentry.<\/p>\n<p><a href=\"https:\/\/www.techsentry.com\/TechSentryBiz\/prod-endpoint.asp\">Tech Sentry Endpoint Suite<\/a> provides superior end-point security by using proprietary, real-time whitelisting technology and driver and patch management.\u00a0 The whitelisting approach is essentially the opposite of blacklisting.\u00a0 Instead of trying to accumulate a list of all known, malicious files and programs and keep that list up-to-date, the whitelist is an approach that gathers all the known, safe programs and only allows those to run.\u00a0 By implementing such approach, we believe we have solved the first of two key problems in cyber security; unwanted, malicious and unauthorized software running on endpoints as the whitelist provides advanced protection against APTs, polymorphic viruses, ransomware and zero-day attacks.\u00a0 Tech Sentry patch and driver management automatically keeps servers, workstations and remote computers secure with the latest security patches and software updates; making it the fastest and simplest way to ensure your endpoints start and stay fast.<\/p>\n<p>The second problem in cyber security is unauthorized access to web properties and VPNs.\u00a0 We have also solved this with our <a href=\"https:\/\/www.techsentry.com\/TechSentryBiz\/prod-authentication.asp\">Tech Sentry Authentication<\/a>.\u00a0 Tech Sentry Authentication is the industry&#8217;s first three-factor authentication with a unique feature which will enable IT Administrators to counter-attack the hackers, rendering the hacker\u2019s computer inoperable until the user is identified.\u00a0 There are currently two-tiered authentication options available from our competitors; however, none of which employ the strike-back technology that Tech Sentry Authentication uses.<\/p>\n<p style=\"text-align: center;\"><em>\u201c<\/em><em>We are in the midst of a digital revolution, but the continued threat of cyber security has stalled the transformation.\u201d<\/em><\/p>\n<p>It is painfully clear, the world needs better security\u2026and we got it.<\/p>\n<p>Smaller government agencies have already found the benefits of our whitelisting technology.\u00a0 Tech Sentry is in front of the adoption curve, starting the security revolution, and we hope you will join us soon<strong>.\u00a0 \u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The current security threats to the government industry seem to be rather obvious and frankly quite scary.\u00a0<\/p>\n","protected":false},"author":54,"featured_media":53285,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4953,4959],"tags":[4954,4955],"class_list":["post-53283","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-sentry-blog","category-whitelisting","tag-security-revolution","tag-tech-sentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Government Security Revolution Begins Today<\/title>\n<meta name=\"description\" content=\"The current government security threats seem to be rather obvious and frankly quite scary.\u00a0 So what can you do to stop them?\u00a0 Join the revolution now...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/53283\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Government Security Revolution Begins Today\" \/>\n<meta property=\"og:description\" content=\"The current government security threats seem to be rather obvious and frankly quite scary.\u00a0 So what can you do to stop them?\u00a0 Join the revolution now...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/53283\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-05T13:05:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-05-23T17:41:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/NSA-200x200.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53283\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53283\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"The Government Security Revolution Begins Today\",\"datePublished\":\"2016-05-05T13:05:47+00:00\",\"dateModified\":\"2016-05-23T17:41:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53283\\\/\"},\"wordCount\":638,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53283\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/NSA-200x200.jpg\",\"keywords\":[\"security revolution\",\"tech sentry\"],\"articleSection\":[\"Tech Sentry Blog\",\"Whitelisting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53283\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53283\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53283\\\/\",\"name\":\"The Government Security Revolution Begins Today\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53283\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53283\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/NSA-200x200.jpg\",\"datePublished\":\"2016-05-05T13:05:47+00:00\",\"dateModified\":\"2016-05-23T17:41:39+00:00\",\"description\":\"The current government security threats seem to be rather obvious and frankly quite scary.\u00a0 So what can you do to stop them?\u00a0 Join the revolution now...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53283\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53283\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53283\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/NSA-200x200.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/NSA-200x200.jpg\",\"width\":200,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53283\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Government Security Revolution Begins Today\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Government Security Revolution Begins Today","description":"The current government security threats seem to be rather obvious and frankly quite scary.\u00a0 So what can you do to stop them?\u00a0 Join the revolution now...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/53283\/","og_locale":"en_US","og_type":"article","og_title":"The Government Security Revolution Begins Today","og_description":"The current government security threats seem to be rather obvious and frankly quite scary.\u00a0 So what can you do to stop them?\u00a0 Join the revolution now...","og_url":"https:\/\/www.pcmatic.com\/blog\/53283\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-05-05T13:05:47+00:00","article_modified_time":"2016-05-23T17:41:39+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/NSA-200x200.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/53283\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/53283\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"The Government Security Revolution Begins Today","datePublished":"2016-05-05T13:05:47+00:00","dateModified":"2016-05-23T17:41:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/53283\/"},"wordCount":638,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/53283\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/NSA-200x200.jpg","keywords":["security revolution","tech sentry"],"articleSection":["Tech Sentry Blog","Whitelisting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/53283\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/53283\/","url":"https:\/\/www.pcmatic.com\/blog\/53283\/","name":"The Government Security Revolution Begins Today","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/53283\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/53283\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/NSA-200x200.jpg","datePublished":"2016-05-05T13:05:47+00:00","dateModified":"2016-05-23T17:41:39+00:00","description":"The current government security threats seem to be rather obvious and frankly quite scary.\u00a0 So what can you do to stop them?\u00a0 Join the revolution now...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/53283\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/53283\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/53283\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/NSA-200x200.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/NSA-200x200.jpg","width":200,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/53283\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Government Security Revolution Begins Today"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=53283"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53283\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/53285"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=53283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=53283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=53283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}