{"id":53429,"date":"2016-05-26T15:37:17","date_gmt":"2016-05-26T15:37:17","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=53429"},"modified":"2016-08-02T17:54:22","modified_gmt":"2016-08-02T17:54:22","slug":"whitelisting-technology-the-solution-to-malware-nightmares","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/","title":{"rendered":"Whitelisting Technology: The Solution to Malware Nightmares"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>As we&#8217;ve shared in our populating &#8220;<a href=\"https:\/\/www.pcmatic.com\/blog\/2016\/04\/06\/53032-ransomware-attacks-of-2016\/\" target=\"_blank\">Ransomware Attacks of 2016<\/a>&#8221; blog, we&#8217;ve learned this year has caused a major concern among businesses and public sector organizations regarding malware attacks. <!--more--><\/p>\n<p>Ransomware has progressed to different forms and trends and has caused financial stress for numerous businesses.\u00a0 Our solution to ridding systems sensitivities to these threats is by implementation of our <a href=\"https:\/\/www.techsentry.com\/research.asp\" target=\"_blank\">whitelist technology<\/a>. By bolstering our security experts\u2019 process of reviewing additional factors of potential malware, we\u2019ve added to the value we provide our customers and businesses by shifting the burden of security to <a href=\"http:\/\/pcmatic.com\" target=\"_blank\">PC Matic <\/a>Home and <a href=\"https:\/\/www.pcmatic.com\/pro\" target=\"_blank\">PC Matic Pro.<\/a><\/p>\n<p>There are numerous benefits to implementing whitelist technology. The most important benefit of whitelisting is the extra protection and security given to our customers. Ransomware is certainly a game-changer; although continuous decryptors are created in lieu of substandard protection, cyber criminals are creating new ways to bypass decryptors with advanced ransomware threats. PC Matic and PC Matic Pro&#8217;s security approach, now armed with our whitelist technology, blocks out threats like ransomware and CryptoLocker and prevents cyber thieves from holding your files for ransom.<\/p>\n<p>&nbsp;<\/p>\n<h2>Whitelisting: The only approach that stops Ransomware in its tracks.<\/h2>\n<p>&nbsp;<\/p>\n<p>An advantage of including whitelisting technology into your system&#8217;s protection is to put your mind at ease. Rather than waiting for the ransomware attack to happen and responding to the threat, protect your business and personal systems in real-time with the whitelisting approach.<\/p>\n<p>Instead of using the archaic blacklist approach like our competitors, PC Matic and PC Matic Pro use a proprietary whitelisting technology for real-time protection against ransomware, advanced persistent threats (APTs), polymorphic viruses and zero-day attacks.<\/p>\n<p>In a recent survey by <a href=\"http:\/\/resources.idgenterprise.com\/original\/AST-0166392_PC_Pitstop_Whitelisting_v3_copyFINAL4.28.16.pdf\" target=\"_blank\">IDG, 95% of IT security leaders<\/a> would consider implementing whitelist security solutions. With that, 91% of IT pros would still consider whitelisting even if it means an occasional false positive application. IT security leaders know in a world of everyday cyber threats, it&#8217;s better to be safe than sorry when it comes to protecting sensitive information and systems.<\/p>\n<p>&nbsp;<\/p>\n<blockquote><p>USA today mentioned, &#8220;Utilize application &#8216;whitelisting&#8217;, which allows only specific programs to run on your computer. This will prevent malicious programs from running on your computer.&#8221;<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<p>PC Matic and PC Matic Pro products provide superior security protection over all security products, free or otherwise, on the market. In addition, PC Matic and PC Matic Pro keep your computers running at peak performance even after years of use.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; As we&#8217;ve shared in our populating &#8220;Ransomware Attacks of 2016&#8221; blog, we&#8217;ve learned this year has caused a major concern among businesses and public sector organizations regarding malware attacks.<\/p>\n","protected":false},"author":64,"featured_media":53439,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4368,4993,2985,4987,779,12,4959],"tags":[4672,4363,4354],"class_list":["post-53429","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-in-the-news","category-pc-matic-pro-channel","category-press","category-spiceworks","category-surveys","category-the-pit-blog","category-whitelisting","tag-cybersecurity","tag-ransomware","tag-whitelisting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Whitelisting Technology: The Solution to Malware Nightmares<\/title>\n<meta name=\"description\" content=\"Our solution to ridding systems sensitivities to these threats is by implementation of our whitelisting technology.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Whitelisting Technology: The Solution to Malware Nightmares\" \/>\n<meta property=\"og:description\" content=\"Our solution to ridding systems sensitivities to these threats is by implementation of our whitelisting technology.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-26T15:37:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-08-02T17:54:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Erin Allen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erin Allen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-technology-the-solution-to-malware-nightmares\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-technology-the-solution-to-malware-nightmares\\\/\"},\"author\":{\"name\":\"Erin Allen\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/5d73cabd52f5f0115725a4514f07eeca\"},\"headline\":\"Whitelisting Technology: The Solution to Malware Nightmares\",\"datePublished\":\"2016-05-26T15:37:17+00:00\",\"dateModified\":\"2016-08-02T17:54:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-technology-the-solution-to-malware-nightmares\\\/\"},\"wordCount\":417,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-technology-the-solution-to-malware-nightmares\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/security.png\",\"keywords\":[\"cybersecurity\",\"ransomware\",\"whitelisting\"],\"articleSection\":[\"In the News\",\"PC Matic Pro - Channel\",\"Press\",\"SpiceWorks\",\"Surveys\",\"The Pit Blog\",\"Whitelisting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-technology-the-solution-to-malware-nightmares\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-technology-the-solution-to-malware-nightmares\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-technology-the-solution-to-malware-nightmares\\\/\",\"name\":\"Whitelisting Technology: The Solution to Malware Nightmares\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-technology-the-solution-to-malware-nightmares\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-technology-the-solution-to-malware-nightmares\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/security.png\",\"datePublished\":\"2016-05-26T15:37:17+00:00\",\"dateModified\":\"2016-08-02T17:54:22+00:00\",\"description\":\"Our solution to ridding systems sensitivities to these threats is by implementation of our whitelisting technology.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-technology-the-solution-to-malware-nightmares\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-technology-the-solution-to-malware-nightmares\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-technology-the-solution-to-malware-nightmares\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/security.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/security.png\",\"width\":1000,\"height\":750},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-technology-the-solution-to-malware-nightmares\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whitelisting Technology: The Solution to Malware Nightmares\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/5d73cabd52f5f0115725a4514f07eeca\",\"name\":\"Erin Allen\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/erin-allen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whitelisting Technology: The Solution to Malware Nightmares","description":"Our solution to ridding systems sensitivities to these threats is by implementation of our whitelisting technology.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/","og_locale":"en_US","og_type":"article","og_title":"Whitelisting Technology: The Solution to Malware Nightmares","og_description":"Our solution to ridding systems sensitivities to these threats is by implementation of our whitelisting technology.","og_url":"https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-05-26T15:37:17+00:00","article_modified_time":"2016-08-02T17:54:22+00:00","og_image":[{"width":1000,"height":750,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/security.png","type":"image\/png"}],"author":"Erin Allen","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Erin Allen","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/"},"author":{"name":"Erin Allen","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/5d73cabd52f5f0115725a4514f07eeca"},"headline":"Whitelisting Technology: The Solution to Malware Nightmares","datePublished":"2016-05-26T15:37:17+00:00","dateModified":"2016-08-02T17:54:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/"},"wordCount":417,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/security.png","keywords":["cybersecurity","ransomware","whitelisting"],"articleSection":["In the News","PC Matic Pro - Channel","Press","SpiceWorks","Surveys","The Pit Blog","Whitelisting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/","url":"https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/","name":"Whitelisting Technology: The Solution to Malware Nightmares","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/security.png","datePublished":"2016-05-26T15:37:17+00:00","dateModified":"2016-08-02T17:54:22+00:00","description":"Our solution to ridding systems sensitivities to these threats is by implementation of our whitelisting technology.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/security.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/security.png","width":1000,"height":750},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-technology-the-solution-to-malware-nightmares\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Whitelisting Technology: The Solution to Malware Nightmares"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/5d73cabd52f5f0115725a4514f07eeca","name":"Erin Allen","url":"https:\/\/www.pcmatic.com\/blog\/author\/erin-allen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53429","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/64"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=53429"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53429\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/53439"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=53429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=53429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=53429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}