{"id":53632,"date":"2016-06-13T20:50:31","date_gmt":"2016-06-13T20:50:31","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=53632"},"modified":"2016-09-20T16:46:56","modified_gmt":"2016-09-20T16:46:56","slug":"cyber-criminals-dont-stand-chance-pricey-software","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/","title":{"rendered":"Cyber Criminals Fail Against Pricey Software"},"content":{"rendered":"<h3>Does an increase price tag mean your security software is impenetrable, or can cyber criminals still maneuver their way into your PC?<!--more--><\/h3>\n<p>In a recent study conducted by IDG, sponsored by PC Pitstop, it was founded that out of the 211 U.S. based IT staff, 48% spend over $500,000 USD annually on cyber security efforts.\u00a0 They should be protected right?\u00a0 When you&#8217;re spending over half a million dollars on cyber security, you&#8217;d sure hope so.\u00a0 Unfortunately that is not the case.\u00a0 Forty-six percent of those surveyed reported experiencing some form of previous cyber attack.<\/p>\n<p>PC Pitstop Vice President of Cybersecurity, Dodi Glenn, made the following statement to <a href=\"http:\/\/www.legaltechnews.com\/id=1202759157183?keywords=pc+pitstop&amp;publication=Legal+Technology&amp;slreturn=20160513162832\">Legal Tech News<\/a>:<\/p>\n<blockquote><p>&#8220;What everyone needs to remember is that any of these pieces of malware could easily establish a foothold within a company. All it takes is for one hacker to gain access and turn it over to someone who would be more interested in the treasure chest of data. It isn\u2019t uncommon for someone to hack into an organization, then sell the pilfered data on the underground market.\u00a0 Spending more money on cybersecurity defenses does not directly correlate with \u2018better protection.\u2019 Spending the money for the correct products for your environment, however, will provide better protection.&#8221;<\/p><\/blockquote>\n<p>PC Pitstop CEO, Rob Cheng, also had the following to say, to <a href=\"http:\/\/www.legaltechnews.com\/id=1202759157183?keywords=pc+pitstop&amp;publication=Legal+Technology&amp;slreturn=20160513162832\">Legal Tech News<\/a>, regarding the increase in malware activity:<\/p>\n<blockquote><p>\u201cThe security problem is getting consistently worse, the consequences are getting consistently larger, and the frequency is growing. It\u2019s time to consider a new architecture\u2014the existing model isn\u2019t working.\u201d<\/p><\/blockquote>\n<p>Rob was referencing the proprietary whitelisting technology that is used in both <a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504631\">PC Matic<\/a> and <a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504632\">PC Matic Pro<\/a>.<\/p>\n<p>You can read the full story from Legal Tech News <a href=\"http:\/\/www.legaltechnews.com\/id=1202759157183?keywords=pc+pitstop&amp;publication=Legal+Technology&amp;slreturn=20160513162832\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Does an increase price tag mean your security software is impenetrable, or can cyber criminals still maneuver their way into your PC?<\/p>\n","protected":false},"author":54,"featured_media":53503,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4368,2985,4987,4959],"tags":[3911,252,4970],"class_list":["post-53632","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-in-the-news","category-press","category-spiceworks","category-whitelisting","tag-antivirus-software","tag-cyber-criminals","tag-idg"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Criminals Fail Against Pricey Software<\/title>\n<meta name=\"description\" content=\"Does an increase price tag mean your security software is impenetrable, or can cyber criminals still maneuver their way into your PC?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Criminals Fail Against Pricey Software\" \/>\n<meta property=\"og:description\" content=\"Does an increase price tag mean your security software is impenetrable, or can cyber criminals still maneuver their way into your PC?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-13T20:50:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-09-20T16:46:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CyberSecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"259\" \/>\n\t<meta property=\"og:image:height\" content=\"194\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-criminals-dont-stand-chance-pricey-software\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-criminals-dont-stand-chance-pricey-software\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Cyber Criminals Fail Against Pricey Software\",\"datePublished\":\"2016-06-13T20:50:31+00:00\",\"dateModified\":\"2016-09-20T16:46:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-criminals-dont-stand-chance-pricey-software\\\/\"},\"wordCount\":294,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-criminals-dont-stand-chance-pricey-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/CyberSecurity.jpg\",\"keywords\":[\"antivirus software\",\"cyber criminals\",\"IDG\"],\"articleSection\":[\"In the News\",\"Press\",\"SpiceWorks\",\"Whitelisting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-criminals-dont-stand-chance-pricey-software\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-criminals-dont-stand-chance-pricey-software\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-criminals-dont-stand-chance-pricey-software\\\/\",\"name\":\"Cyber Criminals Fail Against Pricey Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-criminals-dont-stand-chance-pricey-software\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-criminals-dont-stand-chance-pricey-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/CyberSecurity.jpg\",\"datePublished\":\"2016-06-13T20:50:31+00:00\",\"dateModified\":\"2016-09-20T16:46:56+00:00\",\"description\":\"Does an increase price tag mean your security software is impenetrable, or can cyber criminals still maneuver their way into your PC?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-criminals-dont-stand-chance-pricey-software\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-criminals-dont-stand-chance-pricey-software\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-criminals-dont-stand-chance-pricey-software\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/CyberSecurity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/CyberSecurity.jpg\",\"width\":259,\"height\":194},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-criminals-dont-stand-chance-pricey-software\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Criminals Fail Against Pricey Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Criminals Fail Against Pricey Software","description":"Does an increase price tag mean your security software is impenetrable, or can cyber criminals still maneuver their way into your PC?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Criminals Fail Against Pricey Software","og_description":"Does an increase price tag mean your security software is impenetrable, or can cyber criminals still maneuver their way into your PC?","og_url":"https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-06-13T20:50:31+00:00","article_modified_time":"2016-09-20T16:46:56+00:00","og_image":[{"width":259,"height":194,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CyberSecurity.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Cyber Criminals Fail Against Pricey Software","datePublished":"2016-06-13T20:50:31+00:00","dateModified":"2016-09-20T16:46:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/"},"wordCount":294,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CyberSecurity.jpg","keywords":["antivirus software","cyber criminals","IDG"],"articleSection":["In the News","Press","SpiceWorks","Whitelisting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/","url":"https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/","name":"Cyber Criminals Fail Against Pricey Software","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CyberSecurity.jpg","datePublished":"2016-06-13T20:50:31+00:00","dateModified":"2016-09-20T16:46:56+00:00","description":"Does an increase price tag mean your security software is impenetrable, or can cyber criminals still maneuver their way into your PC?","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CyberSecurity.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CyberSecurity.jpg","width":259,"height":194},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/cyber-criminals-dont-stand-chance-pricey-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Criminals Fail Against Pricey Software"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=53632"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53632\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/53503"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=53632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=53632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=53632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}