{"id":53684,"date":"2016-06-28T16:54:55","date_gmt":"2016-06-28T16:54:55","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=53684"},"modified":"2016-07-13T17:36:10","modified_gmt":"2016-07-13T17:36:10","slug":"ensuring-maximum-protection","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/","title":{"rendered":"Ensuring Maximum Protection"},"content":{"rendered":"<p>Securing your data during a time when we are incredibly dependent upon computing has never been more crucial&#8230;<!--more--><\/p>\n<p>Think about your computer, both at work and for home use.\u00a0 What do you have on it?\u00a0 Spreadsheets, agendas, reports, family pictures, travel arrangements, tax information?\u00a0 Probably all of that and then some, right?\u00a0 So what do you do if it&#8217;s lost or stolen by a hacker?\u00a0 You could start that monthly report over, or call it a complete loss and never see your last year&#8217;s spreadsheets, reports, tax data and family pictures again.\u00a0 Or, you could follow these three steps, laid out by <a href=\"http:\/\/www.esecurityplanet.com\/network-security\/ransomware-is-on-a-roll-so-how-can-you-stop-it.html\">eSecurity Planet<\/a> and <a href=\"http:\/\/www.healthdatamanagement.com\/opinion\/why-a-new-defense-strategy-is-needed-to-stop-ransomware\">Health Data Management,<\/a> to properly ensure maximum protection of these important files:<\/p>\n<ol>\n<li>Remove administrative rights &#8211; When a hacker is trying to lock your data as a form of ransomware, they seek out the data that&#8217;s held within the admin rights.\u00a0 If those rights are removed, they do not know what may be of upmost importance.\u00a0 You&#8217;re leaving bread crumbs directly to your most important data.\u00a0 Is it necessary?<\/li>\n<li>Whitelisting &#8211; Traditional security software uses an outdated blacklist approach.\u00a0 By transitioning to a security software, such as <a href=\"https:\/\/www.pcmatic.com\/\">PC Matic Home<\/a> or<a href=\"https:\/\/www.techsentry.com\/\"> Tech Sentry<\/a> for business use, that uses a proprietary whitelisting technology, you will be better protected.\u00a0 Here&#8217;s how: A whitelist is a list of all the known GOOD programs and only allows them to function, while a blacklist is a list of all the known BAD programs.\u00a0 Keeping a list of all the bad files is impossible, as new strands of malware are created daily, even <a href=\"https:\/\/www.pcmatic.com\/blog\/2016\/06\/07\/cerber-ransomware-morphs-15-seconds\/\">every 15 seconds<\/a>.\u00a0 No matter how many times malware changes, it will never be identified as a good file.<\/li>\n<li>Endpoint sandboxing &#8211; What does this mean?\u00a0 Simply put, it&#8217;s isolation of unknown traffic.\u00a0 By isolating any unknown traffic, such as visiting an unknown website or opening an unknown email attachment, if it is malicious, it cannot impact your data because it&#8217;s in the sandbox.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Securing your data during a time when we are incredibly dependent upon computing has never been more crucial&#8230;<\/p>\n","protected":false},"author":54,"featured_media":53325,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[109,4987,4953,4959],"tags":[4354],"class_list":["post-53684","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pc-matic-blog","category-spiceworks","category-tech-sentry-blog","category-whitelisting","tag-whitelisting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ensuring Maximum Protection<\/title>\n<meta name=\"description\" content=\"Securing your data during a time when we are incredibly dependent upon computing has never been more crucial. Follow these steps for maximum protection...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ensuring Maximum Protection\" \/>\n<meta property=\"og:description\" content=\"Securing your data during a time when we are incredibly dependent upon computing has never been more crucial. Follow these steps for maximum protection...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-28T16:54:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-07-13T17:36:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blue-purple-padlock.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"278\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ensuring-maximum-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ensuring-maximum-protection\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Ensuring Maximum Protection\",\"datePublished\":\"2016-06-28T16:54:55+00:00\",\"dateModified\":\"2016-07-13T17:36:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ensuring-maximum-protection\\\/\"},\"wordCount\":335,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ensuring-maximum-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blue-purple-padlock.jpg\",\"keywords\":[\"whitelisting\"],\"articleSection\":[\"PC Matic Blog\",\"SpiceWorks\",\"Tech Sentry Blog\",\"Whitelisting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ensuring-maximum-protection\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ensuring-maximum-protection\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ensuring-maximum-protection\\\/\",\"name\":\"Ensuring Maximum Protection\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ensuring-maximum-protection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ensuring-maximum-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blue-purple-padlock.jpg\",\"datePublished\":\"2016-06-28T16:54:55+00:00\",\"dateModified\":\"2016-07-13T17:36:10+00:00\",\"description\":\"Securing your data during a time when we are incredibly dependent upon computing has never been more crucial. Follow these steps for maximum protection...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ensuring-maximum-protection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ensuring-maximum-protection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ensuring-maximum-protection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blue-purple-padlock.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blue-purple-padlock.jpg\",\"width\":500,\"height\":278,\"caption\":\"Computer Lock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ensuring-maximum-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ensuring Maximum Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ensuring Maximum Protection","description":"Securing your data during a time when we are incredibly dependent upon computing has never been more crucial. Follow these steps for maximum protection...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/","og_locale":"en_US","og_type":"article","og_title":"Ensuring Maximum Protection","og_description":"Securing your data during a time when we are incredibly dependent upon computing has never been more crucial. Follow these steps for maximum protection...","og_url":"https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-06-28T16:54:55+00:00","article_modified_time":"2016-07-13T17:36:10+00:00","og_image":[{"width":500,"height":278,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blue-purple-padlock.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Ensuring Maximum Protection","datePublished":"2016-06-28T16:54:55+00:00","dateModified":"2016-07-13T17:36:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/"},"wordCount":335,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blue-purple-padlock.jpg","keywords":["whitelisting"],"articleSection":["PC Matic Blog","SpiceWorks","Tech Sentry Blog","Whitelisting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/","url":"https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/","name":"Ensuring Maximum Protection","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blue-purple-padlock.jpg","datePublished":"2016-06-28T16:54:55+00:00","dateModified":"2016-07-13T17:36:10+00:00","description":"Securing your data during a time when we are incredibly dependent upon computing has never been more crucial. Follow these steps for maximum protection...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blue-purple-padlock.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blue-purple-padlock.jpg","width":500,"height":278,"caption":"Computer Lock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/ensuring-maximum-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ensuring Maximum Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=53684"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53684\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/53325"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=53684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=53684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=53684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}