{"id":53973,"date":"2016-08-08T21:30:06","date_gmt":"2016-08-08T21:30:06","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=53973"},"modified":"2016-08-08T21:30:06","modified_gmt":"2016-08-08T21:30:06","slug":"authentication-prevent-80-breaches","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/","title":{"rendered":"Proper Authentication Can Prevent 80% of Breaches"},"content":{"rendered":"<p>Trying to keep up with today&#8217;s security threats can be exhausting.\u00a0 By implementing stronger authentication methods, you can prevent 80% of all breaches&#8230;<\/p>\n<p>Increasing your organizations&#8217; authentication methods may seem like a daunting task.\u00a0 However, if by doing so, you&#8217;re able to avoid 80% of all breaches, it&#8217;s certainly something to consider.\u00a0 Enhancing your verification process will not only protect consumer data, but control costs and reduce IT burdens.\u00a0\u00a0<a href=\"http:\/\/www.csoonline.com\/article\/3101324\/security\/why-you-need-a-strong-authentication-platform.html?token=%23tk.CSONLE_nlt_cso_techwatch_2016-08-07&amp;idg_eid=11713482aef4550484a1c58c027bab60&amp;utm_source=Sailthru&amp;utm_medium=email&amp;utm_campaign=CSO%20TechWatch%202016-08-07&amp;utm_term=cso_techwatch#slide7\">CSO <\/a>from IDG\u00a0provided the following\u00a0six methods businesses are able to implement to increase security:<\/p>\n<ol>\n<li><strong>Access management<\/strong> &#8211; Although access to data is needed for employees to complete their job duties, the level of employees&#8217; access may need to be reevaluated.\u00a0 An access administration audit can assist in determining if your company&#8217;s level of controls are functioning appropriately, or if certain individuals or departments have elevated rights that are not needed to perform their basic job duties.\u00a0 You can also implement a multi-factor authentication process to ensure access requires more than just a password to retrieve data.\u00a0 <a href=\"http:\/\/www.pcmatic.com\/pro\/prod-authentication.asp\">PC Matic Pro Authentication<\/a>\u00a0offers the industry&#8217;s first\u00a0three-factor authentication tool that confirms location, device and user credentials to ensure security.\u00a0 This technology also offers a unique strike-back feature that can be used when IT administrators suspect suspicious activity.\u00a0 They&#8217;re able to deny the authentication\u00a0and\u00a0have the option to lock down the suspected device.<\/li>\n<li><strong>Technological mobility<\/strong> &#8211; As employees, we are consistently connected through smart phones, smart watches, laptops, etc.\u00a0 Employers need to be aware of what devices are accessible to their networks.\u00a0 Network access needs to be controlled by only allowing approved devices as well as requiring authentication for remote access.<\/li>\n<li><strong>Securing the cloud<\/strong> &#8211; Many companies are using a cloud-base infrastructure to hold their sensitive data.\u00a0 In doing so, organizations must be sure this platform is secure.\u00a0 Hackers often will use\u00a0this infrastructure to gain access to an organization.\u00a0 Once they find one\u00a0bit of information, they&#8217;re able to move down the attack chain. \u00a0One method of\u00a0securing\u00a0your cloud-based infrastructure is by implementing <a href=\"http:\/\/www.pcmatic.com\/pro\/prod-authentication.asp\">multi-factor authentication<\/a>.<\/li>\n<li><strong>Plan ahead<\/strong> &#8211; According to CSO, it&#8217;s not if, but when your information is breached.\u00a0 Therefore, being proactive and having an incident response plan will be imperative\u00a0in business continuity.<\/li>\n<li><strong>Enhancing passwords<\/strong> &#8211; Stricter passwords are always encouraged.\u00a0 As users, it can be frustrating\u00a0trying to keep track of all of our passwords.\u00a0 To enhance password protection, it is encouraged users use passphrases and\/or words that cannot be found in the dictionary.\u00a0\u00a0 <a href=\"http:\/\/www.pcmatic.com\/pro\/prod-authentication.asp\">Multi-factor authentication<\/a> is another means to increase security by adding different methods of authentication than simply\u00a0passwords.<\/li>\n<li><strong>Meeting compliance regulations<\/strong> &#8211; All organizations should have some basic level of compliance regulations.\u00a0 These should be reviewed on an annual basis.\u00a0 During said review, authentication levels should be reevaluated to ensure these compliance regulations are being met.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Trying to keep up with today&#8217;s security threats can be exhausting.\u00a0 By implementing stronger authentication methods, you can prevent 80% of all breaches&#8230; Increasing your organizations&#8217; authentication methods may seem like a daunting task.\u00a0 However, if by doing so, you&#8217;re able to avoid 80% of all breaches, it&#8217;s certainly something to consider.\u00a0 Enhancing your verification [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":52244,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12],"tags":[5018],"class_list":["post-53973","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-pit-blog","tag-pc-matic-pro-authentication"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Proper Authentication Can Prevent 80% of Breaches<\/title>\n<meta name=\"description\" content=\"Trying to keep up with today&#039;s security threats can be exhausting. By implementing stronger authentication methods, you can prevent 80% of all breaches...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Proper Authentication Can Prevent 80% of Breaches\" \/>\n<meta property=\"og:description\" content=\"Trying to keep up with today&#039;s security threats can be exhausting. By implementing stronger authentication methods, you can prevent 80% of all breaches...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-08T21:30:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/authentication-prevent-80-breaches\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/authentication-prevent-80-breaches\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Proper Authentication Can Prevent 80% of Breaches\",\"datePublished\":\"2016-08-08T21:30:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/authentication-prevent-80-breaches\\\/\"},\"wordCount\":476,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/authentication-prevent-80-breaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/data-breach-blog-img1.jpg\",\"keywords\":[\"PC Matic Pro Authentication\"],\"articleSection\":[\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/authentication-prevent-80-breaches\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/authentication-prevent-80-breaches\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/authentication-prevent-80-breaches\\\/\",\"name\":\"Proper Authentication Can Prevent 80% of Breaches\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/authentication-prevent-80-breaches\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/authentication-prevent-80-breaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/data-breach-blog-img1.jpg\",\"datePublished\":\"2016-08-08T21:30:06+00:00\",\"description\":\"Trying to keep up with today's security threats can be exhausting. By implementing stronger authentication methods, you can prevent 80% of all breaches...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/authentication-prevent-80-breaches\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/authentication-prevent-80-breaches\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/authentication-prevent-80-breaches\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/data-breach-blog-img1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/data-breach-blog-img1.jpg\",\"width\":200,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/authentication-prevent-80-breaches\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Proper Authentication Can Prevent 80% of Breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Proper Authentication Can Prevent 80% of Breaches","description":"Trying to keep up with today's security threats can be exhausting. By implementing stronger authentication methods, you can prevent 80% of all breaches...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/","og_locale":"en_US","og_type":"article","og_title":"Proper Authentication Can Prevent 80% of Breaches","og_description":"Trying to keep up with today's security threats can be exhausting. By implementing stronger authentication methods, you can prevent 80% of all breaches...","og_url":"https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-08-08T21:30:06+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Proper Authentication Can Prevent 80% of Breaches","datePublished":"2016-08-08T21:30:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/"},"wordCount":476,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg","keywords":["PC Matic Pro Authentication"],"articleSection":["The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/","url":"https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/","name":"Proper Authentication Can Prevent 80% of Breaches","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg","datePublished":"2016-08-08T21:30:06+00:00","description":"Trying to keep up with today's security threats can be exhausting. By implementing stronger authentication methods, you can prevent 80% of all breaches...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/data-breach-blog-img1.jpg","width":200,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/authentication-prevent-80-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Proper Authentication Can Prevent 80% of Breaches"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=53973"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53973\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/52244"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=53973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=53973"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=53973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}