{"id":55102,"date":"2016-11-07T16:23:58","date_gmt":"2016-11-07T16:23:58","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=55102"},"modified":"2016-11-07T16:50:42","modified_gmt":"2016-11-07T16:50:42","slug":"90-employees-admit-violating-policies","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/","title":{"rendered":"90% of Employees Admit to Violating IT Policies"},"content":{"rendered":"<p>There&#8217;s a plethora of cyber security threats that IT professionals need to protect their data from.\u00a0 But, what if one of those threats are entirely unmanageable?\u00a0 A recent <a href=\"https:\/\/www.cebglobal.com\/content\/dam\/cebglobal\/us\/EN\/top-insights\/executive-guidance\/pdfs\/eg2016q3-managing-the-hidden-causes-of-data-breaches.pdf\">study <\/a>conducted by U.S. tech consulting company CEB, found 90% of employees have violated IT policies designed to prevent security and data breaches.<\/p>\n<h4>What does this mean?<\/h4>\n<p>Many companies are spending thousands, if not millions of dollars in information security.\u00a0 Their primary focus being outside hackers, who intentionally are executing malicious attacks.\u00a0 But what about internal controls?\u00a0 Many companies feel secure with their internal controls, believing their access administration rights will prevent employees from gaining access to information they do not need to have access to.\u00a0 However, the <a href=\"https:\/\/www.cebglobal.com\/content\/dam\/cebglobal\/us\/EN\/top-insights\/executive-guidance\/pdfs\/eg2016q3-managing-the-hidden-causes-of-data-breaches.pdf\">study <\/a>by CEB found many employees will work their way around these controls to obtain information.\u00a0 Many times, these workarounds are intentionally malicious; however, they lead to unintentional breaches.<\/p>\n<h4>What to do next&#8230;<\/h4>\n<p><strong>Internal audit<\/strong> &#8211; I know, I know, I know&#8230;we hear &#8220;audit&#8221; and think NO WAY!\u00a0 But honestly, it is helpful.\u00a0 Conducting an internal audit of the access administration process can be incredibly helpful.\u00a0 Their job is to identify controls.\u00a0 Since they do not work in each department day in and day out, they provide a fresh insight into the process.\u00a0 They will also provide suggestions on strengthening controls.<\/p>\n<p><strong>Employee awareness<\/strong> &#8211; Informing employees of what access rights they have, and the purpose for each, can be enlightening for both management and the employees.\u00a0 Many times, employees don&#8217;t understand why their access is limited.\u00a0 Understanding why they do or don&#8217;t have access to a certain system or file can help them to understand the security risks of sharing credentials\u00a0with other employees who don&#8217;t have the same access.<\/p>\n<p><strong>Following up<\/strong> &#8211; On occasion, employees may need access to something they typically don&#8217;t need access to.\u00a0 Providing these rights\u00a0are acceptable; however, IT admins need to remember to remove the access rights once the necessary information has been obtained.\u00a0 It is best practice to review employee access administration rights annually to ensure accuracy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There&#8217;s a plethora of cyber security threats that IT professionals need to protect their data from.\u00a0 But, what if one of those threats are entirely unmanageable?\u00a0 A recent study conducted by U.S. tech consulting company CEB, found 90% of employees have violated IT policies designed to prevent security and data breaches. What does this mean? [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55106,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12],"tags":[5093,4540],"class_list":["post-55102","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-pit-blog","tag-it-policies","tag-it-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>90% of Employees Admit to Violating IT Policies<\/title>\n<meta name=\"description\" content=\"A recent study conducted by CEB found 90% of employees admitted to violating IT policies, leading to major security issues...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"90% of Employees Admit to Violating IT Policies\" \/>\n<meta property=\"og:description\" content=\"A recent study conducted by CEB found 90% of employees admitted to violating IT policies, leading to major security issues...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-07T16:23:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-11-07T16:50:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/90-employees-admit-violating-policies\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/90-employees-admit-violating-policies\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"90% of Employees Admit to Violating IT Policies\",\"datePublished\":\"2016-11-07T16:23:58+00:00\",\"dateModified\":\"2016-11-07T16:50:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/90-employees-admit-violating-policies\\\/\"},\"wordCount\":353,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/90-employees-admit-violating-policies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/securityLock.jpg\",\"keywords\":[\"IT policies\",\"IT security\"],\"articleSection\":[\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/90-employees-admit-violating-policies\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/90-employees-admit-violating-policies\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/90-employees-admit-violating-policies\\\/\",\"name\":\"90% of Employees Admit to Violating IT Policies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/90-employees-admit-violating-policies\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/90-employees-admit-violating-policies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/securityLock.jpg\",\"datePublished\":\"2016-11-07T16:23:58+00:00\",\"dateModified\":\"2016-11-07T16:50:42+00:00\",\"description\":\"A recent study conducted by CEB found 90% of employees admitted to violating IT policies, leading to major security issues...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/90-employees-admit-violating-policies\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/90-employees-admit-violating-policies\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/90-employees-admit-violating-policies\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/securityLock.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/securityLock.jpg\",\"width\":730,\"height\":410,\"caption\":\"Contact a Cyber Security Expert to Learn about Application Whitelisting\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/90-employees-admit-violating-policies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"90% of Employees Admit to Violating IT Policies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"90% of Employees Admit to Violating IT Policies","description":"A recent study conducted by CEB found 90% of employees admitted to violating IT policies, leading to major security issues...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/","og_locale":"en_US","og_type":"article","og_title":"90% of Employees Admit to Violating IT Policies","og_description":"A recent study conducted by CEB found 90% of employees admitted to violating IT policies, leading to major security issues...","og_url":"https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-11-07T16:23:58+00:00","article_modified_time":"2016-11-07T16:50:42+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"90% of Employees Admit to Violating IT Policies","datePublished":"2016-11-07T16:23:58+00:00","dateModified":"2016-11-07T16:50:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/"},"wordCount":353,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg","keywords":["IT policies","IT security"],"articleSection":["The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/","url":"https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/","name":"90% of Employees Admit to Violating IT Policies","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg","datePublished":"2016-11-07T16:23:58+00:00","dateModified":"2016-11-07T16:50:42+00:00","description":"A recent study conducted by CEB found 90% of employees admitted to violating IT policies, leading to major security issues...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/securityLock.jpg","width":730,"height":410,"caption":"Contact a Cyber Security Expert to Learn about Application Whitelisting"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/90-employees-admit-violating-policies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"90% of Employees Admit to Violating IT Policies"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/55102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=55102"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/55102\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55106"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=55102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=55102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=55102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}