{"id":56134,"date":"2021-01-17T10:30:00","date_gmt":"2021-01-17T16:30:00","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=56134"},"modified":"2022-02-15T13:43:06","modified_gmt":"2022-02-15T19:43:06","slug":"application-whitelisting-nations-solution","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/","title":{"rendered":"Application Whitelisting &#8211; Our Nation&#8217;s Solution to the Cyber Security Crisis"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\" id=\"application-whitelisting-our-nation-s-solution\">Application Whitelisting&#8211;Our Nation&#8217;s Solution?<\/h4>\n\n\n\n<p><strong>Application Whitelisting Cybersecurity<\/strong>. Never in our history has cyber security been a bigger threat than it is now.\u00a0 Whether it is our computers, smart phones, tablets, televisions, smart watches, etc., they&#8217;re all at risk.\u00a0 Malware and ransomware threats are becoming an increasing menace.<\/p>\n\n\n\n<p>How can we possibly secure our data against these threats?&nbsp; The <a href=\"https:\/\/techtalk.pcpitstop.com\/2017\/01\/05\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/\">FBI and The Department of Homeland Security <\/a>have encouraged device users to implement application whitelisting as an advanced measure to help mitigate the risk of a malware infection.&nbsp; The NSA has also added application whitelisting to their <a href=\"https:\/\/techtalk.pcpitstop.com\/2016\/09\/07\/nsa-best-practices-whitelisting\/\">best practices<\/a>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"what-is-application-whitelisting\">What is Application Whitelisting?<\/h4>\n\n\n\n<p>In order for you to understand whitelisting, you first must understand blacklisting &#8212; the traditional method used for device protection.<\/p>\n\n\n\n<p>Blacklisting is the methodology of keeping track of every known threat.\u00a0 These threats are present on a &#8220;blacklist&#8221;.\u00a0 When a file or program attempts to execute on your device, it is compared to the blacklist.\u00a0 If the file\/program is found on the blacklist, it will not run because it is a known malicious threat.\u00a0 This method of security is no longer acceptable, because malware changes every single second.\u00a0 This makes it impossible for the blacklist to remain adequately updated, to prevent malware infections. Furthermore, some malware infections are <em>fileless<\/em> such as zero-day infections and those are certainly not on any antivirus blacklist until they infect an unsuspecting target. More alarming, are malicious files masquerading as legitimate software programs that gain access to your system through a software vulnerability not yet on any malware blacklist.<\/p>\n\n\n\n<p><a title=\"Whitelisting Application Software\" href=\"https:\/\/www.pcmatic.com\/whitelist\/\">Application whitelisting <\/a>is the exact opposite of the blacklist&nbsp;approach.&nbsp; Instead of keeping a list of &#8220;bad&#8221; files, application whitelisting is a list of all known trusted applications.&nbsp; Therefore, when you attempt to run a file or program on your computer, it is compared to the whitelist.&nbsp; If it is found on the whitelist, it is allowed to run because it has been tested and deemed secure.&nbsp; If the file is not on the whitelist, it is blocked until testing can be done to determine its security. Read more about <a title=\"Whitelisting Best Practices\" href=\"https:\/\/www.pcmatic.com\/whitelist\/application-whitelisting-best-practices.asp\">whitelisting best practices<\/a>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"what-about-false-positives\">What About False Positives?<\/h4>\n\n\n\n<p>False positives are the primary inconvenience when using application whitelisting.\u00a0 False positives occur when a whitelisting solution will not allow a safe program to run.\u00a0 This is when testing takes place to determine the security of the program or file. App Whitelisting differs from App Control in the sense that application control programs will allow new or unknown files or file updates to run as long as they are updating to a known publisher&#8217;s software directory. This is less secure as it allows malicious files and scripts to piggyback onto legitimate programs and run undetected on a device or network. Whitelisting technology scan every file, script and process regardless of the software publisher&#8217;s reputation and so naturall may incur more false positives.<\/p>\n\n\n\n<p>Even with the mild inconvenience of a few false positives, most PC users would rather have a higher level of protection against modern cyber security threats and cope with the minor inconvenience of a false positive, than provide malicious files the opportunity to execute by using a sub-par security solution that excludes whitelisting. Read more about <a title=\"What is Application Whitelisitng\" href=\"https:\/\/www.pcmatic.com\/whitelist\/application-whitelisting.asp\">what is Application Whitelisting<\/a>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"how-to-start-implementing-application-whitelisting\">How to Start Implementing Application Whitelisting<\/h4>\n\n\n\n<p>As stated above, some of our nation&#8217;s largest security offices are encouraging  whitelisting as a way to address the risk of malware and <a title=\"Stop Ransomware Attacks\" href=\"https:\/\/www.pcmatic.com\/ransomware\/\">ransomware attacks<\/a>, but how do you implement it?\u00a0 There are a few ways to begin the process, some more time consuming and backend work than others.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Start your own &#8220;whitelist&#8221;.\u00a0 You can accomplish this through the IT department, your own personal computer, etc.\u00a0 This however, is incredibly time consuming, and creates a significant amount of backend work for the IT department.\u00a0 Creating a whitelist from scratch is an option, but not a very good one.<\/li><li>Use a security solution that already includes application whitelisting.\u00a0 This is probably by far, the best option.\u00a0 Do your research on cybersecurity firms and solutions.\u00a0 Many claim to use whitelisting, but actually do not use it as their primary method of detection.<\/li><li>Use <a href=\"https:\/\/www.pcmatic.com\/pro\/endpoint-security.asp\">Application Whitelisting for Endpoint Security<\/a>. Part of protecting endpoint devices is only allowing safe, legitimate programs to run while at the same time only granting access to legitimate users to the network. To accomplish both of these cyber security goals, whitelisting uses a zero-trust approach to cybersecurity.  Zero Trust Access and Architecture along with a whitelisting layer, is a security solution that is becoming one of the most effective for combating cyber threats and bad actors looking to penetrate network security.<\/li><\/ol>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"pc-matic-and-pc-matic-pro\">PC Matic and PC Matic Pro<\/h4>\n\n\n\n<p><a title=\"Computer Virus Protection\" href=\"https:\/\/cart.pcmatic.com\/go.asp?id=504631\">PC Matic<\/a> and <a title=\"Business Antivirus Software\" href=\"https:\/\/cart.pcmatic.com\/go.asp?id=504632\">PC Matic Pro<\/a> have been working on their whitelist for years.\u00a0 It is the only global whitelisting agent that is automatic, creating minimal backend work for the PC users and IT departments.\u00a0 Our application whitelisting is far more effective than competitors in preventative malware detection, <a href=\"https:\/\/www.pcmatic.com\/blog\/2016\/12\/29\/pc-matic-dominates-perfect-virus-detections-venerable-vb100\/\">scoring a 99.9% proactive detection rating<\/a> in the most recent Virus Bulletin Reactive and Proactive (RAP) Test. The whitelist is easy to implement and update from a cloud console. Systems administrators can also update operating system security patches and drivers automatically. In addition, security features include ransomware protection, and RDP port control access authentication and control.<\/p>\n\n\n\n<p>To keep your business data, servers and network secure, use <a title=\"Business Application Whitelisting\" href=\"https:\/\/www.pcmatic.com\/pro\/whitelisting.asp\">Application Whitelisting for Business<\/a> as part of a comprehensive cybersecurity business systems plan. Our business security software protects servers, networks, cloud and hybrid environments from cyber attack. <a title=\"Compare System Security Solutions\" href=\"https:\/\/www.pcmatic.com\/pro\/compare-security-software.asp\">Compare system security solutions<\/a>. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.pcmatic.com\/blog\/tag\/ransomware-reports\/\">Read more about ransomware<\/a> and AWL as a security solution to fight and guard against ransom attack and growing cyber threats. Try PC Matic Cybersecurity solutions and antimalware products proudly made entirely in the USA.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Application Whitelisting&#8211;Our Nation&#8217;s Solution? Application Whitelisting Cybersecurity. Never in our history has cyber security been a bigger threat than it is now.\u00a0 Whether it is our computers, smart phones, tablets, televisions, smart watches, etc., they&#8217;re all at risk.\u00a0 Malware and ransomware threats are becoming an increasing menace. How can we possibly secure our data against [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":55269,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4987,5090,183,4959],"tags":[4989],"class_list":["post-56134","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-spiceworks","category-slider","category-tips","category-whitelisting","tag-application-whitelisting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Application Whitelisting - Our Nation&#039;s Solution to the Cyber Security Crisis<\/title>\n<meta name=\"description\" content=\"Our nation is facing a cyber security crisis. From home users, to businesses--we need a solution. Two words, application whitelisting...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Application Whitelisting - Our Nation&#039;s Solution to the Cyber Security Crisis\" \/>\n<meta property=\"og:description\" content=\"Our nation is facing a cyber security crisis. From home users, to businesses--we need a solution. Two words, application whitelisting...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-17T16:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-15T19:43:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"PC Matic Cybersecurity\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PC Matic Cybersecurity\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-nations-solution\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-nations-solution\\\/\"},\"author\":{\"name\":\"PC Matic Cybersecurity\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3dbbae19394008342629ce8d970445f\"},\"headline\":\"Application Whitelisting &#8211; Our Nation&#8217;s Solution to the Cyber Security Crisis\",\"datePublished\":\"2021-01-17T16:30:00+00:00\",\"dateModified\":\"2022-02-15T19:43:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-nations-solution\\\/\"},\"wordCount\":972,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-nations-solution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"keywords\":[\"application whitelisting\"],\"articleSection\":[\"SpiceWorks\",\"TechTalk Slider\",\"tips\",\"Whitelisting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-nations-solution\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-nations-solution\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-nations-solution\\\/\",\"name\":\"Application Whitelisting - Our Nation's Solution to the Cyber Security Crisis\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-nations-solution\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-nations-solution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"datePublished\":\"2021-01-17T16:30:00+00:00\",\"dateModified\":\"2022-02-15T19:43:06+00:00\",\"description\":\"Our nation is facing a cyber security crisis. From home users, to businesses--we need a solution. Two words, application whitelisting...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-nations-solution\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-nations-solution\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-nations-solution\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"width\":1920,\"height\":550,\"caption\":\"Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-nations-solution\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Application Whitelisting &#8211; Our Nation&#8217;s Solution to the Cyber Security Crisis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3dbbae19394008342629ce8d970445f\",\"name\":\"PC Matic Cybersecurity\",\"description\":\"PC Matic Cyber Security is America's Top Antivirus Software and our team is committed to providing you with the information you need to keep your computer, mobile device and network safe and running like new.\",\"sameAs\":[\"https:\\\/\\\/techtalk.pcpitstop.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/pcpitstop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Application Whitelisting - Our Nation's Solution to the Cyber Security Crisis","description":"Our nation is facing a cyber security crisis. From home users, to businesses--we need a solution. Two words, application whitelisting...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/","og_locale":"en_US","og_type":"article","og_title":"Application Whitelisting - Our Nation's Solution to the Cyber Security Crisis","og_description":"Our nation is facing a cyber security crisis. From home users, to businesses--we need a solution. Two words, application whitelisting...","og_url":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2021-01-17T16:30:00+00:00","article_modified_time":"2022-02-15T19:43:06+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","type":"image\/jpeg"}],"author":"PC Matic Cybersecurity","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"PC Matic Cybersecurity","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/"},"author":{"name":"PC Matic Cybersecurity","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f3dbbae19394008342629ce8d970445f"},"headline":"Application Whitelisting &#8211; Our Nation&#8217;s Solution to the Cyber Security Crisis","datePublished":"2021-01-17T16:30:00+00:00","dateModified":"2022-02-15T19:43:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/"},"wordCount":972,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","keywords":["application whitelisting"],"articleSection":["SpiceWorks","TechTalk Slider","tips","Whitelisting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/","url":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/","name":"Application Whitelisting - Our Nation's Solution to the Cyber Security Crisis","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","datePublished":"2021-01-17T16:30:00+00:00","dateModified":"2022-02-15T19:43:06+00:00","description":"Our nation is facing a cyber security crisis. From home users, to businesses--we need a solution. Two words, application whitelisting...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","width":1920,"height":550,"caption":"Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-nations-solution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Application Whitelisting &#8211; Our Nation&#8217;s Solution to the Cyber Security Crisis"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f3dbbae19394008342629ce8d970445f","name":"PC Matic Cybersecurity","description":"PC Matic Cyber Security is America's Top Antivirus Software and our team is committed to providing you with the information you need to keep your computer, mobile device and network safe and running like new.","sameAs":["https:\/\/techtalk.pcpitstop.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/pcpitstop\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=56134"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56134\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55269"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=56134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=56134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=56134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}