{"id":56219,"date":"2017-01-23T10:56:12","date_gmt":"2017-01-23T16:56:12","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=56219"},"modified":"2017-01-27T10:18:21","modified_gmt":"2017-01-27T16:18:21","slug":"trumps-cyber-security-plan-expect","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/","title":{"rendered":"Trump&#8217;s Cyber Security Plan &#8211; Aren&#8217;t We Already Doing This?"},"content":{"rendered":"<p><em>Update 1\/27\/2017: A draft of President Trump&#8217;s executive order on cyber security has been released.\u00a0 According to <a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/trump-lays-groundwork-to-change-us-role-in-the-world\/2017\/01\/26\/812998e6-e404-11e6-a547-5fb9411d332c_story.html?utm_term=.4dc29d6a695f\">Washington Post<\/a>, it reads as though it could have been written by the Obama administration.\u00a0\u00a0 You can read the draft of the executive order <a href=\"http:\/\/apps.washingtonpost.com\/g\/documents\/world\/read-the-trump-administrations-draft-of-the-executive-order-on-cybersecurity\/2306\/\">here<\/a>.\u00a0 It is worth mentioning, in several areas of the order, one of the review parties are listed as the Department of Homeland Security.\u00a0 This could lead to speculation that Trump will not be shifting cyber security responsibilities to the Department of Defense, as discussed below.\u00a0 <\/em><\/p>\n<p>The new president has been sworn in, meaning there will be changes made across the board.\u00a0 One of the items Trump plans to address in a rather timely fashion is cyber security.\u00a0 But is it really all that different than Obama&#8217;s <a href=\"https:\/\/obamawhitehouse.archives.gov\/the-press-office\/2016\/02\/09\/fact-sheet-cybersecurity-national-action-plan\">Cyber Security National Action Plan<\/a>?\u00a0 Yes and no.<\/p>\n<h4>Adding Role to Department of Defense?<\/h4>\n<p>President Trump is wanting to move cyber security efforts to the Department of Defense.\u00a0 Currently, this is managed by the Department of Homeland Security.\u00a0\u00a0Shifting responsibilities between the DHS\u00a0to the DOD would<a href=\"http:\/\/www.nextgov.com\/cybersecurity\/2017\/01\/trumps-cyber-plan\/134732\/\"> require\u00a0Congressional action<\/a>.<\/p>\n<p>Initial reports by <a href=\"http:\/\/www.nextgov.com\/cybersecurity\/2016\/11\/trump-pledges-dod-led-plan-protect-vital-infrastructure-cyberattack\/133341\/\">NextGov<\/a>, stated\u00a0Trump would be\u00a0asking the Defense Department and the chairman of the Joint Chiefs of Staff to create a comprehensive plan to protect our nation&#8217;s\u00a0vital\u00a0infrastructure from cyberattacks, as well as other forms of attacks.<\/p>\n<h4>Collaboration With Private Sector?<\/h4>\n<p>Trump recently appointed Rudy Giuliani to assist with the cyber security efforts by serving as liaison to private industries on cyber security issues.<\/p>\n<p>In an interview with <a href=\"http:\/\/thehill.com\/policy\/cybersecurity\/313932-giuliani-says-hes-forming-cybersecurity-team-for-trump\">Fox News featured on The Hill<\/a>, Giuliani went into detail regarding his role as this liaison, as well as Trump&#8217;s overall concept to enhance our nation&#8217;s cyber security.\u00a0 Trump is wanting our nation&#8217;s corporate cyber security leaders, within the private sector, to come together in a joint effort to resolve our security threats.\u00a0 It is Trump and Giuliani&#8217;s belief that the solutions do exist; however, leaders within these private sectors are not properly collaborating.\u00a0 Therefore, it is Giuliani&#8217;s position as the liaison, to get these corporate leaders, and their technological people together to meet with Trump on an ongoing basis.\u00a0 This will allow for our government to be informed on what exists within the private sector, as well as provide a platform for collaboration between these various corporate\u00a0leaders.<\/p>\n<p>It is expected it will take less than three months for the first meeting between Trump and these corporate leaders to occur.<\/p>\n<p>This plan may sound familiar, because it is rather comparable to Obama&#8217;s <a href=\"https:\/\/obamawhitehouse.archives.gov\/the-press-office\/2016\/02\/09\/executive-order-commission-enhancing-national-cybersecurity\">Commission on Enhancing National Cybersecurity<\/a>.\u00a0 <a href=\"https:\/\/www.nist.gov\/sites\/default\/files\/documents\/2016\/12\/02\/cybersecurity-commission-report-final-post.pdf\">Here <\/a>is the Commission&#8217;s first report submitted to Obama in December of 2016.\u00a0 You may read Obama&#8217;s response to this report <a href=\"https:\/\/obamawhitehouse.archives.gov\/the-press-office\/2016\/12\/02\/statement-president-report-commission-enhancing-national-cybersecurity\">here<\/a>.<\/p>\n<h4>So Which Is It?<\/h4>\n<p>Although Trump could find another role within the cyber security realm for Giuliani, it would be surprising if they completely pitched the private sector idea.\u00a0 However, that does not mean Trump&#8217;s initial plans of increasing the Department of Defense&#8217;s role to include cyber security it out the window either.\u00a0 It is quite possible, both could occur.<\/p>\n<p>With today only being the third full day of Trump&#8217;s presidency, we will have to watch and see how this all plays out.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Update 1\/27\/2017: A draft of President Trump&#8217;s executive order on cyber security has been released.\u00a0 According to Washington Post, it reads as though it could have been written by the Obama administration.\u00a0\u00a0 You can read the draft of the executive order here.\u00a0 It is worth mentioning, in several areas of the order, one of the [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":56220,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[183],"tags":[5151,5152],"class_list":["post-56219","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips","tag-cyber-security-plan","tag-trump"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trump&#039;s Cyber Security Plan - Aren&#039;t We Already Doing This?<\/title>\n<meta name=\"description\" content=\"President Trump&#039;s cyber security plan is starting to come to light. Find out what his next steps are to increase our nation&#039;s cyber security...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trump&#039;s Cyber Security Plan - Aren&#039;t We Already Doing This?\" \/>\n<meta property=\"og:description\" content=\"President Trump&#039;s cyber security plan is starting to come to light. Find out what his next steps are to increase our nation&#039;s cyber security...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-23T16:56:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-27T16:18:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Trump-GiulianiThumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/trumps-cyber-security-plan-expect\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/trumps-cyber-security-plan-expect\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Trump&#8217;s Cyber Security Plan &#8211; Aren&#8217;t We Already Doing This?\",\"datePublished\":\"2017-01-23T16:56:12+00:00\",\"dateModified\":\"2017-01-27T16:18:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/trumps-cyber-security-plan-expect\\\/\"},\"wordCount\":548,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/trumps-cyber-security-plan-expect\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/Trump-GiulianiThumb.jpg\",\"keywords\":[\"cyber security plan\",\"Trump\"],\"articleSection\":[\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/trumps-cyber-security-plan-expect\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/trumps-cyber-security-plan-expect\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/trumps-cyber-security-plan-expect\\\/\",\"name\":\"Trump's Cyber Security Plan - Aren't We Already Doing This?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/trumps-cyber-security-plan-expect\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/trumps-cyber-security-plan-expect\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/Trump-GiulianiThumb.jpg\",\"datePublished\":\"2017-01-23T16:56:12+00:00\",\"dateModified\":\"2017-01-27T16:18:21+00:00\",\"description\":\"President Trump's cyber security plan is starting to come to light. Find out what his next steps are to increase our nation's cyber security...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/trumps-cyber-security-plan-expect\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/trumps-cyber-security-plan-expect\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/trumps-cyber-security-plan-expect\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/Trump-GiulianiThumb.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/Trump-GiulianiThumb.jpg\",\"width\":730,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/trumps-cyber-security-plan-expect\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trump&#8217;s Cyber Security Plan &#8211; Aren&#8217;t We Already Doing This?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trump's Cyber Security Plan - Aren't We Already Doing This?","description":"President Trump's cyber security plan is starting to come to light. Find out what his next steps are to increase our nation's cyber security...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/","og_locale":"en_US","og_type":"article","og_title":"Trump's Cyber Security Plan - Aren't We Already Doing This?","og_description":"President Trump's cyber security plan is starting to come to light. Find out what his next steps are to increase our nation's cyber security...","og_url":"https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-01-23T16:56:12+00:00","article_modified_time":"2017-01-27T16:18:21+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Trump-GiulianiThumb.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Trump&#8217;s Cyber Security Plan &#8211; Aren&#8217;t We Already Doing This?","datePublished":"2017-01-23T16:56:12+00:00","dateModified":"2017-01-27T16:18:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/"},"wordCount":548,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Trump-GiulianiThumb.jpg","keywords":["cyber security plan","Trump"],"articleSection":["tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/","url":"https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/","name":"Trump's Cyber Security Plan - Aren't We Already Doing This?","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Trump-GiulianiThumb.jpg","datePublished":"2017-01-23T16:56:12+00:00","dateModified":"2017-01-27T16:18:21+00:00","description":"President Trump's cyber security plan is starting to come to light. Find out what his next steps are to increase our nation's cyber security...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Trump-GiulianiThumb.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Trump-GiulianiThumb.jpg","width":730,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/trumps-cyber-security-plan-expect\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Trump&#8217;s Cyber Security Plan &#8211; Aren&#8217;t We Already Doing This?"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=56219"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56219\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/56220"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=56219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=56219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=56219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}