{"id":56280,"date":"2017-01-31T09:49:08","date_gmt":"2017-01-31T15:49:08","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=56280"},"modified":"2021-09-30T19:12:15","modified_gmt":"2021-10-01T00:12:15","slug":"application-whitelisting-cuts-cyber-crime","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/","title":{"rendered":"Application Whitelisting Cuts Cyber Crime by 85%"},"content":{"rendered":"<h4>Whitelisting Cuts Targeted Malware Attack Success Rates By 85%<\/h4>\n<p>According to a report generated by <a href=\"http:\/\/www.technologydecisions.com.au\/content\/gov-tech-review\/white-paper\/how-application-whitelisting-can-diminish-cybercrime-346606276#axzz4XLhbEpQ3\">Cylance<\/a>, the Australian government believes cyber crime can be cut by 85% with the implementation of <a href=\"http:\/\/www.pcmatic.com\/pro\/whitelist\">application whitelisting<\/a>.\u00a0 The report <a href=\"http:\/\/www.technologydecisions.com.au\/content\/gov-tech-review\/white-paper\/how-application-whitelisting-can-diminish-cybercrime-346606276#axzz4XLhbEpQ3\">states<\/a>,<\/p>\n<blockquote><p>&#8220;The Australian Signals Directorate has identified application whitelisting as the most effective strategy in its Strategies to Mitigate Targeted Cyber Intrusions.\u00a0 The intelligence agency, which operates as part of the Australian government, has reported that application whitelisting and the right combination of patch and administration privilege restrictions can prevent at least 85% of targeted cyber intrusions.&#8221;<\/p><\/blockquote>\n<p>Application whitelisting is the technology that is being widely adopted in various different security entities, including the <a href=\"https:\/\/techtalk.pcpitstop.com\/2017\/01\/05\/department-of-homeland-security-lists-whitelisting-as-a-top-strategy\/\">Department of Homeland Security, FBI<\/a> and <a href=\"https:\/\/techtalk.pcpitstop.com\/2016\/09\/07\/nsa-best-practices-whitelisting\/\">NSA<\/a>.\u00a0 The actual technology functions as a list of all known trusted applications and programs.\u00a0 If the application is not on the whitelist, it will not execute.<\/p>\n<h4>Application Whitelisting and The Door Man<\/h4>\n<p>Think of the whitelist as a door man to an exclusive event.\u00a0 If you&#8217;re not on &#8220;the list&#8221; then you&#8217;re not getting in.\u00a0\u00a0But what about exceptions?\u00a0 There is always an exception, right?\u00a0 Of course.\u00a0 Maybe you&#8217;re really supposed to be on the list, but you&#8217;re not.\u00a0 At that point, the appropriate personnel is contacted and a decision is made.\u00a0 This also occurs on with application whitelisting.\u00a0 If\u00a0you try to execute and program that has not been whitelisted, it will be deemed as &#8220;unknown&#8221;, and will not execute.\u00a0 Perhaps\u00a0you know this program is safe, but the whitelist does not.\u00a0 In such an instance, the appropriate personnel or team is notified and they will determine if the program should be whitelisted.<\/p>\n<h4>Too Much Work?<\/h4>\n<p>This is a critical, and often criticized part of <a href=\"http:\/\/www.pcmatic.com\/pro\/whitelist\">application whitelisting<\/a>.\u00a0 Due to the approval process, there are concerns with the increased workload for IT administrators, as well as the decreased productivity of employees while waiting for their program to be approved.\u00a0 Cylance <a href=\"http:\/\/www.technologydecisions.com.au\/content\/gov-tech-review\/white-paper\/how-application-whitelisting-can-diminish-cybercrime-346606276#axzz4XLhbEpQ3\">states<\/a>,<\/p>\n<blockquote><p><span style=\"color: #000000; font-family: Calibri; font-size: small;\"><span style=\"color: #333333; font-family: Georgia; font-size: medium;\">&#8220;Admins are not malware analysts, so burdening them with making decisions about what applications should run can greatly increase their workload.\u00a0 With a default-deny policy, work can be blocked until an admin makes a decision on a suspect application, slowing efficiency.\u00a0 To make matters worse, administrators are prone to make mistakes when under time pressure.&#8221;<\/span><\/span><\/p><\/blockquote>\n<p>What if this problem was resolved?\u00a0 What if an &#8220;unknown&#8221; file was sent to a third-party malware research team, and they determined its security for you, completely removing the burden from the IT admin team?\u00a0 Sounds pretty perfect, right?<\/p>\n<h4>PC Matic Pro<\/h4>\n<p><a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504632\">PC Matic Pro<\/a> offers application whitelisting as their primary method for preventative malware detection.\u00a0 In the case of an &#8220;unknown&#8221; file, the file is sent to PC Matic Pro&#8217;s malware research team to be tested and categorized as either trusted or malicious within 24 hours.\u00a0 If access to the program is urgent, and the user is confident it is a safe program, they can manually add the program to their whitelist.\u00a0 This however, is not encouraged, because it has not been tested and deemed safe.<\/p>\n<p><a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504632\">PC Matic Pro<\/a> also offers patch management services.\u00a0 According to <a href=\"http:\/\/www.technologydecisions.com.au\/content\/gov-tech-review\/white-paper\/how-application-whitelisting-can-diminish-cybercrime-346606276#axzz4XLhbEpQ3\">Cylance<\/a>, this is also a critical piece to preventing 85% of targeted malware attacks.<\/p>\n<p>Read more about preventing ransomware and malware threats with PC Matic Pro <a title=\"Application Whitelisting for Business\" href=\"https:\/\/www.pcmatic.com\/pro\/whitelisting.asp\">Business Application Whitelisting<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whitelisting Cuts Targeted Malware Attack Success Rates By 85% According to a report generated by Cylance, the Australian government believes cyber crime can be cut by 85% with the implementation of application whitelisting.\u00a0 The report states, &#8220;The Australian Signals Directorate has identified application whitelisting as the most effective strategy in its Strategies to Mitigate Targeted [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55269,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4987,5090,4959],"tags":[4989],"class_list":["post-56280","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-spiceworks","category-slider","category-whitelisting","tag-application-whitelisting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Application Whitelisting Cuts Cyber Crime by 85%<\/title>\n<meta name=\"description\" content=\"According to a recent report by Cylance, application whitelisting combined with patch management and proper admin rights can cut malware attacks by 85%...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Application Whitelisting Cuts Cyber Crime by 85%\" \/>\n<meta property=\"og:description\" content=\"According to a recent report by Cylance, application whitelisting combined with patch management and proper admin rights can cut malware attacks by 85%...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-31T15:49:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-01T00:12:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-cuts-cyber-crime\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-cuts-cyber-crime\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Application Whitelisting Cuts Cyber Crime by 85%\",\"datePublished\":\"2017-01-31T15:49:08+00:00\",\"dateModified\":\"2021-10-01T00:12:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-cuts-cyber-crime\\\/\"},\"wordCount\":544,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-cuts-cyber-crime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"keywords\":[\"application whitelisting\"],\"articleSection\":[\"SpiceWorks\",\"TechTalk Slider\",\"Whitelisting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-cuts-cyber-crime\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-cuts-cyber-crime\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-cuts-cyber-crime\\\/\",\"name\":\"Application Whitelisting Cuts Cyber Crime by 85%\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-cuts-cyber-crime\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-cuts-cyber-crime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"datePublished\":\"2017-01-31T15:49:08+00:00\",\"dateModified\":\"2021-10-01T00:12:15+00:00\",\"description\":\"According to a recent report by Cylance, application whitelisting combined with patch management and proper admin rights can cut malware attacks by 85%...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-cuts-cyber-crime\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-cuts-cyber-crime\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-cuts-cyber-crime\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"width\":1920,\"height\":550,\"caption\":\"Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-cuts-cyber-crime\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Application Whitelisting Cuts Cyber Crime by 85%\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Application Whitelisting Cuts Cyber Crime by 85%","description":"According to a recent report by Cylance, application whitelisting combined with patch management and proper admin rights can cut malware attacks by 85%...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/","og_locale":"en_US","og_type":"article","og_title":"Application Whitelisting Cuts Cyber Crime by 85%","og_description":"According to a recent report by Cylance, application whitelisting combined with patch management and proper admin rights can cut malware attacks by 85%...","og_url":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-01-31T15:49:08+00:00","article_modified_time":"2021-10-01T00:12:15+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Application Whitelisting Cuts Cyber Crime by 85%","datePublished":"2017-01-31T15:49:08+00:00","dateModified":"2021-10-01T00:12:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/"},"wordCount":544,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","keywords":["application whitelisting"],"articleSection":["SpiceWorks","TechTalk Slider","Whitelisting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/","url":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/","name":"Application Whitelisting Cuts Cyber Crime by 85%","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","datePublished":"2017-01-31T15:49:08+00:00","dateModified":"2021-10-01T00:12:15+00:00","description":"According to a recent report by Cylance, application whitelisting combined with patch management and proper admin rights can cut malware attacks by 85%...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","width":1920,"height":550,"caption":"Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-cuts-cyber-crime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Application Whitelisting Cuts Cyber Crime by 85%"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=56280"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56280\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55269"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=56280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=56280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=56280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}