{"id":56383,"date":"2017-02-08T12:39:55","date_gmt":"2017-02-08T18:39:55","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=56383"},"modified":"2017-02-08T12:39:55","modified_gmt":"2017-02-08T18:39:55","slug":"information-hacked","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/information-hacked\/","title":{"rendered":"Has Your Information Been Hacked?"},"content":{"rendered":"<p>There always seems to be a new breach or security gap being reported.\u00a0 Most recently, Fox News confirmed\u00a0<a href=\"http:\/\/www.foxnews.com\/travel\/2017\/02\/07\/intercontinental-confirms-credit-card-breach-at-12-hotels.html\">12 hotels experienced a credit card breach<\/a>.\u00a0 Other breaches include leaked passwords, usernames, and email addresses.\u00a0 But how does this impact you?<\/p>\n<h4>Companies Hacked &#8211; Were You Impacted?<\/h4>\n<p>It depends on the breach.\u00a0 If your credit card information was breached, many times the company who was in possession of the payment information will offer a free credit monitoring service, so victims are able to adequately monitor their credit.\u00a0 This will help identify any credit card fraud as early as possible.<\/p>\n<p>To complicate things, when usernames or email addresses\u00a0are stolen, it may impact multiple accounts &#8212; not only the breached one.\u00a0 For instance if you use the same username or email address to access multiple accounts.\u00a0 This leaked data could prove to be quite useful for a hacker.\u00a0 For\u00a0example,\u00a0the\u00a0email address I use for my LinkedIn account, may be the same as what I use for my Amazon and Google Drive accounts.\u00a0 This same logic applies for usernames.\u00a0\u00a0Now\u00a0lets\u00a0consider if your password was stolen too.\u00a0 Now the hackers have access to countless accounts, because several\u00a0people use the same password for\u00a0multiple, if not all, of their password requirements.\u00a0 So the breach of Company A, now impacts your security for accounts with\u00a0Company B, C, D and E.<\/p>\n<h4>Doing Your Part<\/h4>\n<p>So how do you avoid breached information?\u00a0 Honestly, there is little you can do once your information is provided\u00a0to various organizations.\u00a0 Essentially, it is up to the company to keep that information secure.\u00a0 However, since we have to provide usernames, email addresses, passwords and payment information (when necessary for a transaction), here are a\u00a0few tips you can implement to decrease the impact of a breach:<\/p>\n<ol>\n<li>Create a &#8220;junk&#8221; email address to use.\u00a0 You create it like any other email address you have, but use it only for certain accounts.\u00a0 For example, you could create an email address of johndoe1234@fakeemail.com and use it for your social media accounts, or even all of the websites that request an email address while your browsing their website.\u00a0 That way, this email address is not tied to any pertinent accounts, such as your bank or credit card websites.<\/li>\n<li>Stop using the same password for multiple accounts.\u00a0 We all know you&#8217;re still doing it.\u00a0 To be honest, I am too.\u00a0 The madness has to stop!!!\u00a0 Believe me,\u00a0I&#8217;m just as disgusted with the idea of\u00a0remembering 47 different passwords, with capital and symbol icons mixed in.\u00a0 However, there are ways to keep your passwords safe, and accessible.\u00a0\u00a0One of these tools is a\u00a0password manager.\u00a0 Don&#8217;t know which to use?\u00a0 PC Mag recently <a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2407168,00.asp\">review the best password managers <\/a>of 2017 &#8212; <a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2407168,00.asp\">here <\/a>are their results.<\/li>\n<li>Don&#8217;t use the same username to login to multiple accounts.<\/li>\n<li>When using your credit card information online be sure you&#8217;re using a secure internet connection &#8212; NOT public WiFi.\u00a0 Also, confirm the website is secure (https:\/\/).<\/li>\n<\/ol>\n<h4>How Do You\u00a0 Know If Your Data Was Leaked?<\/h4>\n<p>Don&#8217;t know if your information has been hacked?\u00a0 You can go to this website: <a href=\"https:\/\/haveibeenpwned.com\/\">https:\/\/haveibeenpwned.com\/ <\/a>and find out if your email is still secure or if it has been breached.<\/p>\n<p>Also, keep a close eye on credit card statements.\u00a0\u00a0There have been a handful of times that\u00a0I&#8217;ve seen a $1.00 transaction from an unknown business on my statement.\u00a0 Although it&#8217;s just a buck &#8212; I dispute it every time.\u00a0 Perhaps I&#8217;m jaded from constantly reading and writing about scams, but I always think its a scammer waiting to see if it will go through, and if it does &#8212; BAM lets charge $3,000 worth of stuff!! Not on my watch, buddy, not on my watch!<\/p>\n<p>Lastly, the company should notify you if your information has been hacked.\u00a0 This however, typically does not occur in a timely manner.\u00a0 So again, stay on your toes!\u00a0 Keeping an eye out fraudulent transactions, emails you didn&#8217;t send, or access to accounts from different IP addresses.\u00a0 Many accounts will send you an email stating an account has been accessed from an IP address near a specific town\/city.\u00a0 If this was not you, or an authorized party, change your login credentials for this account.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There always seems to be a new breach or security gap being reported.\u00a0 Most recently, Fox News confirmed\u00a012 hotels experienced a credit card breach.\u00a0 Other breaches include leaked passwords, usernames, and email addresses.\u00a0 But how does this impact you? Companies Hacked &#8211; Were You Impacted? It depends on the breach.\u00a0 If your credit card information [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55212,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[183],"tags":[4934,4695],"class_list":["post-56383","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips","tag-breach","tag-hacked"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Has Your Information Been Hacked?<\/title>\n<meta name=\"description\" content=\"There always seems to be a new report of a company being hacked. Find out how these breaches may impact you and steps you need to take to...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/information-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Has Your Information Been Hacked?\" \/>\n<meta property=\"og:description\" content=\"There always seems to be a new report of a company being hacked. Find out how these breaches may impact you and steps you need to take to...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/information-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-08T18:39:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/information-hacked\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/information-hacked\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Has Your Information Been Hacked?\",\"datePublished\":\"2017-02-08T18:39:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/information-hacked\\\/\"},\"wordCount\":723,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/information-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG2.jpg\",\"keywords\":[\"breach\",\"hacked\"],\"articleSection\":[\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/information-hacked\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/information-hacked\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/information-hacked\\\/\",\"name\":\"Has Your Information Been Hacked?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/information-hacked\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/information-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG2.jpg\",\"datePublished\":\"2017-02-08T18:39:55+00:00\",\"description\":\"There always seems to be a new report of a company being hacked. Find out how these breaches may impact you and steps you need to take to...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/information-hacked\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/information-hacked\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/information-hacked\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG2.jpg\",\"width\":730,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/information-hacked\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Has Your Information Been Hacked?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Has Your Information Been Hacked?","description":"There always seems to be a new report of a company being hacked. Find out how these breaches may impact you and steps you need to take to...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/information-hacked\/","og_locale":"en_US","og_type":"article","og_title":"Has Your Information Been Hacked?","og_description":"There always seems to be a new report of a company being hacked. Find out how these breaches may impact you and steps you need to take to...","og_url":"https:\/\/www.pcmatic.com\/blog\/information-hacked\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-02-08T18:39:55+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG2.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/information-hacked\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/information-hacked\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Has Your Information Been Hacked?","datePublished":"2017-02-08T18:39:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/information-hacked\/"},"wordCount":723,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/information-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG2.jpg","keywords":["breach","hacked"],"articleSection":["tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/information-hacked\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/information-hacked\/","url":"https:\/\/www.pcmatic.com\/blog\/information-hacked\/","name":"Has Your Information Been Hacked?","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/information-hacked\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/information-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG2.jpg","datePublished":"2017-02-08T18:39:55+00:00","description":"There always seems to be a new report of a company being hacked. Find out how these breaches may impact you and steps you need to take to...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/information-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/information-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/information-hacked\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG2.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG2.jpg","width":730,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/information-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Has Your Information Been Hacked?"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=56383"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56383\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55212"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=56383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=56383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=56383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}