{"id":56602,"date":"2017-03-09T16:12:00","date_gmt":"2017-03-09T22:12:00","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=56602"},"modified":"2017-03-09T16:12:00","modified_gmt":"2017-03-09T22:12:00","slug":"phishing-attack-compromises-w-2s","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/","title":{"rendered":"Phishing Attack Compromised 1,600 School Employees&#8217; W-2s"},"content":{"rendered":"<h4>Connecticut Schools Hit Hard By Phishing Attacks<\/h4>\n<p>Glastonbury Public Schools in Connecticut was the recent victim of a phishing attack. \u00a0The phishing attack resulted in 1,600 W-2s being compromised. \u00a0The school district is uncertain who exactly had their information exposed. \u00a0However, they did<a href=\"http:\/\/www.necn.com\/news\/new-england\/Glastonbury-Schools-Phishing-Scandals-Impacts-1600-Workers-415374893.html\"> report <\/a>the food service personnel do not need to be concerned about their W-2s being breached, but all others could be vulnerable.<\/p>\n<p>This attack occurred just days after another Connecticut school district, Groton Public Schools was the victim of a phishing attack. \u00a0A hacker posed as the superintendent and asked for the employees to reply to the email and include their W-2. \u00a0\u00a0The attack method proved to be rather successful, as an estimated 1,300 employees sent the hacker the document requested. \u00a0According to <a href=\"http:\/\/fox61.com\/2017\/03\/02\/imposter-posed-as-superintendent-obtains-numerous-employees-w-2-forms-in-groton\/\">FOX 61<\/a>, the superintendents email account was not hacked, but the email came from a falsified email account that originated overseas.<\/p>\n<h4>Keep Your Information Secure<\/h4>\n<p>It is tax time, which also means it is tax scam time. \u00a0It is important you remain on your toes regarding bizarre requests for personal information. \u00a0This includes requests from people who may be your superiors. \u00a0To avoid being the next phishing victim PC Matic encourages users to:<\/p>\n<ul>\n<li>Look at the &#8220;Sent From&#8221; and &#8220;Reply To&#8221; address. \u00a0Although the email addresses look legitimate, verify it. \u00a0For instance if the email account is janedoe@fox.com but work email accounts are janedoe@fox1.com there is a discrepancy. \u00a0It may be minimal, and perhaps even overlooked, but it&#8217;s a red flag that says this is not legitimate.<\/li>\n<li>Watch for spelling or grammatical errors. \u00a0Often times these attacks originate overseas, and they rely on a translation software to translate their messages into English. \u00a0This often times results in spelling and grammatical errors.<\/li>\n<li>If it is not a normal request &#8212; question it. \u00a0But, when you do so, call the sender from the phone number you have on record for them, or speak to them directly. \u00a0Do not reply to the email or use the phone number listed because, if it is a malicious attack your response will go directly to the hacker.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Connecticut Schools Hit Hard By Phishing Attacks Glastonbury Public Schools in Connecticut was the recent victim of a phishing attack. \u00a0The phishing attack resulted in 1,600 W-2s being compromised. \u00a0The school district is uncertain who exactly had their information exposed. \u00a0However, they did report the food service personnel do not need to be concerned about [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":56197,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5090,183],"tags":[5041,5195],"class_list":["post-56602","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-slider","category-tips","tag-phishing-attack","tag-tax-scam"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing Attack Compromised 1,600 School Employees&#039; W-2s<\/title>\n<meta name=\"description\" content=\"Glastonbury Public Schools in Connecticut was a the recent victim of a phishing attack. \u00a0The phishing attack resulted in 1,600 employees&#039; W-2s...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing Attack Compromised 1,600 School Employees&#039; W-2s\" \/>\n<meta property=\"og:description\" content=\"Glastonbury Public Schools in Connecticut was a the recent victim of a phishing attack. \u00a0The phishing attack resulted in 1,600 employees&#039; W-2s...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-09T22:12:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/phishingSlider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/phishing-attack-compromises-w-2s\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/phishing-attack-compromises-w-2s\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Phishing Attack Compromised 1,600 School Employees&#8217; W-2s\",\"datePublished\":\"2017-03-09T22:12:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/phishing-attack-compromises-w-2s\\\/\"},\"wordCount\":358,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/phishing-attack-compromises-w-2s\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/phishingSlider.jpg\",\"keywords\":[\"phishing attack\",\"tax scam\"],\"articleSection\":[\"TechTalk Slider\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/phishing-attack-compromises-w-2s\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/phishing-attack-compromises-w-2s\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/phishing-attack-compromises-w-2s\\\/\",\"name\":\"Phishing Attack Compromised 1,600 School Employees' W-2s\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/phishing-attack-compromises-w-2s\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/phishing-attack-compromises-w-2s\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/phishingSlider.jpg\",\"datePublished\":\"2017-03-09T22:12:00+00:00\",\"description\":\"Glastonbury Public Schools in Connecticut was a the recent victim of a phishing attack. \u00a0The phishing attack resulted in 1,600 employees' W-2s...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/phishing-attack-compromises-w-2s\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/phishing-attack-compromises-w-2s\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/phishing-attack-compromises-w-2s\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/phishingSlider.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/phishingSlider.jpg\",\"width\":1920,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/phishing-attack-compromises-w-2s\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing Attack Compromised 1,600 School Employees&#8217; W-2s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing Attack Compromised 1,600 School Employees' W-2s","description":"Glastonbury Public Schools in Connecticut was a the recent victim of a phishing attack. \u00a0The phishing attack resulted in 1,600 employees' W-2s...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/","og_locale":"en_US","og_type":"article","og_title":"Phishing Attack Compromised 1,600 School Employees' W-2s","og_description":"Glastonbury Public Schools in Connecticut was a the recent victim of a phishing attack. \u00a0The phishing attack resulted in 1,600 employees' W-2s...","og_url":"https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-03-09T22:12:00+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/phishingSlider.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Phishing Attack Compromised 1,600 School Employees&#8217; W-2s","datePublished":"2017-03-09T22:12:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/"},"wordCount":358,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/phishingSlider.jpg","keywords":["phishing attack","tax scam"],"articleSection":["TechTalk Slider","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/","url":"https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/","name":"Phishing Attack Compromised 1,600 School Employees' W-2s","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/phishingSlider.jpg","datePublished":"2017-03-09T22:12:00+00:00","description":"Glastonbury Public Schools in Connecticut was a the recent victim of a phishing attack. \u00a0The phishing attack resulted in 1,600 employees' W-2s...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/phishingSlider.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/phishingSlider.jpg","width":1920,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/phishing-attack-compromises-w-2s\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Phishing Attack Compromised 1,600 School Employees&#8217; W-2s"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=56602"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/56602\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/56197"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=56602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=56602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=56602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}