{"id":57092,"date":"2017-05-19T09:55:28","date_gmt":"2017-05-19T14:55:28","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=57092"},"modified":"2017-05-19T09:55:28","modified_gmt":"2017-05-19T14:55:28","slug":"healthcare-prone-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/","title":{"rendered":"Why is the Healthcare Industry More Prone to Cyber-attacks?"},"content":{"rendered":"<h4>Healthcare Industry &#8211; An Easy Target<\/h4>\n<p>Over the past few days, we\u2019ve seen a new ransomware called <a href=\"https:\/\/www.pcmatic.com\/blog\/tag\/wannacry\/\">WannaCry<\/a> or WannaCrypt wreak havoc across the globe, infecting hundreds of large corporations, such as FedEx, Telefonica, and Britain&#8217;s National Health Service (NHS). Though the ransomware continued to infect computers at a more subdued pace, many corporations are still struggling to recover from the attack.<\/p>\n<p>Security experts are advocating to immediately update computers and servers, to prevent the worm module in WannaCry from spreading across the networks, and infecting more machines. Applying the security update for <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms17-010.aspx\">MS17-010<\/a> is relatively painless for the majority of the corporations, with the exception of those in the healthcare industry. For example, some of the medical devices must remain connected to the manufacturer, making patching nearly impossible for the medical facility\u2019s IT department.<\/p>\n<p>Medical facilities and hospitals rely on computers which store data about patients, such as prior surgeries, medication, allergies, etc. When these systems become infected, the facility must assume a HIPPA breach, and has to resort to using \u201cpen and paper\u201d to provide care to their patients. In worst case scenarios, some facilities may be required to turn patients needing medical assistance away or risk having clinical mistakes. Multiple U.K. hospitals have reported that their radiology departments were completely knocked offline by the WannaCry ransomware outbreak. A hospital in Los Angeles, California, <a href=\"https:\/\/www.usatoday.com\/story\/news\/2016\/02\/17\/l-hospital-ceo-says-he-paid-17k-ransom-hackers\/80530752\/\">Hollywood Presbyterian Medical Center<\/a>, recently had to pay $17,000 to regain control over its network.<\/p>\n<h4>Not a Target &#8212; This Time<\/h4>\n<p>Although WannaCry did not specifically target the healthcare industry, the issue is that many of the computers are often outdated. \u00a0This is a direct result of the cost to certify medical devices being very expensive. This results in computers, often connected to the Internet, which are more vulnerable to attacks. Hackers realize that these computers are running older operating systems, such as Windows XP, and will target them to either lock down the computer until a ransom is paid, or to steal personally identifiable data (PII) from the servers to sell on the Dark Web.<\/p>\n<p>The rush to push out security patches to Windows-based medical devices has already started, but the window of infection for WannaCry is nearly gone. IT administrators are at the mercy of medical device manufacturers, such as <a href=\"https:\/\/www.bayer.com\">Bayer<\/a> and <a href=\"https:\/\/usa.healthcare.siemens.com\">Siemens<\/a>, to push patches to their vulnerable devices.<\/p>\n<p>There are a few things IT administrators should do while waiting for a patch to be deployed. IT administrators should be reviewing their security policies, to ensure they are doing everything they can to protect their networks. They need to put into place disaster recovery processes, which should include backing up critical data, testing the backups, assigning responsibility to personnel for backing up data and restoring systems, determining the projected downtime if systems were to be infected, and how the company would operate if forced offline.<strong> \u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Whitelist#Application_whitelists\">Application whitelisting<\/a> software, such as <a href=\"http:\/\/www.pcmatic.com\/pro\">PC Matic Pro<\/a>, should be installed on all Windows computers, including the medical devices. Application whitelisting utilizes a whitelist, instead of a blacklist, to allow or deny software from running. These products prevent malware from running on the computer, due to their \u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/Security_engineering#Security_stance\">default-deny<\/a>\u201d setting. If the application is not on the whitelist, it is unable to execute.<\/p>\n<p>The healthcare industry is one of the few industries, which without operational computers, is virtually dead. They cannot limp along such as schools or law enforcement agencies, in the event of a malware attack. Security measures must be put into place before another attack happens. As the recent<\/p>\n<p>WannaCry wave has shown, malware can negatively impacted human life.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Healthcare Industry &#8211; An Easy Target Over the past few days, we\u2019ve seen a new ransomware called WannaCry or WannaCrypt wreak havoc across the globe, infecting hundreds of large corporations, such as FedEx, Telefonica, and Britain&#8217;s National Health Service (NHS). Though the ransomware continued to infect computers at a more subdued pace, many corporations are [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55582,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4949,5000],"tags":[5261,4363,5252],"class_list":["post-57092","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","category-ransomwarewar","tag-healthcare","tag-ransomware","tag-wannacry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why is the Healthcare Industry More Prone to Cyber-attacks?<\/title>\n<meta name=\"description\" content=\"The healthcare industry is an easy target for cyber criminals. Find out what needs to be done to increase security measures for all healthcare facilities...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why is the Healthcare Industry More Prone to Cyber-attacks?\" \/>\n<meta property=\"og:description\" content=\"The healthcare industry is an easy target for cyber criminals. Find out what needs to be done to increase security measures for all healthcare facilities...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-19T14:55:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"740\" \/>\n\t<meta property=\"og:image:height\" content=\"416\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/healthcare-prone-cyberattacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/healthcare-prone-cyberattacks\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Why is the Healthcare Industry More Prone to Cyber-attacks?\",\"datePublished\":\"2017-05-19T14:55:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/healthcare-prone-cyberattacks\\\/\"},\"wordCount\":607,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/healthcare-prone-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomware-2.jpg\",\"keywords\":[\"healthcare\",\"ransomware\",\"WannaCry\"],\"articleSection\":[\"Ransomware\",\"RansomwareWar\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/healthcare-prone-cyberattacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/healthcare-prone-cyberattacks\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/healthcare-prone-cyberattacks\\\/\",\"name\":\"Why is the Healthcare Industry More Prone to Cyber-attacks?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/healthcare-prone-cyberattacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/healthcare-prone-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomware-2.jpg\",\"datePublished\":\"2017-05-19T14:55:28+00:00\",\"description\":\"The healthcare industry is an easy target for cyber criminals. Find out what needs to be done to increase security measures for all healthcare facilities...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/healthcare-prone-cyberattacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/healthcare-prone-cyberattacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/healthcare-prone-cyberattacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomware-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomware-2.jpg\",\"width\":740,\"height\":416,\"caption\":\"Ransomware Attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/healthcare-prone-cyberattacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why is the Healthcare Industry More Prone to Cyber-attacks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why is the Healthcare Industry More Prone to Cyber-attacks?","description":"The healthcare industry is an easy target for cyber criminals. Find out what needs to be done to increase security measures for all healthcare facilities...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"Why is the Healthcare Industry More Prone to Cyber-attacks?","og_description":"The healthcare industry is an easy target for cyber criminals. Find out what needs to be done to increase security measures for all healthcare facilities...","og_url":"https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-05-19T14:55:28+00:00","og_image":[{"width":740,"height":416,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Why is the Healthcare Industry More Prone to Cyber-attacks?","datePublished":"2017-05-19T14:55:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/"},"wordCount":607,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg","keywords":["healthcare","ransomware","WannaCry"],"articleSection":["Ransomware","RansomwareWar"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/","url":"https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/","name":"Why is the Healthcare Industry More Prone to Cyber-attacks?","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg","datePublished":"2017-05-19T14:55:28+00:00","description":"The healthcare industry is an easy target for cyber criminals. Find out what needs to be done to increase security measures for all healthcare facilities...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg","width":740,"height":416,"caption":"Ransomware Attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/healthcare-prone-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why is the Healthcare Industry More Prone to Cyber-attacks?"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=57092"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57092\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55582"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=57092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=57092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=57092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}