{"id":57202,"date":"2017-06-08T14:55:34","date_gmt":"2017-06-08T19:55:34","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=57202"},"modified":"2017-06-08T14:55:34","modified_gmt":"2017-06-08T19:55:34","slug":"top-10-ransomware-myths","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/","title":{"rendered":"The Top 10 Ransomware Myths Busted"},"content":{"rendered":"<p>Ransomware has become a popular topic over the last month. \u00a0The increased awareness to this growing cyber threat can likely be attributed to the WannaCry ransomware attack that hit worldwide in mid-May. \u00a0However, there are still several misconceptions regarding this form of malware.<\/p>\n<h4>Top 10 Ransomware Myths<\/h4>\n<ol>\n<li><strong>Ransomware is just a virus.<\/strong> <span style=\"color: #bf0708; font-weight: bold;\">False<\/span> &#8211; Ransomware is a form of malware. \u00a0However, unlike viruses, ransomware will lock your files and hold them for ransom.<\/li>\n<li><strong>If I pay the ransom demands I&#8217;m guaranteed my files back.<\/strong> \u00a0<span style=\"color: #bf0708; font-weight: bold;\">False<\/span> &#8211; There is a payment demand associated with ransomware, which states if you pay, you will get your files back. \u00a0However, you&#8217;re relying on cyber criminals to release your files. \u00a0There is no guarantee they will indeed provide you with the key to unlock your data.<\/li>\n<li><strong>I have to click on something to be infected.<\/strong> \u00a0<span style=\"color: #bf0708; font-weight: bold;\">False<\/span> &#8211; Ransomware can be installed on your PC by software vulnerabilies, meaning you don&#8217;t have to click or download anything for it to worm its way in.<\/li>\n<li><strong>If I stay away from shady sites, I will be fine.<\/strong> \u00a0<span style=\"color: #bf0708; font-weight: bold;\">False<\/span> &#8211; There are multiple ways\u00a0cyber criminals can distribute ransomware including: compromising legitimate websites, exploit software vulnerabilites and malicious emails. \u00a0Additionally, third-party advertisers could distribute the infection.<\/li>\n<li><strong>Ransomware targets only large businesses.<\/strong> \u00a0<span style=\"color: #bf0708; font-weight: bold;\">False<\/span> &#8211; Although businesses are a big target, not always are they large. \u00a0Small and medium businesses, as well as home users, typically do not have the IT expertise as large enterprises, making them too, a prime target.<\/li>\n<li><strong>No anti-virus (AV) software can block ransomware.<\/strong> \u00a0<span style=\"color: #bf0708; font-weight: bold;\">False<\/span> &#8211; Many AV programs are unable to identify new forms of ransomware because they haven&#8217;t been identified yet. \u00a0However, if users implement a security solution that uses application whitelisting as it&#8217;s primary method of detection, they will be far more secure than traditional AV users. \u00a0Application whitelisting only allows trusted applications to run. \u00a0Regardless of how new the ransomware is, it will never be a trusted program &#8212; thus, keeping users and their data secure.<\/li>\n<li><strong>Ransomware infects people only through malicious emails, known as a phishing attack.<\/strong> \u00a0<span style=\"color: #bf0708; font-weight: bold;\">False<\/span> &#8211; Although phishing attacks are a popular method of ransomware distribution, they are not the sole method.<\/li>\n<li><strong>I can spot a fake email or ad a mile away &#8212; my data is safe.<\/strong> \u00a0<span style=\"color: #bf0708; font-weight: bold;\">False<\/span> &#8211; The emails that are being used can be quite advanced. \u00a0Sometimes they look like they&#8217;re from a friend, co-worker, even your boss. \u00a0Other times, they look like they are from a large business such as Amazon or the USPS.<\/li>\n<li><strong>If I backup my data, I can&#8217;t lose it &#8212; even if a ransomware attack hits me. \u00a0<\/strong> <span style=\"color: #bf0708; font-weight: bold;\">False<\/span> &#8211; Although backups can be helpful when retrieving data after a ransomware attack, it is not a silver bullet. \u00a0At times, the ransomware can encrypt your backup data too. \u00a0Or, businesses find it too cumbersome to retrieve files this way, leading to them paying the ransom in hopes of a decryption key.<\/li>\n<li><strong>Cyber criminals aren&#8217;t going to target me &#8212; I&#8217;m nobody compared to large enterprise targets!<\/strong> \u00a0<span style=\"color: #bf0708; font-weight: bold;\">False<\/span> &#8211; Money is money, big and small. \u00a0The goal of these cyber criminals is to exploit as many users as possible as fast as possible, in hopes to collect as much money as they can. \u00a0Often times they will cast as large of net as possible, hoping for a big return.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware has become a popular topic over the last month. \u00a0The increased awareness to this growing cyber threat can likely be attributed to the WannaCry ransomware attack that hit worldwide in mid-May. \u00a0However, there are still several misconceptions regarding this form of malware. Top 10 Ransomware Myths Ransomware is just a virus. False &#8211; Ransomware [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55140,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4949,5000,5090,183],"tags":[4363,5278],"class_list":["post-57202","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","category-ransomwarewar","category-slider","category-tips","tag-ransomware","tag-ransomware-myths"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Top 10 Ransomware Myths Busted<\/title>\n<meta name=\"description\" content=\"Ransomware took the world by storm last month, yet misconceptions remain. Lets clear up the confusion -- find out the top 10 ransomware myths now...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Top 10 Ransomware Myths Busted\" \/>\n<meta property=\"og:description\" content=\"Ransomware took the world by storm last month, yet misconceptions remain. Lets clear up the confusion -- find out the top 10 ransomware myths now...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-08T19:55:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-ransomware-myths\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-ransomware-myths\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"The Top 10 Ransomware Myths Busted\",\"datePublished\":\"2017-06-08T19:55:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-ransomware-myths\\\/\"},\"wordCount\":570,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-ransomware-myths\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareScreen.jpg\",\"keywords\":[\"ransomware\",\"ransomware myths\"],\"articleSection\":[\"Ransomware\",\"RansomwareWar\",\"TechTalk Slider\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-ransomware-myths\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-ransomware-myths\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-ransomware-myths\\\/\",\"name\":\"The Top 10 Ransomware Myths Busted\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-ransomware-myths\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-ransomware-myths\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareScreen.jpg\",\"datePublished\":\"2017-06-08T19:55:34+00:00\",\"description\":\"Ransomware took the world by storm last month, yet misconceptions remain. Lets clear up the confusion -- find out the top 10 ransomware myths now...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-ransomware-myths\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-ransomware-myths\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-ransomware-myths\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareScreen.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareScreen.jpg\",\"width\":1920,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-ransomware-myths\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Top 10 Ransomware Myths Busted\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Top 10 Ransomware Myths Busted","description":"Ransomware took the world by storm last month, yet misconceptions remain. Lets clear up the confusion -- find out the top 10 ransomware myths now...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/","og_locale":"en_US","og_type":"article","og_title":"The Top 10 Ransomware Myths Busted","og_description":"Ransomware took the world by storm last month, yet misconceptions remain. Lets clear up the confusion -- find out the top 10 ransomware myths now...","og_url":"https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-06-08T19:55:34+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"The Top 10 Ransomware Myths Busted","datePublished":"2017-06-08T19:55:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/"},"wordCount":570,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg","keywords":["ransomware","ransomware myths"],"articleSection":["Ransomware","RansomwareWar","TechTalk Slider","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/","url":"https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/","name":"The Top 10 Ransomware Myths Busted","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg","datePublished":"2017-06-08T19:55:34+00:00","description":"Ransomware took the world by storm last month, yet misconceptions remain. Lets clear up the confusion -- find out the top 10 ransomware myths now...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg","width":1920,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/top-10-ransomware-myths\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Top 10 Ransomware Myths Busted"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=57202"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57202\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55140"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=57202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=57202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=57202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}