{"id":57630,"date":"2021-08-09T16:53:00","date_gmt":"2021-08-09T21:53:00","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=57630"},"modified":"2022-01-03T16:07:11","modified_gmt":"2022-01-03T22:07:11","slug":"application-whitelisting-extreme","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/","title":{"rendered":"Application Whitelisting &#8212; Is it too extreme?"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Whitelisting &#8211; Is it worth the work?<\/h3>\n\n\n\n<p>Recently, <a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/uptick-in-malware-targets-the-banking-community\/a\/d-id\/1329541\">Information Week<\/a> reported application whitelisting as an &#8220;extreme&#8221; method for preventing malware. \u00a0Is it extreme? \u00a0It very well could be. \u00a0Application whitelisting goes against the very core of traditional security programs. \u00a0<\/p>\n\n\n\n<p>Instead of using a blacklist, which <strong>allows<\/strong> unknown files to execute until they prove to be <strong>malicious<\/strong>, a <a title=\"Application Whitelist\" href=\"https:\/\/www.pcmatic.com\/whitelist\/\">whitelist<\/a> will block all unknown programs from executing until they prove to be <strong>safe<\/strong>. This is where the &#8220;extreme&#8221; term, may be valid as <em>extremely s<\/em>ecure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Extreme Protection for Extreme Cyber Threats<\/h3>\n\n\n\n<p>While using a <a title=\"Whitelisting Security Solutions\" href=\"https:\/\/www.pcmatic.com\/whitelist\/application-whitelisting.asp\">whitelist security solution<\/a>, all unknown programs are blocked from running. In order for the program to run, it must first be tested and categorized as either safe or malicious. \u00a0This responsibility may fall on an IT department or if you&#8217;re lucky &#8212; the security program will take care of it. \u00a0<\/p>\n\n\n\n<p>Regardless, it could be a major responsibility for either party if the whitelist is not already developed, and blocks several programs because they haven&#8217;t been proven safe yet. These two factors determine the complexity of implementing such a security program. With the cost of <a title=\"Best Ransomware Attack Protection\" href=\"https:\/\/www.pcmatic.com\/ransomware\/\">ransomware attacks<\/a> rising, the additional work to protect endpoints and networks may be worth it.<\/p>\n\n\n\n<p>Fortunately, there are <a title=\"Computer Security Software\" href=\"https:\/\/www.pcmatic.com\/pro\/\">computer security software<\/a> products that have been using the whitelist approach for years. \u00a0Therefore, their whitelist is far more mature than others who are just now jumping on the whitelist bandwagon. \u00a0If users choose a <a title=\"Compare Software Security Products\" href=\"https:\/\/www.pcmatic.com\/pro\/compare-security-software.asp\">security software program<\/a> with a robust, global whitelist, the workload will be decreases significantly. \u00a0<\/p>\n\n\n\n<p>If users choose a security program that conducts all of the malware testing themselves, instead of leaving a burden on a company&#8217;s IT department, the workload drops even more! <\/p>\n\n\n\n<p>PC Matic has been working on application whitelisting for well over a decade, and conducts its own malware research. IT administrators and MSPs simply install PC Matic, and have complete control over the whitelist from a single dashboard.<\/p>\n\n\n\n<p>Most importantly, PC Matic&#8217;s whitelisting solutions prevent malware and ransomware attacks. If a program is not on the whitelist, it can not execute. This keeps devices, endpoints and servers safe. Learn more about comprehensive <a title=\"Network Security\" href=\"https:\/\/www.pcmatic.com\/pro\/network-security.asp\">Network Security<\/a>, robust <a title=\"Server Security\" href=\"https:\/\/www.pcmatic.com\/pro\/server-security.asp\">Server Security<\/a> and <a title=\"Endpoint Protection\" href=\"https:\/\/www.pcmatic.com\/pro\/endpoint-security.asp\">Endpoint Security<\/a> solutions.  <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Unknowns of Security Software<\/h3>\n\n\n\n<p>Does the work it takes to progress from an ineffective security program to one that uses a whitelist approach outweigh the benefits? \u00a0No. \u00a0Not even close. \u00a0Choose a program that has been using a whitelist approach for years, and will be responsible for the whitelisting and program testing. PC Matic&#8217;s AWL solution will leave you with no more of a workload than your current security solution, but with far better protection.<\/p>\n\n\n\n<p>Visit PCmatic.com for more <a title=\"Business Cybersecurity Software\" href=\"https:\/\/www.pcmatic.com\/pro\/\">business cybersecurity software<\/a> information. For business IT departments that need a full EPP security suite, PC Matic offers a complete endpoint protection suite. Learn more at <a title=\"Best Endpoint Protection for Business\" href=\"https:\/\/www.pcmatic.com\/pro\/endpoint-protection-suite.asp\">Best Endpoint Protection for Business<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whitelisting &#8211; Is it worth the work? Recently, Information Week reported application whitelisting as an &#8220;extreme&#8221; method for preventing malware. \u00a0Is it extreme? \u00a0It very well could be. \u00a0Application whitelisting goes against the very core of traditional security programs. \u00a0 Instead of using a blacklist, which allows unknown files to execute until they prove to [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55269,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6217],"tags":[4989,4354],"class_list":["post-57630","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-security","tag-application-whitelisting","tag-whitelisting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Application Whitelisting -- Is it too extreme?<\/title>\n<meta name=\"description\" content=\"Extreme cyber security threats need an extreme security solution. Application whitelisting has been deemed as one of the most...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Application Whitelisting -- Is it too extreme?\" \/>\n<meta property=\"og:description\" content=\"Extreme cyber security threats need an extreme security solution. Application whitelisting has been deemed as one of the most...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-09T21:53:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-03T22:07:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-extreme\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-extreme\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Application Whitelisting &#8212; Is it too extreme?\",\"datePublished\":\"2021-08-09T21:53:00+00:00\",\"dateModified\":\"2022-01-03T22:07:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-extreme\\\/\"},\"wordCount\":487,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-extreme\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"keywords\":[\"application whitelisting\",\"whitelisting\"],\"articleSection\":[\"Business Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-extreme\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-extreme\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-extreme\\\/\",\"name\":\"Application Whitelisting -- Is it too extreme?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-extreme\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-extreme\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"datePublished\":\"2021-08-09T21:53:00+00:00\",\"dateModified\":\"2022-01-03T22:07:11+00:00\",\"description\":\"Extreme cyber security threats need an extreme security solution. Application whitelisting has been deemed as one of the most...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-extreme\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-extreme\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-extreme\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"width\":1920,\"height\":550,\"caption\":\"Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/application-whitelisting-extreme\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Application Whitelisting &#8212; Is it too extreme?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Application Whitelisting -- Is it too extreme?","description":"Extreme cyber security threats need an extreme security solution. Application whitelisting has been deemed as one of the most...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/","og_locale":"en_US","og_type":"article","og_title":"Application Whitelisting -- Is it too extreme?","og_description":"Extreme cyber security threats need an extreme security solution. Application whitelisting has been deemed as one of the most...","og_url":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2021-08-09T21:53:00+00:00","article_modified_time":"2022-01-03T22:07:11+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Application Whitelisting &#8212; Is it too extreme?","datePublished":"2021-08-09T21:53:00+00:00","dateModified":"2022-01-03T22:07:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/"},"wordCount":487,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","keywords":["application whitelisting","whitelisting"],"articleSection":["Business Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/","url":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/","name":"Application Whitelisting -- Is it too extreme?","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","datePublished":"2021-08-09T21:53:00+00:00","dateModified":"2022-01-03T22:07:11+00:00","description":"Extreme cyber security threats need an extreme security solution. Application whitelisting has been deemed as one of the most...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","width":1920,"height":550,"caption":"Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/application-whitelisting-extreme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Application Whitelisting &#8212; Is it too extreme?"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57630","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=57630"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57630\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55269"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=57630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=57630"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=57630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}