{"id":57677,"date":"2017-08-15T09:35:01","date_gmt":"2017-08-15T14:35:01","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=57677"},"modified":"2017-08-15T09:41:40","modified_gmt":"2017-08-15T14:41:40","slug":"benefits-of-cyber-security-training","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/","title":{"rendered":"PC Matic Reaping the Benefits of Cyber Security Training"},"content":{"rendered":"<h3>Monday Morning<\/h3>\n<p>To begin this week, two of our <a href=\"http:\/\/pcmatic.com\/supported\">PC Matic<\/a> team members were targeted by a malicious email attachment from a contact they recently met. Both employees recognized right away something fishy with the email and believed it to be something malicious. All members of our team have taken part in the KnowBe4 cyber security training in the past, and it showed here. We&#8217;ll give you the details of the email to hopefully help you avoid similar emails in the future, even if they come from someone you know. After analyzing this threat, <a href=\"http:\/\/pcmatic.com\/supported\">PC Matic<\/a> would have stopped it at execution, but avoiding falling into these infection traps all together is always a good practice to maintain.<\/p>\n<h3>The Email<\/h3>\n<p>After attending a show recently, our sales team was contacting potential customers and partners that we met to begin a relationship. However one of these contacts may have had their email hacked as it began distributing malware. Their email account was sending out carbon copy responses to everyone they had corresponded with in the past. Check out the email below and see if you would have made the same decision as our team did. It may not be a message that screams malware, but it&#8217;s important to understand the variety of ways that cyber criminals work in.<\/p>\n<figure id=\"attachment_57678\" aria-describedby=\"caption-attachment-57678\" style=\"width: 447px\" class=\"wp-caption aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-57678 size-full\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Email1.png\" alt=\"\" width=\"447\" height=\"391\" \/><figcaption id=\"caption-attachment-57678\" class=\"wp-caption-text\">The email contains a malicious Word Document as an attachment.<\/figcaption><\/figure>\n<p>If you were still not skeptical of this email after it was sent to you, opening the Word Document leads to a request for macros to be enabled. You should never enable macros on a random document that was sent to you as these macros will often access malware on the web and pull it down onto your computer. Here&#8217;s a sample of the screen you would see if you opened the document.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-57679\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WordMacros.png\" alt=\"\" width=\"800\" height=\"482\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WordMacros.png 1024w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WordMacros-768x463.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>If you receive a document and didn&#8217;t expect macros to be enabled, be very suspicious of it. You may want to reach out to the person who sent it to you via a different means of communication and ask them to confirm. It&#8217;s always better to be safe than sorry! <a href=\"http:\/\/pcmatic.com\/supported\">PC Matic<\/a> customers would be protected either way, as Super Shield will detect and stop the malware before it can execute even if you enabled macros.<\/p>\n<p>If you are a <a href=\"http:\/\/pcmatic.com\/supported\">PC Matic<\/a> customer and have not taken advantage of your included cyber security training with KnowBe4, please contact our support team for details at <a href=\"http:\/\/pcmatic.com\/help\">pcmatic.com\/help<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Monday Morning To begin this week, two of our PC Matic team members were targeted by a malicious email attachment from a contact they recently met. Both employees recognized right away something fishy with the email and believed it to be something malicious. All members of our team have taken part in the KnowBe4 cyber [&hellip;]<\/p>\n","protected":false},"author":58,"featured_media":55145,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12],"tags":[],"class_list":["post-57677","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-pit-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PC Matic Reaping the Benefits of Cyber Security Training<\/title>\n<meta name=\"description\" content=\"Being aware is the first step in staying secure no matter where you are on the web. Check out our latest real world example from the PC Matic team.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PC Matic Reaping the Benefits of Cyber Security Training\" \/>\n<meta property=\"og:description\" content=\"Being aware is the first step in staying secure no matter where you are on the web. Check out our latest real world example from the PC Matic team.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-15T14:35:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-08-15T14:41:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/emailBG.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Devin Bergin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Devin Bergin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/benefits-of-cyber-security-training\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/benefits-of-cyber-security-training\\\/\"},\"author\":{\"name\":\"Devin Bergin\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/e1a87aba65278d9cd1064ad1966895fe\"},\"headline\":\"PC Matic Reaping the Benefits of Cyber Security Training\",\"datePublished\":\"2017-08-15T14:35:01+00:00\",\"dateModified\":\"2017-08-15T14:41:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/benefits-of-cyber-security-training\\\/\"},\"wordCount\":430,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/benefits-of-cyber-security-training\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/emailBG.jpg\",\"articleSection\":[\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/benefits-of-cyber-security-training\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/benefits-of-cyber-security-training\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/benefits-of-cyber-security-training\\\/\",\"name\":\"PC Matic Reaping the Benefits of Cyber Security Training\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/benefits-of-cyber-security-training\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/benefits-of-cyber-security-training\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/emailBG.jpg\",\"datePublished\":\"2017-08-15T14:35:01+00:00\",\"dateModified\":\"2017-08-15T14:41:40+00:00\",\"description\":\"Being aware is the first step in staying secure no matter where you are on the web. Check out our latest real world example from the PC Matic team.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/benefits-of-cyber-security-training\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/benefits-of-cyber-security-training\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/benefits-of-cyber-security-training\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/emailBG.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/emailBG.jpg\",\"width\":730,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/benefits-of-cyber-security-training\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PC Matic Reaping the Benefits of Cyber Security Training\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/e1a87aba65278d9cd1064ad1966895fe\",\"name\":\"Devin Bergin\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/devin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PC Matic Reaping the Benefits of Cyber Security Training","description":"Being aware is the first step in staying secure no matter where you are on the web. Check out our latest real world example from the PC Matic team.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/","og_locale":"en_US","og_type":"article","og_title":"PC Matic Reaping the Benefits of Cyber Security Training","og_description":"Being aware is the first step in staying secure no matter where you are on the web. Check out our latest real world example from the PC Matic team.","og_url":"https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-08-15T14:35:01+00:00","article_modified_time":"2017-08-15T14:41:40+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/emailBG.jpg","type":"image\/jpeg"}],"author":"Devin Bergin","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Devin Bergin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/"},"author":{"name":"Devin Bergin","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/e1a87aba65278d9cd1064ad1966895fe"},"headline":"PC Matic Reaping the Benefits of Cyber Security Training","datePublished":"2017-08-15T14:35:01+00:00","dateModified":"2017-08-15T14:41:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/"},"wordCount":430,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/emailBG.jpg","articleSection":["The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/","url":"https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/","name":"PC Matic Reaping the Benefits of Cyber Security Training","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/emailBG.jpg","datePublished":"2017-08-15T14:35:01+00:00","dateModified":"2017-08-15T14:41:40+00:00","description":"Being aware is the first step in staying secure no matter where you are on the web. Check out our latest real world example from the PC Matic team.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/emailBG.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/emailBG.jpg","width":730,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/benefits-of-cyber-security-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"PC Matic Reaping the Benefits of Cyber Security Training"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/e1a87aba65278d9cd1064ad1966895fe","name":"Devin Bergin","url":"https:\/\/www.pcmatic.com\/blog\/author\/devin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/58"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=57677"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57677\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55145"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=57677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=57677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=57677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}