{"id":57897,"date":"2017-09-20T15:12:10","date_gmt":"2017-09-20T20:12:10","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=57897"},"modified":"2017-09-20T15:12:10","modified_gmt":"2017-09-20T20:12:10","slug":"top-10-tips-combat-ransomware","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/","title":{"rendered":"Top 5 Tips to Combat Ransomware"},"content":{"rendered":"<h3>Top Tips to Keep Your Data Secure<\/h3>\n<p>Recently Beta News <a href=\"https:\/\/betanews.com\/2017\/09\/20\/the-practical-guide-to-fighting-ransomware\/\">published <\/a>an article on how, <em>The practical guide to fighting ransomware<\/em>. \u00a0The article listed several tips, timelines for implementation, and explanations why the tips were important. \u00a0A vast majority of the information throughout the article was correct and indisputably great advice. \u00a0However, a few tips warranted additional insight.<\/p>\n<ol>\n<li>\n<h4><strong>Keep the operating system, third-party applications and security solutions up-to-date.\u00a0<\/strong><\/h4>\n<p>This is critical. \u00a0As seen with WannaCry and NotPetya, malware variants have the ability to creep in through operating software vulnerabilities. \u00a0Countless attacks have been accessed through various applications, both on desktop and mobile devices. \u00a0Also, if the security programs are not updated, they do not know the most updated threats to block. \u00a0According to Beta News, this is a &#8220;Quick Win&#8221;, meaning it can be implemented in 1-3 months. \u00a0Please understand, keeping these programs and systems updated is not going to take 1-3 months, but creating a plan to automate updates could.<\/li>\n<li>\n<h4><strong>Restrict administrative rights. \u00a0<\/strong><\/h4>\n<p>There have been countless malware attacks that failed to execute but the end user did not have administrative rights. \u00a0It is one simple, yet effective security measure. \u00a0From a company standpoint, it&#8217;s important to understand what employees have access to what, what their access levels are, and if all of the access rights are necessary to complete daily job functions. \u00a0If a user needs admin rights, then leave them &#8212; but there may be areas they do not need access to. \u00a0This could, in the event of a malware attack, mitigate the infection.<\/li>\n<li>\n<h4><strong>Implement multi-layer authentication.<\/strong><\/h4>\n<p>Security breaches could leave passwords exposed. \u00a0However, if an organization implements a multi-layer authentication approach the security of that organization&#8217;s data could remain secure. \u00a0A multi-layer authentication approach is also highly recommended for remote access.<\/li>\n<li>\n<h4><strong>Backup data.<\/strong><\/h4>\n<p>This may seem like common knowledge, but there are practices that will assist in the success of securing those backups. \u00a0Best practice is to back up the data on an external device. \u00a0For companies, this should be done every hour. \u00a0For home users, daily would suffice. \u00a0It is also important to unplug the external device when the backup process is complete. \u00a0Often times, businesses and home users are unable to recover their data after a ransomware attack hits. \u00a0Therefore, keeping updated backups secure on an external device has become imperative.<\/li>\n<li>\n<h4><strong>Implement an <a href=\"http:\/\/www.pcmatic.com\/whitelist\">application whitelist<\/a> approach<\/strong>.<\/h4>\n<p>This is also known as a default deny approach. \u00a0While using an application whitelist, only trusted applications are allowed to execute. \u00a0Everything else, including unknown programs are blocked until proven secure. \u00a0This method has been proven to be the most effective in blocking today&#8217;s cyber threats &#8212; including ransomware. \u00a0Beta News <a href=\"https:\/\/betanews.com\/2017\/09\/20\/the-practical-guide-to-fighting-ransomware\/\">stated <\/a>this approach could take 6-12 months to integrate. \u00a0This is not always the case. \u00a0With<a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504631\"> PC Matic<\/a>, <a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504632\">PC Matic Pro<\/a> and <a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=505009\">PC Matic MSP<\/a>, it can be done in the amount of time it takes to install the program. \u00a0Once installed, the PC Matic malware research team maintains the whitelist, removing the burden from IT administrators.<\/li>\n<\/ol>\n<p>To read all of the ransomware prevention tips provided by Beta News, click <a href=\"https:\/\/betanews.com\/2017\/09\/20\/the-practical-guide-to-fighting-ransomware\/\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Top Tips to Keep Your Data Secure Recently Beta News published an article on how, The practical guide to fighting ransomware. \u00a0The article listed several tips, timelines for implementation, and explanations why the tips were important. \u00a0A vast majority of the information throughout the article was correct and indisputably great advice. \u00a0However, a few tips [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55582,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4949,5000,183],"tags":[4902,4363,4880],"class_list":["post-57897","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","category-ransomwarewar","category-tips","tag-prevention","tag-ransomware","tag-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top 5 Tips to Combat Ransomware<\/title>\n<meta name=\"description\" content=\"Learn the top five tips to keeping your data safe and your privacy secure. Ransomware is one of today&#039;s largest cyber security threats, and you can&#039;t...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 5 Tips to Combat Ransomware\" \/>\n<meta property=\"og:description\" content=\"Learn the top five tips to keeping your data safe and your privacy secure. Ransomware is one of today&#039;s largest cyber security threats, and you can&#039;t...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-20T20:12:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"740\" \/>\n\t<meta property=\"og:image:height\" content=\"416\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-tips-combat-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-tips-combat-ransomware\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Top 5 Tips to Combat Ransomware\",\"datePublished\":\"2017-09-20T20:12:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-tips-combat-ransomware\\\/\"},\"wordCount\":522,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-tips-combat-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomware-2.jpg\",\"keywords\":[\"prevention\",\"ransomware\",\"tips\"],\"articleSection\":[\"Ransomware\",\"RansomwareWar\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-tips-combat-ransomware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-tips-combat-ransomware\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-tips-combat-ransomware\\\/\",\"name\":\"Top 5 Tips to Combat Ransomware\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-tips-combat-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-tips-combat-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomware-2.jpg\",\"datePublished\":\"2017-09-20T20:12:10+00:00\",\"description\":\"Learn the top five tips to keeping your data safe and your privacy secure. Ransomware is one of today's largest cyber security threats, and you can't...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-tips-combat-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-tips-combat-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-tips-combat-ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomware-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomware-2.jpg\",\"width\":740,\"height\":416,\"caption\":\"Ransomware Attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/top-10-tips-combat-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 5 Tips to Combat Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 5 Tips to Combat Ransomware","description":"Learn the top five tips to keeping your data safe and your privacy secure. Ransomware is one of today's largest cyber security threats, and you can't...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Top 5 Tips to Combat Ransomware","og_description":"Learn the top five tips to keeping your data safe and your privacy secure. Ransomware is one of today's largest cyber security threats, and you can't...","og_url":"https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-09-20T20:12:10+00:00","og_image":[{"width":740,"height":416,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Top 5 Tips to Combat Ransomware","datePublished":"2017-09-20T20:12:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/"},"wordCount":522,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg","keywords":["prevention","ransomware","tips"],"articleSection":["Ransomware","RansomwareWar","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/","url":"https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/","name":"Top 5 Tips to Combat Ransomware","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg","datePublished":"2017-09-20T20:12:10+00:00","description":"Learn the top five tips to keeping your data safe and your privacy secure. Ransomware is one of today's largest cyber security threats, and you can't...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg","width":740,"height":416,"caption":"Ransomware Attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/top-10-tips-combat-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Top 5 Tips to Combat Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=57897"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57897\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55582"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=57897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=57897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=57897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}