{"id":58535,"date":"2018-01-05T16:21:18","date_gmt":"2018-01-05T22:21:18","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=58535"},"modified":"2018-01-05T16:23:02","modified_gmt":"2018-01-05T22:23:02","slug":"2017-cyber-security-threats-explained","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/","title":{"rendered":"Top Cyber Threats of 2017 &#038; Tips to Stay Safe in 2018"},"content":{"rendered":"<p>The <a href=\"https:\/\/www.nttsecurity.com\/docs\/librariesprovider3\/resources\/2017_gtir_ntt_security_04252017.pdf?sfvrsn=ca90716e_2\">2017 Global Threat Intelligence Report<\/a> (GTIR) broke down the cyber security threats the world faced last year.\u00a0 Not only will we discuss some key features, but also ways to mitigate each threat.<\/p>\n<h4>73% of Malware Attacks were Distributed via Phishing Attacks<\/h4>\n<p>Emails with malicious intent, or phishing emails, proved to be the method of malware distribution in 2017.\u00a0 The risk of falling victim to phishing has been a well-covered topic, but mitigating the risk is still a struggle.\u00a0 Cyber criminals are using this distribution method for two primary reasons.<\/p>\n<p>First, human error.\u00a0 Individuals tend to click without thinking.\u00a0 Users often don&#8217;t read what they&#8217;re clicking on, or read what they&#8217;re accepting.\u00a0 There lies the problem.\u00a0 People receive emails saying they need to open an invoice, receipt, tracking code, etc. and they do it without checking the legitimacy of the email.<\/p>\n<p>Second, malware variants change every hour, in some cases, every few minutes.\u00a0 Therefore, security solutions using a traditional blacklist approach will not catch these unknown variants.\u00a0 If you put those two together, you have a human who is willing to download or approve just about anything, and a security solution that won&#8217;t catch it.\u00a0 It&#8217;s the perfect storm.<\/p>\n<p>But, there&#8217;s a way to stop it.\u00a0 First, is cyber security awareness training for all users.\u00a0 Second, use a <a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504632\">security solution that implements an automated whitelist technology<\/a>.\u00a0 The whitelist will only allow known trust programs to execute, and block all unknown files.\u00a0 By implementing both, phishing attacks will be significantly less likely.<\/p>\n<h4>Adobe, Java and Internet Explorer Targeted by Cyber Criminals<\/h4>\n<p>According to the <a href=\"https:\/\/www.nttsecurity.com\/docs\/librariesprovider3\/resources\/2017_gtir_ntt_security_04252017.pdf?sfvrsn=ca90716e_2\">GTIR<\/a>, the three technologies targeted most by hackers were Adobe, Java and Internet Explorer.\u00a0 Why?\u00a0 Because they&#8217;re known to not be updated in a timely fashion.\u00a0 The fix?\u00a0 Find a <a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504632\">security solution<\/a> or <a href=\"https:\/\/www.pcmatic.com\/pro\/prod-patch.asp\">patch management service<\/a> that automates the updating process.\u00a0 Therefore, once an update is available, it is done automatically.\u00a0 This will patch any security vulnerabilities found in the previous version, closing the open doors left open for hackers.<\/p>\n<h4>77% of all Ransomware was Within Four Industries<\/h4>\n<p>The <a href=\"https:\/\/www.nttsecurity.com\/docs\/librariesprovider3\/resources\/2017_gtir_ntt_security_04252017.pdf?sfvrsn=ca90716e_2\">GTIR<\/a>\u00a0also reported over three-quarters of 2017&#8217;s ransomware attacks that took place throughout the globe, hit four major industries.\u00a0 Twenty-eight percent hit the business and professional services industry, 19% hit government agencies, and the remaining 30% was split evenly between the retail and healthcare industries.<\/p>\n<p>Last year, ransomware damage costs were <a href=\"https:\/\/cybersecurityventures.com\/ransomware-damage-report-2017-5-billion\/\">expected to exceed $5 billion worldwide<\/a>.\u00a0 This includes costs associated with ransom payments, company downtime, lost productivity, reputation damage, and remediation costs.<\/p>\n<p>With primary sectors, such as the government and healthcare industries, being targeted, and the hefty price tag associated with these attacks, prevention has never been more critical.\u00a0 To properly prevent malicious cyber attacks, such as ransomware, users must do the following:<\/p>\n<ul>\n<li>Keep the operating system updated<\/li>\n<li>Ensure all programs and application, including the security solution, is updated<\/li>\n<li>Implement a<a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504632\"> security solution that utilizes an application whitelist technology<\/a><\/li>\n<li>Take part in cyber security training<\/li>\n<li>Disable Macros<\/li>\n<li>Evaluate administrative rights access, and remove all parties who do not need said access<\/li>\n<\/ul>\n<p>By implementing the above suggestions, cyber security threats users worldwide face daily will be minimized drastically.\u00a0 Cyber security threats for 2018 will only continue to advance.\u00a0 How will you protect yourself?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The 2017 Global Threat Intelligence Report (GTIR) broke down the cyber security threats the world faced last year.\u00a0 Not only will we discuss some key features, but also ways to mitigate each threat. 73% of Malware Attacks were Distributed via Phishing Attacks Emails with malicious intent, or phishing emails, proved to be the method of [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55269,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4949,5000,5090,183],"tags":[5433,56,5434,280,4363,5112],"class_list":["post-58535","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","category-ransomwarewar","category-slider","category-tips","tag-gtir","tag-malware","tag-patch-management","tag-phishing","tag-ransomware","tag-ransomware-attacks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top Cyber Threats of 2017 &amp; Tips to Stay Safe in 2018<\/title>\n<meta name=\"description\" content=\"Cyber security threats and active attacks were a highly publicized topic in 2017. Find out what the top trends were, and how to prevent falling victim in 2018....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Cyber Threats of 2017 &amp; Tips to Stay Safe in 2018\" \/>\n<meta property=\"og:description\" content=\"Cyber security threats and active attacks were a highly publicized topic in 2017. Find out what the top trends were, and how to prevent falling victim in 2018....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-05T22:21:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-01-05T22:23:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2017-cyber-security-threats-explained\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2017-cyber-security-threats-explained\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Top Cyber Threats of 2017 &#038; Tips to Stay Safe in 2018\",\"datePublished\":\"2018-01-05T22:21:18+00:00\",\"dateModified\":\"2018-01-05T22:23:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2017-cyber-security-threats-explained\\\/\"},\"wordCount\":543,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2017-cyber-security-threats-explained\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"keywords\":[\"GTIR\",\"malware\",\"patch management\",\"phishing\",\"ransomware\",\"ransomware attacks\"],\"articleSection\":[\"Ransomware\",\"RansomwareWar\",\"TechTalk Slider\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2017-cyber-security-threats-explained\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2017-cyber-security-threats-explained\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2017-cyber-security-threats-explained\\\/\",\"name\":\"Top Cyber Threats of 2017 & Tips to Stay Safe in 2018\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2017-cyber-security-threats-explained\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2017-cyber-security-threats-explained\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"datePublished\":\"2018-01-05T22:21:18+00:00\",\"dateModified\":\"2018-01-05T22:23:02+00:00\",\"description\":\"Cyber security threats and active attacks were a highly publicized topic in 2017. Find out what the top trends were, and how to prevent falling victim in 2018....\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2017-cyber-security-threats-explained\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2017-cyber-security-threats-explained\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2017-cyber-security-threats-explained\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shieldkey-slider.jpg\",\"width\":1920,\"height\":550,\"caption\":\"Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/2017-cyber-security-threats-explained\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top Cyber Threats of 2017 &#038; Tips to Stay Safe in 2018\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top Cyber Threats of 2017 & Tips to Stay Safe in 2018","description":"Cyber security threats and active attacks were a highly publicized topic in 2017. Find out what the top trends were, and how to prevent falling victim in 2018....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/","og_locale":"en_US","og_type":"article","og_title":"Top Cyber Threats of 2017 & Tips to Stay Safe in 2018","og_description":"Cyber security threats and active attacks were a highly publicized topic in 2017. Find out what the top trends were, and how to prevent falling victim in 2018....","og_url":"https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2018-01-05T22:21:18+00:00","article_modified_time":"2018-01-05T22:23:02+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Top Cyber Threats of 2017 &#038; Tips to Stay Safe in 2018","datePublished":"2018-01-05T22:21:18+00:00","dateModified":"2018-01-05T22:23:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/"},"wordCount":543,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","keywords":["GTIR","malware","patch management","phishing","ransomware","ransomware attacks"],"articleSection":["Ransomware","RansomwareWar","TechTalk Slider","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/","url":"https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/","name":"Top Cyber Threats of 2017 & Tips to Stay Safe in 2018","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","datePublished":"2018-01-05T22:21:18+00:00","dateModified":"2018-01-05T22:23:02+00:00","description":"Cyber security threats and active attacks were a highly publicized topic in 2017. Find out what the top trends were, and how to prevent falling victim in 2018....","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shieldkey-slider.jpg","width":1920,"height":550,"caption":"Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/2017-cyber-security-threats-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Top Cyber Threats of 2017 &#038; Tips to Stay Safe in 2018"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/58535","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=58535"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/58535\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55269"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=58535"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=58535"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=58535"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}