{"id":58609,"date":"2018-01-19T15:58:58","date_gmt":"2018-01-19T21:58:58","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=58609"},"modified":"2018-01-19T15:58:58","modified_gmt":"2018-01-19T21:58:58","slug":"cyber-security-risks-smbs-not-pretty-truth","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/","title":{"rendered":"Cyber Security Risks of SMBs &#8211; The Not So Pretty Truth"},"content":{"rendered":"<h3>Small and Medium Businesses (SMBs) Facing Major Risks<\/h3>\n<p>Cyber criminals do not discriminate.\u00a0 Businesses of all shapes and sizes, even home users, are not immune to today&#8217;s cyber threats.\u00a0 Prior to ransomware, remediation was possible.\u00a0 Users would get infected with malware and the user would run their antivirus to remove it and resolve the negative impacts the infection left on the computer.\u00a0 Now, ransomware has made that impossible.\u00a0 Ransomware is a malicious form of software that encrypts, or locks, user&#8217;s files and demands a payment in order to unlock them.\u00a0 An antivirus could remove the malicious software, but it still doesn&#8217;t decrypt the files.\u00a0 Therefore, remediation is no longer sufficient.<\/p>\n<p>Too often users don&#8217;t believe these threats will target them.\u00a0 They believe cyber criminals will go after the big fish, because that is where the money is.\u00a0 Truth is &#8212; that couldn&#8217;t be further from the truth.\u00a0 Often times, cyber criminals target SMBs because it is believed they have less effective cyber security.\u00a0 And once that infection hits, it comes with a significant price.<\/p>\n<p>According to the <a href=\"https:\/\/westfaironline.com\/98214\/dont-let-hackers-impact-your-small-business-in-2018\/\">Poneman Institute<\/a>, the average cost of cleaning up a SMB after it has been hacked stands at $690,000.\u00a0 Due to this astronomical price tag, it is not surprising that over half of all SMBs hacked, go under within six months.<\/p>\n<p>This would logically make SMBs increase their security measures, right?\u00a0 Wrong.\u00a0 Last year&#8217;s<a href=\"https:\/\/westfaironline.com\/98214\/dont-let-hackers-impact-your-small-business-in-2018\/\">\u00a0Manta poll<\/a> showed 87% of small-business owners nationwide do not feel they are at risk of a cyber attack.\u00a0 Wait, what?!\u00a0 Yes, they still believe the small fish are irrelevant to cyber criminals.\u00a0 Do not make this same mistake.\u00a0 The &#8220;it will never happen to me&#8221; philosophy is not applicable when it comes to cyber security threats.<\/p>\n<h4>Instead of Reacting, Prevent<\/h4>\n<p>Remediation is not an adequate solution, due to today&#8217;s growing cyber threats.\u00a0 However, interestingly enough, many large analyst firms state that is what businesses are focused on &#8212; getting prepared to deal with the cyber attack.\u00a0 They&#8217;re focusing not on preventing them, but what to do after they hit.\u00a0 To be clear, having a disaster recovery plan is a good idea.\u00a0 However, if a situation is avoidable, doesn&#8217;t it make sense to prevent it from occurring to begin with?<\/p>\n<p>In order to successfully prevent cyber attacks, users need to use <a href=\"https:\/\/www.pcmatic.com\/pro\/prod-patch.asp\">patch management software<\/a> to ensure third-party applications are updated timely, and implement a security solution that utilizes <a href=\"https:\/\/www.pcmatic.com\/pro\/\">application whitelisting<\/a> as its primary method of malware detection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Small and Medium Businesses (SMBs) Facing Major Risks Cyber criminals do not discriminate.\u00a0 Businesses of all shapes and sizes, even home users, are not immune to today&#8217;s cyber threats.\u00a0 Prior to ransomware, remediation was possible.\u00a0 Users would get infected with malware and the user would run their antivirus to remove it and resolve the negative [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55174,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[183],"tags":[4773,5449,5043],"class_list":["post-58609","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips","tag-cyber-security","tag-proactive","tag-smbs"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security Risks of SMBs - The Not So Pretty Truth<\/title>\n<meta name=\"description\" content=\"\u00a0According to the Poneman Institute, the average cost of cleaning up a SMB after it has been hacked stands at $690,000.\u00a0 Due to this astronomical price tag, it is not surprising that over half of all SMBs hacked, go under within six months...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Risks of SMBs - The Not So Pretty Truth\" \/>\n<meta property=\"og:description\" content=\"\u00a0According to the Poneman Institute, the average cost of cleaning up a SMB after it has been hacked stands at $690,000.\u00a0 Due to this astronomical price tag, it is not surprising that over half of all SMBs hacked, go under within six months...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-19T21:58:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-risks-smbs-not-pretty-truth\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-risks-smbs-not-pretty-truth\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Cyber Security Risks of SMBs &#8211; The Not So Pretty Truth\",\"datePublished\":\"2018-01-19T21:58:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-risks-smbs-not-pretty-truth\\\/\"},\"wordCount\":425,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-risks-smbs-not-pretty-truth\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBlueSlider.jpg\",\"keywords\":[\"cyber security\",\"proactive\",\"SMBs\"],\"articleSection\":[\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-risks-smbs-not-pretty-truth\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-risks-smbs-not-pretty-truth\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-risks-smbs-not-pretty-truth\\\/\",\"name\":\"Cyber Security Risks of SMBs - The Not So Pretty Truth\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-risks-smbs-not-pretty-truth\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-risks-smbs-not-pretty-truth\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBlueSlider.jpg\",\"datePublished\":\"2018-01-19T21:58:58+00:00\",\"description\":\"\u00a0According to the Poneman Institute, the average cost of cleaning up a SMB after it has been hacked stands at $690,000.\u00a0 Due to this astronomical price tag, it is not surprising that over half of all SMBs hacked, go under within six months...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-risks-smbs-not-pretty-truth\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-risks-smbs-not-pretty-truth\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-risks-smbs-not-pretty-truth\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBlueSlider.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBlueSlider.jpg\",\"width\":1920,\"height\":550,\"caption\":\"Security lock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-risks-smbs-not-pretty-truth\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Risks of SMBs &#8211; The Not So Pretty Truth\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Risks of SMBs - The Not So Pretty Truth","description":"\u00a0According to the Poneman Institute, the average cost of cleaning up a SMB after it has been hacked stands at $690,000.\u00a0 Due to this astronomical price tag, it is not surprising that over half of all SMBs hacked, go under within six months...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security Risks of SMBs - The Not So Pretty Truth","og_description":"\u00a0According to the Poneman Institute, the average cost of cleaning up a SMB after it has been hacked stands at $690,000.\u00a0 Due to this astronomical price tag, it is not surprising that over half of all SMBs hacked, go under within six months...","og_url":"https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2018-01-19T21:58:58+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Cyber Security Risks of SMBs &#8211; The Not So Pretty Truth","datePublished":"2018-01-19T21:58:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/"},"wordCount":425,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg","keywords":["cyber security","proactive","SMBs"],"articleSection":["tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/","url":"https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/","name":"Cyber Security Risks of SMBs - The Not So Pretty Truth","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg","datePublished":"2018-01-19T21:58:58+00:00","description":"\u00a0According to the Poneman Institute, the average cost of cleaning up a SMB after it has been hacked stands at $690,000.\u00a0 Due to this astronomical price tag, it is not surprising that over half of all SMBs hacked, go under within six months...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg","width":1920,"height":550,"caption":"Security lock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-risks-smbs-not-pretty-truth\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Risks of SMBs &#8211; The Not So Pretty Truth"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/58609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=58609"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/58609\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55174"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=58609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=58609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=58609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}