{"id":59079,"date":"2018-05-02T12:28:14","date_gmt":"2018-05-02T17:28:14","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=59079"},"modified":"2018-05-02T16:15:38","modified_gmt":"2018-05-02T21:15:38","slug":"proactive-reactive-two-alternative-security-approaches","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/","title":{"rendered":"Proactive or Reactive, the Two Alternative Security Approaches"},"content":{"rendered":"<h3>There Are Two Security Approaches &#8211; Which Fits You Best?<\/h3>\n<p>When considering a security solution, individuals consider various aspects including price, usability, compatibility, and customer reviews.\u00a0 However, how often do customers dig deeper?\u00a0 Do they look at malware detection rates?\u00a0 Do they look at the security approach taken by the antivirus vendor?\u00a0 The answer to all three questions is, rarely.<\/p>\n<p>Many users simply renew with the security program their computer came with.\u00a0 Some don&#8217;t use a security solution at all.\u00a0 In a corporate world, budgets are often considered, as well as convenience.<\/p>\n<p>As a result, many users have been left with a reactive security approach.\u00a0 Meaning, they are using a traditional security solution that implements a basic blacklist which blocks all known threats.\u00a0 This may sound great, but what are these solutions doing to prevent new, unknown threats from happening.\u00a0 They&#8217;re not.\u00a0 Case in point, WannaCry.\u00a0 That was an unknown, malicious ransomware variant that was allowed to run on endpoints that were running a blacklist security solution.\u00a0 They knew what files were bad but would allow anything else to run.<\/p>\n<p>It&#8217;s impossible to keep up with the known bad files, which is exactly what hackers rely on.\u00a0 A reactive approach includes endpoint detection and response (EDR), a method to detect, respond and mitigate suspicious activity on an endpoint.\u00a0 In addition, reactive approaches also include creating a disaster recovery plan and data backups.<\/p>\n<p>To be clear, being prepared is not a bad thing.\u00a0 Having a disaster recovery plan is simply best practice, as well as backing up your data.\u00a0 However, with today&#8217;s emerging threats, being reactive is not enough; although, that is what companies are dumping their security budgets into.\u00a0 Why?\u00a0 We&#8217;re not sure.\u00a0 Logically, it makes far more sense to increase your prevention security budget, compared to boosting the budget in reacting to them.<\/p>\n<h4>Being Proactive<\/h4>\n<p>Taking a proactive approach means the company places a higher emphasis on avoiding malware infections, instead of preparing for the aftermath of one.\u00a0 A proactive approach should include the following:<\/p>\n<ul>\n<li>Software patch management services<\/li>\n<li>Driver updates<\/li>\n<li>Application whitelisting<\/li>\n<li>Cyber security training<\/li>\n<\/ul>\n<p>None of these concepts are new; although when facing today&#8217;s cyber threats, they should have a major influence on security measures.\u00a0 Traditionally, whitelisting has a bad reputation because it may create a higher workload for the IT staff.\u00a0 This includes implementing, creating, and managing the whitelist.\u00a0 Instead of leaving this up to the IT staff, PC Matic has chosen to use a whitelist approach in their security solution, as well as offer the service of managing it as well.\u00a0 PC Matic users get access to its globally, automated whitelist technology.\u00a0 Meaning the list has already been created.\u00a0 If an unknown file attempts to execute, that files gets sent to the PC Matic malware research team to be tested and categorized as either safe or malicious.\u00a0 This means, none of the management is left to the IT staff.<\/p>\n<h4>Conclusion<\/h4>\n<p>New malicious files are created every minute of every day.\u00a0 It is impossible for a blacklist to keep up.\u00a0 Although, being prepared for a disaster, whether it is a malware attack, or natural disaster is not a bad thing.\u00a0 However, with the increased cyber threats users face on a daily basis, being reactive is simply not enough.\u00a0 It is time for a proactive approach.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There Are Two Security Approaches &#8211; Which Fits You Best? When considering a security solution, individuals consider various aspects including price, usability, compatibility, and customer reviews.\u00a0 However, how often do customers dig deeper?\u00a0 Do they look at malware detection rates?\u00a0 Do they look at the security approach taken by the antivirus vendor?\u00a0 The answer to [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55214,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[183],"tags":[4773,5449,5499],"class_list":["post-59079","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips","tag-cyber-security","tag-proactive","tag-reactive"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Proactive or Reactive, the Two Alternative Security Approaches<\/title>\n<meta name=\"description\" content=\"There are two approaches when it comes to cyber security. Reactive and proactive. Find out which best meets your cyber security needs now....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Proactive or Reactive, the Two Alternative Security Approaches\" \/>\n<meta property=\"og:description\" content=\"There are two approaches when it comes to cyber security. Reactive and proactive. Find out which best meets your cyber security needs now....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-02T17:28:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-05-02T21:15:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-reactive-two-alternative-security-approaches\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-reactive-two-alternative-security-approaches\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Proactive or Reactive, the Two Alternative Security Approaches\",\"datePublished\":\"2018-05-02T17:28:14+00:00\",\"dateModified\":\"2018-05-02T21:15:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-reactive-two-alternative-security-approaches\\\/\"},\"wordCount\":563,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-reactive-two-alternative-security-approaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/keyBG.jpg\",\"keywords\":[\"cyber security\",\"proactive\",\"reactive\"],\"articleSection\":[\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-reactive-two-alternative-security-approaches\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-reactive-two-alternative-security-approaches\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-reactive-two-alternative-security-approaches\\\/\",\"name\":\"Proactive or Reactive, the Two Alternative Security Approaches\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-reactive-two-alternative-security-approaches\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-reactive-two-alternative-security-approaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/keyBG.jpg\",\"datePublished\":\"2018-05-02T17:28:14+00:00\",\"dateModified\":\"2018-05-02T21:15:38+00:00\",\"description\":\"There are two approaches when it comes to cyber security. Reactive and proactive. Find out which best meets your cyber security needs now....\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-reactive-two-alternative-security-approaches\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-reactive-two-alternative-security-approaches\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-reactive-two-alternative-security-approaches\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/keyBG.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/keyBG.jpg\",\"width\":730,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-reactive-two-alternative-security-approaches\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Proactive or Reactive, the Two Alternative Security Approaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Proactive or Reactive, the Two Alternative Security Approaches","description":"There are two approaches when it comes to cyber security. Reactive and proactive. Find out which best meets your cyber security needs now....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/","og_locale":"en_US","og_type":"article","og_title":"Proactive or Reactive, the Two Alternative Security Approaches","og_description":"There are two approaches when it comes to cyber security. Reactive and proactive. Find out which best meets your cyber security needs now....","og_url":"https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2018-05-02T17:28:14+00:00","article_modified_time":"2018-05-02T21:15:38+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Proactive or Reactive, the Two Alternative Security Approaches","datePublished":"2018-05-02T17:28:14+00:00","dateModified":"2018-05-02T21:15:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/"},"wordCount":563,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg","keywords":["cyber security","proactive","reactive"],"articleSection":["tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/","url":"https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/","name":"Proactive or Reactive, the Two Alternative Security Approaches","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg","datePublished":"2018-05-02T17:28:14+00:00","dateModified":"2018-05-02T21:15:38+00:00","description":"There are two approaches when it comes to cyber security. Reactive and proactive. Find out which best meets your cyber security needs now....","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg","width":730,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/proactive-reactive-two-alternative-security-approaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Proactive or Reactive, the Two Alternative Security Approaches"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59079","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=59079"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59079\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55214"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=59079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=59079"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=59079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}