{"id":59544,"date":"2018-09-05T11:28:01","date_gmt":"2018-09-05T16:28:01","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=59544"},"modified":"2018-09-05T11:28:01","modified_gmt":"2018-09-05T16:28:01","slug":"hackers-target-one-thing","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/","title":{"rendered":"Hackers Target Specifically Based on This One Thing"},"content":{"rendered":"<h3>How Hackers Choose Their Targets<\/h3>\n<p>According to <a href=\"https:\/\/securityboulevard.com\/2018\/08\/37-of-it-managers-see-failure-to-install-updates-as-the-biggest-security-threat-of-2018\/\">Security Boulevard<\/a>, the #1 security vulnerability identified by IT managers is unpatched systems.<\/p>\n<p>Hackers target vulnerable systems.\u00a0 There it is.\u00a0 That is the big secret, which likely isn&#8217;t as shocking as one anticipated.\u00a0 Why do hackers target vulnerable systems?\u00a0 This too is rather simple.\u00a0 They don&#8217;t want to have to &#8220;work&#8221; at hacking the system, they want users to leave the door open for them.\u00a0 And often times they are.<\/p>\n<p>Leaving third-party applications and operating systems outdated leaves endpoints and servers, as well as all the data on them, vulnerable to attack.<\/p>\n<p>It is imperative for users to update all devices in a timely manner.\u00a0 Often times this will take longer for larger businesses, as proper testing should be completed to ensure the update will not negatively impact the functionality of existing software or devices.\u00a0 That being said, the testing process should take place once updates are available, so updates can be installed as quickly as possible.\u00a0 It should also be noted, major software companies, such as Microsoft, have reoccurring update release dates.\u00a0 Therefore, IT professionals can schedule when testing will need to be completed with the predetermined update dates.<\/p>\n<h4>Automate Updates?<\/h4>\n<p>Users at a smaller scale, either home users or perhaps a smaller business may automate application and operating system updates to take the legwork out of manually launching the update.\u00a0 This feature is great for those who want to set it and forget it.\u00a0 However, users must remember to reboot their PCs every day.\u00a0 When updates are installed, they often are not finalized until the device is rebooted.\u00a0 Therefore, users may think they&#8217;re protected with the latest updates, but in reality, they haven&#8217;t finished installing because no reboot has been initiated.<\/p>\n<p><strong><em>Rebooting is equally important for those who manually update as well.\u00a0 If it isn&#8217;t getting done &#8212; the update is NOT complete.<\/em><\/strong><\/p>\n<h4>Other Forms of Vulnerability<\/h4>\n<p>Although unpatched systems were the primary security threat identified by IT managers, other vulnerabilities should be addressed as well.\u00a0 Additional factors to evaluate include multi-factor authentication, IoT devices, BYOD policies, and password strength.<\/p>\n<h5>Multi-Factor Authentication and Password Strength<\/h5>\n<p>First and foremost, no one should be able to access your network with one basic password.\u00a0 Employers should be employing a multi-layer authentication feature to access their networks.\u00a0 As a component of that, proper password regulations should be in place.\u00a0 This includes requiring passwords to be changed every 30-45 days, including specific characters and numbers, and offering a password vault for employees to track their passwords to prevent them from being written down or kept in a Word or Excel document.<\/p>\n<h5>IoT and BYOD<\/h5>\n<p>The Internet of Things (IoT) has taken over the world.\u00a0 We&#8217;re more connected now than ever, whether it is our smartwatches notifying us of text or calls, or checking emails through our phones.\u00a0 We often bring these devices with us to work and connect them to company networks.\u00a0 This creates a major problem.\u00a0 If these devices are infected with malware of any kind &#8212; viruses, ransomware, spyware, etc. this malware can now spread throughout the company networks.\u00a0 Also, the likelihood of these IoT devices having any form of security solution installed is minimal at best.\u00a0 They often do not come with any form of antivirus installed, and some devices are not compatible with security solutions at all.<\/p>\n<p>Therefore, having a solidified Bring Your Own Device (BYOD) policy is important.\u00a0 Employees should know what is allowed and expected, and what is not.\u00a0 This should include three major things.\u00a0 First, what devices are permitted to connect to the company&#8217;s networks.\u00a0 Second, the company needs to mandate a security solution is installed on all devices permitted to connect to company networks.\u00a0 Lastly, it must include disciplinary measures if the policy is not adhered to.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How Hackers Choose Their Targets According to Security Boulevard, the #1 security vulnerability identified by IT managers is unpatched systems. Hackers target vulnerable systems.\u00a0 There it is.\u00a0 That is the big secret, which likely isn&#8217;t as shocking as one anticipated.\u00a0 Why do hackers target vulnerable systems?\u00a0 This too is rather simple.\u00a0 They don&#8217;t want to [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55174,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7,5090,183],"tags":[4704,5547,5541],"class_list":["post-59544","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","category-slider","category-tips","tag-hackers","tag-hacking-systems","tag-vulnerabilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers Target Specifically Based on This One Thing<\/title>\n<meta name=\"description\" content=\"Hackers target based on one thing -- vulnerability. If users are keeping their endpoints vulnerable by not addressing the following things....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Target Specifically Based on This One Thing\" \/>\n<meta property=\"og:description\" content=\"Hackers target based on one thing -- vulnerability. If users are keeping their endpoints vulnerable by not addressing the following things....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-05T16:28:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-target-one-thing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-target-one-thing\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Hackers Target Specifically Based on This One Thing\",\"datePublished\":\"2018-09-05T16:28:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-target-one-thing\\\/\"},\"wordCount\":644,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-target-one-thing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBlueSlider.jpg\",\"keywords\":[\"hackers\",\"hacking systems\",\"vulnerabilities\"],\"articleSection\":[\"Newsletter\",\"TechTalk Slider\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-target-one-thing\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-target-one-thing\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-target-one-thing\\\/\",\"name\":\"Hackers Target Specifically Based on This One Thing\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-target-one-thing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-target-one-thing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBlueSlider.jpg\",\"datePublished\":\"2018-09-05T16:28:01+00:00\",\"description\":\"Hackers target based on one thing -- vulnerability. If users are keeping their endpoints vulnerable by not addressing the following things....\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-target-one-thing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-target-one-thing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-target-one-thing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBlueSlider.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBlueSlider.jpg\",\"width\":1920,\"height\":550,\"caption\":\"Security lock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/hackers-target-one-thing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Target Specifically Based on This One Thing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Target Specifically Based on This One Thing","description":"Hackers target based on one thing -- vulnerability. If users are keeping their endpoints vulnerable by not addressing the following things....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Target Specifically Based on This One Thing","og_description":"Hackers target based on one thing -- vulnerability. If users are keeping their endpoints vulnerable by not addressing the following things....","og_url":"https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2018-09-05T16:28:01+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Hackers Target Specifically Based on This One Thing","datePublished":"2018-09-05T16:28:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/"},"wordCount":644,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg","keywords":["hackers","hacking systems","vulnerabilities"],"articleSection":["Newsletter","TechTalk Slider","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/","url":"https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/","name":"Hackers Target Specifically Based on This One Thing","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg","datePublished":"2018-09-05T16:28:01+00:00","description":"Hackers target based on one thing -- vulnerability. If users are keeping their endpoints vulnerable by not addressing the following things....","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg","width":1920,"height":550,"caption":"Security lock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/hackers-target-one-thing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers Target Specifically Based on This One Thing"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=59544"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59544\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55174"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=59544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=59544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=59544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}