{"id":59561,"date":"2018-09-13T08:44:51","date_gmt":"2018-09-13T13:44:51","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=59561"},"modified":"2018-11-12T09:34:55","modified_gmt":"2018-11-12T15:34:55","slug":"untargeted-targeted-attacks-untargeted","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/","title":{"rendered":"Targeted Attacks or Untargeted Attacks &#8211; Which is Most Common?"},"content":{"rendered":"<h3>Targeted and Untargeted Cyber Attacks<\/h3>\n<p>Before discussing the attack methods of hackers, targeted or untargeted, we first must understand the difference between the two.<\/p>\n<p>First, untargeted attacks are when hackers have no specific vertical, business, or person they are attacking.\u00a0 Instead, they simply cast as wide of a net as possible, and send out the malicious email, links, etc. hoping to infect as many people as they can.<\/p>\n<p>Targeted attacks are cyber attacks specifically designed to infect a particular industry, person, business, or event.\u00a0 For instance, the cyber attacks that hit this year&#8217;s opening Olympic ceremonies, the City of Atlanta, or Colorado&#8217;s Department of Transportation are all examples of targeted attacks.\u00a0 In addition, certain ransomware variants like SamSam are known to be used in a targeted fashion, with <a href=\"https:\/\/www.deccanchronicle.com\/technology\/in-other-news\/091118\/samsam-targeted-ransomware-attacks-continue.html\">24% of their attacks in 2018<\/a> hitting the healthcare industry.<\/p>\n<h4>But which is most common?<\/h4>\n<p>Untargeted attacks are far more common than a targeted attack, for two primary reasons.\u00a0 First, it is easier to execute.\u00a0 Instead of trying to determine how to infiltrate a specific system, hackers simply create a generic email with malicious content such as an attachment or link.\u00a0 From there, they will send it out to every email address they have access to.\u00a0 Depending on the form of malware used in the email, this may lead to extortion from ransomware, installing keyloggers to track user credentials, the installation of spyware, or breaching company and\/or personal data.\u00a0 Since they have no targeted audience, the content in the email is kept very vague, so it may be applicable to everyone.\u00a0 For instance, it may be a fake tracking link for a recent &#8220;purchase&#8221;.<\/p>\n<h4>Which are more destructive?<\/h4>\n<p>Although untargeted attacks are more common, targeted attacks tend to cause far more destruction.\u00a0 In order for a targeted attack to occur, there must be two things &#8212; a desire to cause damage, and the knowledge to do so.\u00a0 In targeted attacks, hackers will often target an entire vertical, such as the financial sector or healthcare industry.\u00a0 The industry they opt to attack is contingent upon the type of cyber attack they&#8217;re executing.<\/p>\n<p>For instance, if their end goal is to make money, they&#8217;ll likely use ransomware and go after an industry heavily reliant on IT services, such as hospitals or banks.\u00a0 However, if hackers are targeting credit card information to sell on the dark web, they will target a large retail store.\u00a0 The malware variant used is hand-picked, based on the specific target to generate the most destruction.<\/p>\n<h4>Avoiding Falling Victim<\/h4>\n<p>By clicking on a malicious email, you open yourself up to malicious cyber activity, not only on your device, but any other device connected to the network.\u00a0 Therefore, to keep your network secure, all users must understand the red flags to be on the lookout for.\u00a0 To avoid falling victim to a cyber attack, users should do the following:<\/p>\n<ul>\n<li>Look at the &#8220;from&#8221; address in the email and ensure it is someone you know<\/li>\n<li>Check the &#8220;reply to&#8221; address and confirm it would go to who it&#8217;s supposed to<\/li>\n<li>Look for grammatical and spelling errors within the email<\/li>\n<li>Hover over the link to see where the destination URL is going to take you<\/li>\n<li>Review recent purchases to determine if you should be expecting this &#8220;invoice&#8221; or &#8220;tracking info&#8221;<\/li>\n<\/ul>\n<p>If you ever question the legitimacy of an email, call the business or person it is allegedly from to confirm its authenticity.<\/p>\n<p>Also, ensure your device&#8217;s operating system and third-party applications are updated.\u00a0 By doing so, all known vulnerabilities will be patched avoiding the ability for them to be exploited by cyber criminals.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Targeted and Untargeted Cyber Attacks Before discussing the attack methods of hackers, targeted or untargeted, we first must understand the difference between the two. First, untargeted attacks are when hackers have no specific vertical, business, or person they are attacking.\u00a0 Instead, they simply cast as wide of a net as possible, and send out the [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55145,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7,183],"tags":[4599,5553,5554],"class_list":["post-59561","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","category-tips","tag-cyber-attacks","tag-targeted-attacks","tag-untargeted-attacks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Targeted Attacks or Untargeted Attacks - Which is Most Common?<\/title>\n<meta name=\"description\" content=\"There are two varations of cyber attacks, untargeted and targeted attacks. Of those, which is more frequently used, and which generates the most damage....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Targeted Attacks or Untargeted Attacks - Which is Most Common?\" \/>\n<meta property=\"og:description\" content=\"There are two varations of cyber attacks, untargeted and targeted attacks. Of those, which is more frequently used, and which generates the most damage....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-13T13:44:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-11-12T15:34:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/emailBG.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/untargeted-targeted-attacks-untargeted\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/untargeted-targeted-attacks-untargeted\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Targeted Attacks or Untargeted Attacks &#8211; Which is Most Common?\",\"datePublished\":\"2018-09-13T13:44:51+00:00\",\"dateModified\":\"2018-11-12T15:34:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/untargeted-targeted-attacks-untargeted\\\/\"},\"wordCount\":614,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/untargeted-targeted-attacks-untargeted\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/emailBG.jpg\",\"keywords\":[\"cyber attacks\",\"targeted attacks\",\"untargeted attacks\"],\"articleSection\":[\"Newsletter\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/untargeted-targeted-attacks-untargeted\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/untargeted-targeted-attacks-untargeted\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/untargeted-targeted-attacks-untargeted\\\/\",\"name\":\"Targeted Attacks or Untargeted Attacks - Which is Most Common?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/untargeted-targeted-attacks-untargeted\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/untargeted-targeted-attacks-untargeted\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/emailBG.jpg\",\"datePublished\":\"2018-09-13T13:44:51+00:00\",\"dateModified\":\"2018-11-12T15:34:55+00:00\",\"description\":\"There are two varations of cyber attacks, untargeted and targeted attacks. Of those, which is more frequently used, and which generates the most damage....\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/untargeted-targeted-attacks-untargeted\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/untargeted-targeted-attacks-untargeted\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/untargeted-targeted-attacks-untargeted\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/emailBG.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/emailBG.jpg\",\"width\":730,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/untargeted-targeted-attacks-untargeted\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Targeted Attacks or Untargeted Attacks &#8211; Which is Most Common?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Targeted Attacks or Untargeted Attacks - Which is Most Common?","description":"There are two varations of cyber attacks, untargeted and targeted attacks. Of those, which is more frequently used, and which generates the most damage....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/","og_locale":"en_US","og_type":"article","og_title":"Targeted Attacks or Untargeted Attacks - Which is Most Common?","og_description":"There are two varations of cyber attacks, untargeted and targeted attacks. Of those, which is more frequently used, and which generates the most damage....","og_url":"https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2018-09-13T13:44:51+00:00","article_modified_time":"2018-11-12T15:34:55+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/emailBG.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Targeted Attacks or Untargeted Attacks &#8211; Which is Most Common?","datePublished":"2018-09-13T13:44:51+00:00","dateModified":"2018-11-12T15:34:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/"},"wordCount":614,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/emailBG.jpg","keywords":["cyber attacks","targeted attacks","untargeted attacks"],"articleSection":["Newsletter","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/","url":"https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/","name":"Targeted Attacks or Untargeted Attacks - Which is Most Common?","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/emailBG.jpg","datePublished":"2018-09-13T13:44:51+00:00","dateModified":"2018-11-12T15:34:55+00:00","description":"There are two varations of cyber attacks, untargeted and targeted attacks. Of those, which is more frequently used, and which generates the most damage....","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/emailBG.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/emailBG.jpg","width":730,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/untargeted-targeted-attacks-untargeted\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Targeted Attacks or Untargeted Attacks &#8211; Which is Most Common?"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=59561"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59561\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55145"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=59561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=59561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=59561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}