{"id":60000,"date":"2019-01-07T11:11:58","date_gmt":"2019-01-07T17:11:58","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=60000"},"modified":"2019-01-07T11:11:58","modified_gmt":"2019-01-07T17:11:58","slug":"billions-breached-avoid-future-issues","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/","title":{"rendered":"Avoiding Future Failures After Billions Were Breached in 2018"},"content":{"rendered":"<h3>2018 Was a Year of Breaches &#8212; And It Likely Won&#8217;t Get Better<\/h3>\n<p>Whether we admit it or not, breaches have become an expectation in today&#8217;s society.\u00a0 So much so, <a href=\"https:\/\/www.fox16.com\/news\/local-news\/billions-affected-by-data-breaches-in-2018\/1688410470\">Fox News Channel 16<\/a> reported it is one of the three certainties of life, along with death and taxes.\u00a0 Somber note &#8212; but honestly rather accurate considering one billion people had their data stolen in 2018.<\/p>\n<p>So how do you know if you&#8217;ve fallen, victim?\u00a0 And how do you protect your data moving forward?\u00a0 We will start with the former.<\/p>\n<p>First, it is the company&#8217;s responsibility to notify all potentially impacted customers of a data breach.\u00a0 However, it is best for customers to also stay diligent and not rely on these notifications.\u00a0 Therefore, to determine if your information has been compromised, here are a few tips:<\/p>\n<ul>\n<li>Use free credit reporting tools to check up on current credit scores and recent activity<\/li>\n<li>Go to <a href=\"https:\/\/haveibeenpwned.com\/\">haveibeenpwnd.com<\/a>\u00a0and enter your email address to determine if it has been compromised<\/li>\n<\/ul>\n<p>To be fair, if your personal data was stolen, but has not yet been used maliciously, neither of these two tips will help.\u00a0 This is why we recommend all of our users enroll in an identity theft protection program, like <a href=\"https:\/\/www.idshield.com\/benefits\/pcmatic?ad_id=505577&amp;share-ad-id=1\">IDShield<\/a>.\u00a0 Programs such as these will notify a user once their data is used in a questionable manner &#8211; like a new line of credit, change of address, new medical information, etc.<\/p>\n<h4>Other means of protecting your data include:<\/h4>\n<ul>\n<li><strong>Stop disclosing everything online<\/strong> &#8211; Blunt but true.\u00a0 Thanks to social media almost anyone can find out where you work, how long you&#8217;ve worked there, your marital status, birth date, anniversary date, children&#8217;s names, where you grew up, what high school you graduated from, your pet&#8217;s name &#8212; I could really go on and on.\u00a0 My point is, many people use the answers to these questions as security answers to access accounts, or worse &#8212; passwords.<\/li>\n<li><strong>Clicking with caution<\/strong> &#8211; Most malware is spread through email attachments.\u00a0 Users need to take the time to read emails and check their legitimacy before clicking on links or attachments.\u00a0 Also, curiosity killed the cat &#8212; if you aren&#8217;t expecting an email from Amazon with a tracking number &#8212; it&#8217;s likely a fraud and before clicking &#8220;just to see what it is&#8221; &#8212; delete!\u00a0 Why?\u00a0 Because it&#8217;s likely malware.<\/li>\n<li><strong>Better password protection<\/strong> &#8211; This is basic knowledge, but is worth saying again.\u00a0 Use advanced passwords that include an upper case, lower case, symbol, and number &#8212; and do not use the same password for every account you have under the sun.\u00a0 You should also not keep these passwords stored in a Word document or Post-It on your PC.\u00a0 All of these, are examples of poor password management.<\/li>\n<li><strong>Be selective about who you give your data to<\/strong> &#8211; This goes for creating website profiles,\u00a0registering for coupon deals, and storing your payment information on various retail sites.\u00a0 Although it may be convenient to store the payment data for faster checkouts in the future, you&#8217;re also releasing that information to a third party that may or may not be able to keep it secure.\u00a0 That is the risk you take.\u00a0 This is the same risk users take by sharing their email addresses, names, birth dates, and more, on various websites.<\/li>\n<li><strong>Keep your systems updated\u00a0<\/strong>&#8211; this includes third-party applications and your operating systems.\u00a0 Updates often patch known vulnerabilities.\u00a0 If you opt not to update, you&#8217;re leaving these security gaps open to hackers.<\/li>\n<li><strong>Deploy an application whitelist security solution\u00a0<\/strong>&#8211; This will avoid any malicious programs from executing on your device, keeping it malware-free.<\/li>\n<\/ul>\n<p>Again, once you hand your data over to a third-party, you are trusting them to keep it secure.\u00a0 However, you too must be cognizant of how you&#8217;re protecting your data and safeguard it accordingly.\u00a0 If you have any more suggestions, feel free to drop a comment below!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2018 Was a Year of Breaches &#8212; And It Likely Won&#8217;t Get Better Whether we admit it or not, breaches have become an expectation in today&#8217;s society.\u00a0 So much so, Fox News Channel 16 reported it is one of the three certainties of life, along with death and taxes.\u00a0 Somber note &#8212; but honestly rather [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55127,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7],"tags":[5036,5183],"class_list":["post-60000","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","tag-breaches","tag-security-breaches"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Avoiding Future Failures After Billions Were Breached in 2018<\/title>\n<meta name=\"description\" content=\"In 2018, one billion people had their information breached in some capacity. A scary thought, considering our increased dependency on...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Avoiding Future Failures After Billions Were Breached in 2018\" \/>\n<meta property=\"og:description\" content=\"In 2018, one billion people had their information breached in some capacity. A scary thought, considering our increased dependency on...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-07T17:11:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/billions-breached-avoid-future-issues\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/billions-breached-avoid-future-issues\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Avoiding Future Failures After Billions Were Breached in 2018\",\"datePublished\":\"2019-01-07T17:11:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/billions-breached-avoid-future-issues\\\/\"},\"wordCount\":668,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/billions-breached-avoid-future-issues\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG.jpg\",\"keywords\":[\"breaches\",\"security breaches\"],\"articleSection\":[\"Newsletter\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/billions-breached-avoid-future-issues\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/billions-breached-avoid-future-issues\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/billions-breached-avoid-future-issues\\\/\",\"name\":\"Avoiding Future Failures After Billions Were Breached in 2018\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/billions-breached-avoid-future-issues\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/billions-breached-avoid-future-issues\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG.jpg\",\"datePublished\":\"2019-01-07T17:11:58+00:00\",\"description\":\"In 2018, one billion people had their information breached in some capacity. A scary thought, considering our increased dependency on...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/billions-breached-avoid-future-issues\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/billions-breached-avoid-future-issues\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/billions-breached-avoid-future-issues\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG.jpg\",\"width\":730,\"height\":410,\"caption\":\"Computer Virus Software\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/billions-breached-avoid-future-issues\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Avoiding Future Failures After Billions Were Breached in 2018\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Avoiding Future Failures After Billions Were Breached in 2018","description":"In 2018, one billion people had their information breached in some capacity. A scary thought, considering our increased dependency on...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/","og_locale":"en_US","og_type":"article","og_title":"Avoiding Future Failures After Billions Were Breached in 2018","og_description":"In 2018, one billion people had their information breached in some capacity. A scary thought, considering our increased dependency on...","og_url":"https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2019-01-07T17:11:58+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Avoiding Future Failures After Billions Were Breached in 2018","datePublished":"2019-01-07T17:11:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/"},"wordCount":668,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg","keywords":["breaches","security breaches"],"articleSection":["Newsletter"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/","url":"https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/","name":"Avoiding Future Failures After Billions Were Breached in 2018","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg","datePublished":"2019-01-07T17:11:58+00:00","description":"In 2018, one billion people had their information breached in some capacity. A scary thought, considering our increased dependency on...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg","width":730,"height":410,"caption":"Computer Virus Software"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/billions-breached-avoid-future-issues\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Avoiding Future Failures After Billions Were Breached in 2018"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/60000","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=60000"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/60000\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55127"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=60000"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=60000"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=60000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}