{"id":60088,"date":"2019-01-23T10:45:37","date_gmt":"2019-01-23T16:45:37","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=60088"},"modified":"2019-01-23T12:57:18","modified_gmt":"2019-01-23T18:57:18","slug":"automated-whitelisting","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/","title":{"rendered":"All Whitelisting Solutions Are Not Created Equal"},"content":{"rendered":"<h3>Whitelisting is Effective, but Automating is a Must&#8230;<\/h3>\n<p>With cyber security threats growing, businesses must take a proactive approach to their data and device security.\u00a0\u00a0According to <a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/hacking-for-the-holidays-healthcare-ransomware-edition\/\">SC Magazine<\/a>, there is one methodology that has been proven to be effective in blocking modern cyber threats, including ransomware.<\/p>\n<blockquote><p>&#8220;According to numerous resources on ransomware, one strong and effective technique for dealing with end-user equipment is to implement application whitelisting.&#8221;<\/p><\/blockquote>\n<p>However, the use of whitelisting isn&#8217;t always efficient.\u00a0\u00a0Philip Moya, IT director at the San Antonio Gastroenterology Associates, tested the implementation process of an unnamed whitelisting solution. \u00a0 After conducting his study, he <a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/hacking-for-the-holidays-healthcare-ransomware-edition\/\">reported<\/a>,<\/p>\n<blockquote><p>&#8220;&#8230;without helpful automation, the amount of time and effort involved in whitelisting makes it impractical and infeasible.&#8221;<\/p><\/blockquote>\n<p>For those considering the use of whitelisting, this feedback is incredibly valuable.\u00a0 Users must understand how whitelist solutions may, or may not, automate the process of whitelisting.\u00a0 Without proper automation, the IT admin could face a significant increase in workload and a decrease in office productivity.<\/p>\n<h4>What Does PC Matic Automate?<\/h4>\n<p><span style=\"font-weight: 400;\"><a href=\"http:\/\/www.pcmatic.com\/pro\">PC Matic<\/a> focuses on automating the process of whitelisting new, good applications that are unknown. Good software applications are constantly being created or updated and released to be installed by consumers all over the globe. This presents challenges for IT Admins that must stay on top of the applications their employees need to utilize. Instead of leaving this work to the IT Admin, PC Matic automates the process and tackles 99% of the work with Global Whitelisting. <\/span><\/p>\n<h4>How Does PC Matic Automate the Whitelisting Process?<\/h4>\n<p><span style=\"font-weight: 400;\">When a PC Matic user attempts to run an unknown application, it\u2019s immediately blocked from executing. However, the chain of events doesn\u2019t stop there for the PC Matic team. In fact, it\u2019s just beginning. Following the block, if this is the first time any of their customers have run this file, information about the file including the file itself is uploaded to PC Matic servers behind the scenes. This requires no action by the user or IT Admin. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Next, that application enters several stages of confidential analysis by the PC Matic malware research team and their automated protocols. If the application is deemed good, it will be added to the global whitelist for all PC Matic users to run immediately. If the application is bad it will be quarantined and removed from endpoints in the future. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This whitelisting process also applies to another aspect of an application: digital signatures. Digitally Signed software follows best practice recommendations by most experts and Microsoft themselves. It also ensures that software is coming from that publisher and hasn\u2019t been tampered with or altered along the way. PC Matic\u2019s research team maintains an expansive list of trusted software publishers allowing any software they have digitally signed with a valid signature to run without ever being blocked or going through a categorization process. This process helps to reduce the need to individually whitelist every single good application in existence. \u00a0<\/span><\/p>\n<h4>How does that differ from normal whitelist solutions?<\/h4>\n<p><span style=\"font-weight: 400;\">Traditional whitelist solutions offer the same default-deny security approach that PC Matic does, however they require the admin to take on all of the work. All applications must be approved to run in the environment. This can often entail weeks worth of work over the learning process to begin installs. Following a full deployment, the work doesn\u2019t end.\u00a0 Now, each new unknown application that wasn\u2019t in the original whitelist needs to be vetted by the IT Admin and a determination must be made whether it should be whitelisted or not. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Several newer whitelisting solutions have added ways to make whitelisting slightly easier. This often includes starting with a known clean golden image to build the whitelist and then creating all other computers from that image. This could work great for a new environment but not an existing one. There are also ways to whitelist by directory or folder on the machine.\u00a0 This is not, however, the best option, as it may open up security holes allowing anything that executes out of that directory to be trusted.<\/span><\/p>\n<h4>Finding the Right Solution<\/h4>\n<p>There is no doubt, whitelisting is the most effective means to block modern cyber threats.\u00a0 However, from a business perspective, a security solution cannot just be effective, it must also be efficient.\u00a0 Running a program that interferes with daily tasks, decreases productivity, or creates more work for the admin is not feasible.<\/p>\n<p>Until recently, application whitelisting was known as an effective, but inefficient solution to data and device security.\u00a0 Now, there is a\u00a0<a href=\"http:\/\/www.pcmatic.com\/pro\">whitelist\u00a0option\u00a0available<\/a> that is not only effective but properly protects network devices and data without impacting the functionality and efficiency of business operations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whitelisting is Effective, but Automating is a Must&#8230; With cyber security threats growing, businesses must take a proactive approach to their data and device security.\u00a0\u00a0According to SC Magazine, there is one methodology that has been proven to be effective in blocking modern cyber threats, including ransomware. &#8220;According to numerous resources on ransomware, one strong and [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55214,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7,4959],"tags":[4354],"class_list":["post-60088","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","category-whitelisting","tag-whitelisting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>All Whitelisting Solutions Are Not Created Equal<\/title>\n<meta name=\"description\" content=\"Whitelisting has been identified as the strongest technique to effectively block modern cyber threats; however, there are concerns with...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"All Whitelisting Solutions Are Not Created Equal\" \/>\n<meta property=\"og:description\" content=\"Whitelisting has been identified as the strongest technique to effectively block modern cyber threats; however, there are concerns with...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-23T16:45:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-01-23T18:57:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/automated-whitelisting\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/automated-whitelisting\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"All Whitelisting Solutions Are Not Created Equal\",\"datePublished\":\"2019-01-23T16:45:37+00:00\",\"dateModified\":\"2019-01-23T18:57:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/automated-whitelisting\\\/\"},\"wordCount\":786,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/automated-whitelisting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/keyBG.jpg\",\"keywords\":[\"whitelisting\"],\"articleSection\":[\"Newsletter\",\"Whitelisting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/automated-whitelisting\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/automated-whitelisting\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/automated-whitelisting\\\/\",\"name\":\"All Whitelisting Solutions Are Not Created Equal\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/automated-whitelisting\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/automated-whitelisting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/keyBG.jpg\",\"datePublished\":\"2019-01-23T16:45:37+00:00\",\"dateModified\":\"2019-01-23T18:57:18+00:00\",\"description\":\"Whitelisting has been identified as the strongest technique to effectively block modern cyber threats; however, there are concerns with...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/automated-whitelisting\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/automated-whitelisting\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/automated-whitelisting\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/keyBG.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/keyBG.jpg\",\"width\":730,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/automated-whitelisting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"All Whitelisting Solutions Are Not Created Equal\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"All Whitelisting Solutions Are Not Created Equal","description":"Whitelisting has been identified as the strongest technique to effectively block modern cyber threats; however, there are concerns with...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/","og_locale":"en_US","og_type":"article","og_title":"All Whitelisting Solutions Are Not Created Equal","og_description":"Whitelisting has been identified as the strongest technique to effectively block modern cyber threats; however, there are concerns with...","og_url":"https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2019-01-23T16:45:37+00:00","article_modified_time":"2019-01-23T18:57:18+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"All Whitelisting Solutions Are Not Created Equal","datePublished":"2019-01-23T16:45:37+00:00","dateModified":"2019-01-23T18:57:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/"},"wordCount":786,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg","keywords":["whitelisting"],"articleSection":["Newsletter","Whitelisting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/","url":"https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/","name":"All Whitelisting Solutions Are Not Created Equal","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg","datePublished":"2019-01-23T16:45:37+00:00","dateModified":"2019-01-23T18:57:18+00:00","description":"Whitelisting has been identified as the strongest technique to effectively block modern cyber threats; however, there are concerns with...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg","width":730,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/automated-whitelisting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"All Whitelisting Solutions Are Not Created Equal"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/60088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=60088"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/60088\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55214"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=60088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=60088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=60088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}