{"id":60288,"date":"2019-02-20T13:15:37","date_gmt":"2019-02-20T19:15:37","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=60288"},"modified":"2019-02-20T13:15:41","modified_gmt":"2019-02-20T19:15:41","slug":"smbs-cyber-security-steps","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/","title":{"rendered":"4 Critical Steps SMBs Must Take to Boost Cyber Security"},"content":{"rendered":"\n<p><g class=\"gr_ gr_5 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del\" id=\"5\" data-gr-id=\"5\">Cyber security<\/g> is a growing topic, whether it is at home with friends or family, or at work with the boss or colleagues.  Online threats have continued to advance year-over-year with <g class=\"gr_ gr_6 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del\" id=\"6\" data-gr-id=\"6\">cyber crime<\/g> costs consistently increasing.  With the growing risks, it is important small and medium businesses (SMBs) understand the key steps they need to take to boost their cyber security, keeping their data <g class=\"gr_ gr_63 gr-alert gr_gramm gr_inline_cards gr_run_anim Punctuation only-ins replaceWithoutSep\" id=\"63\" data-gr-id=\"63\">and<\/g> devices secure.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Update, Update, Update<\/h4>\n\n\n\n<p>Ensuring third-party applications and operating systems are updated in a timely fashion is critical.  It is during these updates that any known vulnerabilities are patched, closing security gaps from hacker exploitation.  By putting off these updates, SMBs are giving hackers an open invitation to infect their devices and steal company and consumer data. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Cyber Security Training<\/h4>\n\n\n\n<p>Employees can be a strong asset or the weakest link.  Unfortunately, when it comes to cyber security, they&#8217;re often the latter.  Employees are typically uneducated on current cyber <g class=\"gr_ gr_497 gr-alert gr_gramm gr_inline_cards gr_run_anim Punctuation only-del replaceWithoutSep\" id=\"497\" data-gr-id=\"497\">threats,<\/g> or do not comprehend the risks associated with cyber crime.  By taking the time to educate them on modern online threats including how to spot red flags associated with <g class=\"gr_ gr_605 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar only-ins replaceWithoutSep\" id=\"605\" data-gr-id=\"605\">cyber<\/g> crime, can <g class=\"gr_ gr_527 gr-alert gr_gramm gr_inline_cards gr_run_anim Style multiReplace\" id=\"527\" data-gr-id=\"527\">help  the<\/g> SMB develop a stronger line of defense.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Deploying a Proactive Antivirus<\/h4>\n\n\n\n<p>Most of today&#8217;s cyber security solutions are reactive.  They place a heavy emphasis on endpoint detection and response (EDR).  In addition, they use an outdated malware detection methodology, known as a blacklist.  This list will allow for all unknown files to run, only blocking known threats.  Unfortunately, with new threats evolving every day, keeping the blacklist updated is impossible.  Instead, SMBs must focus on being proactive.  The best proactive malware detection approach is the <g class=\"gr_ gr_63 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar only-ins replaceWithoutSep\" id=\"63\" data-gr-id=\"63\">deployment<\/g> of application whitelisting.  This detection methodology only allows for known, trusted programs to run.  All others will be blocked until proven secure.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Data Backups<\/h4>\n\n\n\n<p>Technology is great and has come a long way in the last 20 years.  However, that doesn&#8217;t mean all of the &#8220;hair pulling moments&#8221; have been resolved.  Whether it is inopportune timing for an update, a program fails, or the hard drive crashes &#8212; there will be times backups are critical.  SMBs should update their backups at least daily, possibly every hour, depending on business needs.  Additionally, these backups should be stored on an external device or cloud-based service.  If opting for an external device, it is important the backup device is only connected to the PC during the backup process.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security is a growing topic, whether it is at home with friends or family, or at work with the boss or colleagues. Online threats have continued to advance year-over-year with cyber crime costs consistently increasing. With the growing risks, it is important small and medium businesses (SMBs) understand the key steps they need to [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55214,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7],"tags":[5617,5043],"class_list":["post-60288","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","tag-cyber-security-tips","tag-smbs"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>4 Critical Steps SMBs Must Take to Boost Cyber Security<\/title>\n<meta name=\"description\" content=\"With the growing risks, it is important small and medium businesses (SMBs) understand the key steps they need to take to boost their...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 Critical Steps SMBs Must Take to Boost Cyber Security\" \/>\n<meta property=\"og:description\" content=\"With the growing risks, it is important small and medium businesses (SMBs) understand the key steps they need to take to boost their...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-20T19:15:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-02-20T19:15:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/smbs-cyber-security-steps\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/smbs-cyber-security-steps\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"4 Critical Steps SMBs Must Take to Boost Cyber Security\",\"datePublished\":\"2019-02-20T19:15:37+00:00\",\"dateModified\":\"2019-02-20T19:15:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/smbs-cyber-security-steps\\\/\"},\"wordCount\":411,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/smbs-cyber-security-steps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/keyBG.jpg\",\"keywords\":[\"cyber security tips\",\"SMBs\"],\"articleSection\":[\"Newsletter\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/smbs-cyber-security-steps\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/smbs-cyber-security-steps\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/smbs-cyber-security-steps\\\/\",\"name\":\"4 Critical Steps SMBs Must Take to Boost Cyber Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/smbs-cyber-security-steps\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/smbs-cyber-security-steps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/keyBG.jpg\",\"datePublished\":\"2019-02-20T19:15:37+00:00\",\"dateModified\":\"2019-02-20T19:15:41+00:00\",\"description\":\"With the growing risks, it is important small and medium businesses (SMBs) understand the key steps they need to take to boost their...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/smbs-cyber-security-steps\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/smbs-cyber-security-steps\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/smbs-cyber-security-steps\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/keyBG.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/keyBG.jpg\",\"width\":730,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/smbs-cyber-security-steps\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 Critical Steps SMBs Must Take to Boost Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"4 Critical Steps SMBs Must Take to Boost Cyber Security","description":"With the growing risks, it is important small and medium businesses (SMBs) understand the key steps they need to take to boost their...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/","og_locale":"en_US","og_type":"article","og_title":"4 Critical Steps SMBs Must Take to Boost Cyber Security","og_description":"With the growing risks, it is important small and medium businesses (SMBs) understand the key steps they need to take to boost their...","og_url":"https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2019-02-20T19:15:37+00:00","article_modified_time":"2019-02-20T19:15:41+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"4 Critical Steps SMBs Must Take to Boost Cyber Security","datePublished":"2019-02-20T19:15:37+00:00","dateModified":"2019-02-20T19:15:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/"},"wordCount":411,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg","keywords":["cyber security tips","SMBs"],"articleSection":["Newsletter"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/","url":"https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/","name":"4 Critical Steps SMBs Must Take to Boost Cyber Security","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg","datePublished":"2019-02-20T19:15:37+00:00","dateModified":"2019-02-20T19:15:41+00:00","description":"With the growing risks, it is important small and medium businesses (SMBs) understand the key steps they need to take to boost their...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/keyBG.jpg","width":730,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/smbs-cyber-security-steps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"4 Critical Steps SMBs Must Take to Boost Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/60288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=60288"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/60288\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55214"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=60288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=60288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=60288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}