{"id":60721,"date":"2019-03-11T15:34:11","date_gmt":"2019-03-11T20:34:11","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=60721"},"modified":"2019-03-11T15:34:30","modified_gmt":"2019-03-11T20:34:30","slug":"rsa-takeaways","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/","title":{"rendered":"A Major Message of RSA"},"content":{"rendered":"\n<p>According to one of the world&#8217;s largest cyber security conferences, RSA, there is no way to reliably stop future cyber attacks.  This sounds rather dismal.  Yet, depending on the security approach being deployed, it may be entirely accurate. <\/p>\n\n\n\n<p>In order to effectively stop future cyber attacks, there are proactive approaches businesses of all shapes and sizes must consider when evaluating their cyber security solutions.  <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Application Whitelisting<\/h4>\n\n\n\n<p>The use of <a href=\"http:\/\/www.pcmatic.com\/pro\/whitelist\">application whitelisting<\/a> as an organization&#8217;s primary means of malware detection will effectively thwart malicious files from being able to run on endpoints and servers.  Unfortunately, application whitelisting does come with a few negative connotations.  First, the risk of false positives, or the software misclassifying a safe program as potentially malicious.  Second, the misconception that application whitelisting requires an increase in backend work from the IT professionals or admin team.  This could be true, depending on the security solution.  However, this is why it&#8217;s critical when deploying an application whitelist, users find a solution that uses an automated global whitelist.  Therefore, the creation, maintenance <g class=\"gr_ gr_239 gr-alert gr_gramm gr_inline_cards gr_run_anim Punctuation only-ins replaceWithoutSep\" id=\"239\" data-gr-id=\"239\">and<\/g> testing <g class=\"gr_ gr_274 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar multiReplace\" id=\"274\" data-gr-id=\"274\">does<\/g> not fall on the shoulders of the organization&#8217;s IT team. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Malicious Script Blocking<\/h4>\n\n\n\n<p>Other major messages from RSA were certainly correct.  For instance, cyber criminals are finding more and more ways to exploit systems to install malware.  One of these ways is by bypassing executable files and targeting scripting agents like PowerShell and WScript.  Unfortunately, few security solutions are doing anything about this.  Finding a <a href=\"http:\/\/www.pcmatic.com\/pro\">security program<\/a> that effectively blocks malicious scripting attacks has been, and will continue to be critical.  <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Protecting RDP Ports<\/h4>\n\n\n\n<p>In addition to exploiting scripting agents, hackers are also targeting remote access ports.  Why?  Because these ports are often left enabled leaving an easy access point for hackers to brute force their way in.  Users must conduct an audit of these open ports, evaluate if they need to remain enabled and establish proper controls if they cannot be disabled.  <\/p>\n\n\n\n<p>Some <a href=\"http:\/\/www.pcmatic.com\/pro\">security solutions <\/a>will help with this audit process, as well as the deployment of controls to minimize risk of intrusion.  But not all.  <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Conclusion<\/h4>\n\n\n\n<p>Although there has been an overall theory that one cannot fully protect from what the future of <g class=\"gr_ gr_4 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del\" id=\"4\" data-gr-id=\"4\">cyber security<\/g> may hold, there are appropriate steps IT professionals can take to effectively thwart modern <g class=\"gr_ gr_5 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del\" id=\"5\" data-gr-id=\"5\">cyber security<\/g> attacks.  With the use of application whitelisting, malicious script blocking, and proper controls to thwart brute force attacks through RDP ports, businesses will be highly secured from modern threats.  However, to stay secure, the organization&#8217;s security solution but also be advancing and evolving with the latest cyber threats.  Therefore, it is important users find a <a href=\"http:\/\/www.pcmatic.com\/pro\">security solution vendor<\/a> that is innovative and displays a strong proactive mission to malware <g class=\"gr_ gr_987 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling\" id=\"987\" data-gr-id=\"987\">detec<\/g>tion. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to one of the world&#8217;s largest cyber security conferences, RSA, there is no way to reliably stop future cyber attacks. This sounds rather dismal. Yet, depending on the security approach being deployed, it may be entirely accurate. In order to effectively stop future cyber attacks, there are proactive approaches businesses of all shapes and [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":60445,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7,183],"tags":[4773,5621],"class_list":["post-60721","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","category-tips","tag-cyber-security","tag-rsa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Major Message of RSA<\/title>\n<meta name=\"description\" content=\"According to one of the world&#039;s largest cyber security conferences, RSA, there is no way to reliably stop future cyber attacks...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Major Message of RSA\" \/>\n<meta property=\"og:description\" content=\"According to one of the world&#039;s largest cyber security conferences, RSA, there is no way to reliably stop future cyber attacks...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-11T20:34:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-11T20:34:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/PCMatic_protective_cover.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/rsa-takeaways\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/rsa-takeaways\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"A Major Message of RSA\",\"datePublished\":\"2019-03-11T20:34:11+00:00\",\"dateModified\":\"2019-03-11T20:34:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/rsa-takeaways\\\/\"},\"wordCount\":458,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/rsa-takeaways\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/PCMatic_protective_cover.jpg\",\"keywords\":[\"cyber security\",\"RSA\"],\"articleSection\":[\"Newsletter\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/rsa-takeaways\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/rsa-takeaways\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/rsa-takeaways\\\/\",\"name\":\"A Major Message of RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/rsa-takeaways\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/rsa-takeaways\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/PCMatic_protective_cover.jpg\",\"datePublished\":\"2019-03-11T20:34:11+00:00\",\"dateModified\":\"2019-03-11T20:34:30+00:00\",\"description\":\"According to one of the world's largest cyber security conferences, RSA, there is no way to reliably stop future cyber attacks...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/rsa-takeaways\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/rsa-takeaways\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/rsa-takeaways\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/PCMatic_protective_cover.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/PCMatic_protective_cover.jpg\",\"width\":730,\"height\":414},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/rsa-takeaways\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Major Message of RSA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Major Message of RSA","description":"According to one of the world's largest cyber security conferences, RSA, there is no way to reliably stop future cyber attacks...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/","og_locale":"en_US","og_type":"article","og_title":"A Major Message of RSA","og_description":"According to one of the world's largest cyber security conferences, RSA, there is no way to reliably stop future cyber attacks...","og_url":"https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2019-03-11T20:34:11+00:00","article_modified_time":"2019-03-11T20:34:30+00:00","og_image":[{"width":730,"height":414,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/PCMatic_protective_cover.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"A Major Message of RSA","datePublished":"2019-03-11T20:34:11+00:00","dateModified":"2019-03-11T20:34:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/"},"wordCount":458,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/PCMatic_protective_cover.jpg","keywords":["cyber security","RSA"],"articleSection":["Newsletter","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/","url":"https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/","name":"A Major Message of RSA","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/PCMatic_protective_cover.jpg","datePublished":"2019-03-11T20:34:11+00:00","dateModified":"2019-03-11T20:34:30+00:00","description":"According to one of the world's largest cyber security conferences, RSA, there is no way to reliably stop future cyber attacks...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/PCMatic_protective_cover.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/PCMatic_protective_cover.jpg","width":730,"height":414},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/rsa-takeaways\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Major Message of RSA"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/60721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=60721"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/60721\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/60445"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=60721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=60721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=60721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}