{"id":61343,"date":"2019-07-31T15:42:45","date_gmt":"2019-07-31T20:42:45","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=61343"},"modified":"2019-07-31T15:42:57","modified_gmt":"2019-07-31T20:42:57","slug":"simplifying-cyber-security","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/","title":{"rendered":"Cyber Security &#8211; Back to the Basics"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Simplifying Cyber Security<\/h3>\n\n\n\n<p>The concept of cyber security has become convoluted.\u00a0 Users aren\u2019t sure what software to buy, or if one program is even enough.\u00a0 Often times they\u2019ll try to use multiple products that all do the same thing, which in turn interferes with each one\u2019s functionality.<\/p>\n\n\n\n<p>In an attempt to make your life easier, PC Matic wants to go back to the basics for a moment.\u00a0 First, let&#8217;s talk about the two types of intrusions.\u00a0 <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Malicious software is running on your device<\/li><li>An unauthorized person is on your device or within your network without your permission. <\/li><\/ul>\n\n\n\n<p>\n\nThat\u2019s it.&nbsp; Two types of intrusions, people or software.\n\n<\/p>\n\n\n\n<p style=\"text-align:left\">Next, let&#8217;s simplify how to block these two intruders.\u00a0 It&#8217;s quite simple but has become a convoluted concept.   To block these intruders you must secure your devices.  How do you do that?  Only permit known trusted programs to execute.  This method, known as application whitelisting blocks any file or software that tries to run on the device that has not been proven secure.<\/p>\n\n\n\n<p>In theory, this is the same method of security you likely use for your home.\u00a0 You keep your doors locked, only allowing those you trust inside.\u00a0 From an IT perspective, you keep your device locked, only allowing known, trusted programs or files to run.\u00a0 <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Moving Forward\u2026<\/h4>\n\n\n\n<p>Over the last few years, attack vectors have continued to evolve.&nbsp; The two intrusions remain the same \u2014 people and software, but how they get into your system has advanced.<\/p>\n\n\n\n<p>Therefore, hackers are going outside of file-based attacks and worming their way into your devices through other methods such as <a href=\"https:\/\/techtalk.pcpitstop.com\/2017\/06\/16\/infographic-blacklist-whitelist\/\">fileless\u00a0infections<\/a>\u00a0and\u00a0<a href=\"https:\/\/techtalk.pcpitstop.com\/2018\/10\/02\/proactive-approach-rdp-attacks\/\">remote desktop attacks<\/a>.\u00a0 Finding a security solution that effectively thwarts all forms of attack vectors is imperative.\u00a0 This proves the\u00a0<a href=\"http:\/\/www.pcmatic.com\/\">security solution<\/a>\u00a0is evolving with security threats.<\/p>\n\n\n\n<p>If your security solution isn\u2019t thwarting all attack vectors, then it\u2019s time for a change.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Simplifying Cyber Security The concept of cyber security has become convoluted.\u00a0 Users aren\u2019t sure what software to buy, or if one program is even enough.\u00a0 Often times they\u2019ll try to use multiple products that all do the same thing, which in turn interferes with each one\u2019s functionality. In an attempt to make your life easier, [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":61135,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7,4949,183],"tags":[4880],"class_list":["post-61343","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","category-ransomware","category-tips","tag-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security - Back to the Basics<\/title>\n<meta name=\"description\" content=\"With the growing cyber threats, keeping your data and devices secure has never been more important. However, cyber security has become...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security - Back to the Basics\" \/>\n<meta property=\"og:description\" content=\"With the growing cyber threats, keeping your data and devices secure has never been more important. However, cyber security has become...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-31T20:42:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-07-31T20:42:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"441\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/simplifying-cyber-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/simplifying-cyber-security\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Cyber Security &#8211; Back to the Basics\",\"datePublished\":\"2019-07-31T20:42:45+00:00\",\"dateModified\":\"2019-07-31T20:42:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/simplifying-cyber-security\\\/\"},\"wordCount\":327,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/simplifying-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg\",\"keywords\":[\"tips\"],\"articleSection\":[\"Newsletter\",\"Ransomware\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/simplifying-cyber-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/simplifying-cyber-security\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/simplifying-cyber-security\\\/\",\"name\":\"Cyber Security - Back to the Basics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/simplifying-cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/simplifying-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg\",\"datePublished\":\"2019-07-31T20:42:45+00:00\",\"dateModified\":\"2019-07-31T20:42:57+00:00\",\"description\":\"With the growing cyber threats, keeping your data and devices secure has never been more important. However, cyber security has become...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/simplifying-cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/simplifying-cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/simplifying-cyber-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg\",\"width\":730,\"height\":441},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/simplifying-cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security &#8211; Back to the Basics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security - Back to the Basics","description":"With the growing cyber threats, keeping your data and devices secure has never been more important. However, cyber security has become...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security - Back to the Basics","og_description":"With the growing cyber threats, keeping your data and devices secure has never been more important. However, cyber security has become...","og_url":"https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2019-07-31T20:42:45+00:00","article_modified_time":"2019-07-31T20:42:57+00:00","og_image":[{"width":730,"height":441,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Cyber Security &#8211; Back to the Basics","datePublished":"2019-07-31T20:42:45+00:00","dateModified":"2019-07-31T20:42:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/"},"wordCount":327,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg","keywords":["tips"],"articleSection":["Newsletter","Ransomware","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/","url":"https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/","name":"Cyber Security - Back to the Basics","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg","datePublished":"2019-07-31T20:42:45+00:00","dateModified":"2019-07-31T20:42:57+00:00","description":"With the growing cyber threats, keeping your data and devices secure has never been more important. However, cyber security has become...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg","width":730,"height":441},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/simplifying-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Security &#8211; Back to the Basics"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/61343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=61343"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/61343\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/61135"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=61343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=61343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=61343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}