{"id":63832,"date":"2021-06-21T13:22:00","date_gmt":"2021-06-21T18:22:00","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=63832"},"modified":"2021-06-18T13:22:05","modified_gmt":"2021-06-18T18:22:05","slug":"ransomware-story","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/ransomware-story\/","title":{"rendered":"The Tale of Two Attacks &#8211; A Ransomware Story"},"content":{"rendered":"\n<p>This is a {ransomware} story, all about how my life got twisted upside down&#8230;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Background<\/h2>\n\n\n\n<p>I own a small business, less than 50 employees and I&#8217;m located in a mountain community in Colorado.  Our town is pretty close knit, but also has a rather high tourism volume.  Locals have the ability to charge products to their personal charge accounts, for which I bill monthly.  Overall, business is going well.  The winter tourism revenues were great, and a music festival will be coming to the region next week, which will certainly drive foot traffic to the store.  <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Mishap<\/h2>\n\n\n\n<p>I got an email from Shelly, our supplies distributor, this morning about an invoice that wasn&#8217;t paid.  After downloading it, everything went to&#8230;crap.  My entire computing system locked up.  I have access to nothing, and I mean nothing.  Something says I need to pay someone to decrypt it.  Whatever that means.  <\/p>\n\n\n\n<p>I called in my technical brother-in-law to see what the issue was.  He said I had ransomware, and told me not to pay the ransom demand.  Basically, these are cyber criminals and paying is risky.  Then, he asked where my backups where.  Backups &#8212; yea, those haven&#8217;t been updated since the fall.  We were just too busy this winter for that to even cross my mind.  I guess it should have&#8230;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Aftermath<\/h2>\n\n\n\n<p>I had to evaluate the risk versus reward when it came to paying the ransom demand.  As my brother-in-law informed me, it wasn&#8217;t a good idea.  But realistically, I was looking at taking a huge hit if I lost everything for the last six months.  From my accounting files, to charge account balances, to inventory&#8230;plus all of the productivity that I would lose trying to get everything back up.  <\/p>\n\n\n\n<p>I paid.  Just over six grand was the price tag to get my own files back from hackers who thought they should help themselves.  It look 10 days to get everything &#8220;decrypted&#8221; and we had to remain closed to the public during the music festival to get our house back in order.  We lost days in productivity, thousands in potential revenue, and our reputation took a big hit too.  <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Fast Forward<\/h2>\n\n\n\n<p>It has been over a year since our last ransomware attack.  I asked my employees to complete cybersecurity training so they could spot potential cyber attacks that are knocking at our doors.  I wish my ransomware story stopped there.  They came back.  <\/p>\n\n\n\n<p>Did you know CBS News just reported <a href=\"https:\/\/www.cbsnews.com\/news\/ransomware-victims-suffer-repeat-attacks-new-report\/\">80% of ransomware victims will be hit again<\/a>.  I fall into that statistic.  Fortunately, I did better about keeping my backups updated; however, have you ever tried to restore your network using backups?  It takes forever.  Financially, I can&#8217;t take the hit any more from the lost productivity and revenues.  If they get me again, I will be forced to close the doors for good. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Lesson of the Ransomware Story<\/h2>\n\n\n\n<p>Although this is a fictional story, it likely sounds far too familiar to a ransomware victim.  The idea of 80% of ransomware victims being subject to this crime again is also disheartening.  If they pay, the target gets bigger.  Instead of relying on reactive approaches, add an <a href=\"http:\/\/www.pcmatic.com\">application whitelisting solution<\/a> to your <a href=\"https:\/\/www.pcmatic.com\/blog\/2021\/06\/16\/adding-layer-security-stack\/\">existing cybersecurity stack<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is a {ransomware} story, all about how my life got twisted upside down&#8230; The Background I own a small business, less than 50 employees and I&#8217;m located in a mountain community in Colorado. Our town is pretty close knit, but also has a rather high tourism volume. Locals have the ability to charge products [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":63833,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4949],"tags":[4989,4363],"class_list":["post-63832","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","tag-application-whitelisting","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Tale of Two Attacks - A Ransomware Story<\/title>\n<meta name=\"description\" content=\"80% of ransomware victims become targets yet again. This ransomware story depicts what that looks like from a small business...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/ransomware-story\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Tale of Two Attacks - A Ransomware Story\" \/>\n<meta property=\"og:description\" content=\"80% of ransomware victims become targets yet again. This ransomware story depicts what that looks like from a small business...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/ransomware-story\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-21T18:22:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_245935813_adobespark.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"375\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-story\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-story\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"The Tale of Two Attacks &#8211; A Ransomware Story\",\"datePublished\":\"2021-06-21T18:22:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-story\\\/\"},\"wordCount\":550,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-story\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_245935813_adobespark.jpg\",\"keywords\":[\"application whitelisting\",\"ransomware\"],\"articleSection\":[\"Ransomware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-story\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-story\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-story\\\/\",\"name\":\"The Tale of Two Attacks - A Ransomware Story\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-story\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-story\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_245935813_adobespark.jpg\",\"datePublished\":\"2021-06-21T18:22:00+00:00\",\"description\":\"80% of ransomware victims become targets yet again. This ransomware story depicts what that looks like from a small business...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-story\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-story\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-story\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_245935813_adobespark.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_245935813_adobespark.jpg\",\"width\":500,\"height\":375,\"caption\":\"Ransomware victims experience a world of issues, with an 80% chance of being victimized again.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-story\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Tale of Two Attacks &#8211; A Ransomware Story\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Tale of Two Attacks - A Ransomware Story","description":"80% of ransomware victims become targets yet again. This ransomware story depicts what that looks like from a small business...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/ransomware-story\/","og_locale":"en_US","og_type":"article","og_title":"The Tale of Two Attacks - A Ransomware Story","og_description":"80% of ransomware victims become targets yet again. This ransomware story depicts what that looks like from a small business...","og_url":"https:\/\/www.pcmatic.com\/blog\/ransomware-story\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2021-06-21T18:22:00+00:00","og_image":[{"width":500,"height":375,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_245935813_adobespark.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-story\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-story\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"The Tale of Two Attacks &#8211; A Ransomware Story","datePublished":"2021-06-21T18:22:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-story\/"},"wordCount":550,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-story\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_245935813_adobespark.jpg","keywords":["application whitelisting","ransomware"],"articleSection":["Ransomware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/ransomware-story\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-story\/","url":"https:\/\/www.pcmatic.com\/blog\/ransomware-story\/","name":"The Tale of Two Attacks - A Ransomware Story","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-story\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-story\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_245935813_adobespark.jpg","datePublished":"2021-06-21T18:22:00+00:00","description":"80% of ransomware victims become targets yet again. This ransomware story depicts what that looks like from a small business...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-story\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/ransomware-story\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-story\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_245935813_adobespark.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_245935813_adobespark.jpg","width":500,"height":375,"caption":"Ransomware victims experience a world of issues, with an 80% chance of being victimized again."},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-story\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Tale of Two Attacks &#8211; A Ransomware Story"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/63832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=63832"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/63832\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/63833"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=63832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=63832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=63832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}