{"id":63947,"date":"2021-07-07T12:01:59","date_gmt":"2021-07-07T17:01:59","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=63947"},"modified":"2021-07-07T12:02:05","modified_gmt":"2021-07-07T17:02:05","slug":"staying-cyber-secure","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/","title":{"rendered":"Keeping Your Organization Cyber Secure Amidst Global Threats"},"content":{"rendered":"\n<p>If you were looking, cyber threats have been in the news for years.  However, they&#8217;ve been shoved into the limelight over the last few months, between the ransomware attack on the water treatment plant in Florida, Colonial Pipeline, and now Kaseya.  The news has left the world  wondering <strong>what to do to stay cyber secure<\/strong>.  What can they possibly include in their security stack to keep their organization from becoming the next headline?  Do they need to rip and replace their entire infrastructure in order to strengthen it?  <\/p>\n\n\n\n<p>The problem is two fold.  First, no one is providing a clear direction on what organizations should be doing.  They may share best practices, like timely backups and patch management.  But what else?  And are these simply recommendations or are they required?  <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What to do to stay cyber secure<\/h2>\n\n\n\n<p>Organizations must be proactive.  Timely backups and patch management are important.  However, to ensure your digital infrastructure is as secure as possible, you must <strong>deploy a default-deny approach<\/strong> to malware detection.  This is not a new concept.  As a matter of fact there are solutions that have been deploying this method of malware detection for <strong>over a decade<\/strong>.  However, today there are several vendors who are claiming to use a default-deny approach, like application whitelisting, as a proactive means of malware detection.  And they do.  However, it is important to understand <em>how<\/em>. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"793\" height=\"509\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/awl.png\" alt=\"\" class=\"wp-image-63949\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/awl.png 793w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/awl-768x493.png 768w\" sizes=\"(max-width: 793px) 100vw, 793px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Why is PC Matic Pro Different? <\/h3>\n\n\n\n<p>First, and foremost, <a href=\"http:\/\/www.pcmatic.com\/pro\">PC Matic Pro<\/a> offers an <strong>automated global whitelist<\/strong>.  This means, IT professionals are not responsible for creating a list of known good applications from the ground up.  When PC Matic Pro is installed, the organization uses the automated global whitelist that PC Matic Pro has developed and maintained for the last ten years.  Now, let&#8217;s touch on that <em>maintained<\/em> part.  <\/p>\n\n\n\n<p>PC Matic has a team of trained, malware research professionals who are responsible for testing each unknown file that tries to execute on any of their customer&#8217;s devices.  This not only removes the testing burden off of the organization&#8217;s IT department, but by moving the heavy analysis to their own servers, <a href=\"http:\/\/www.pcmatic.com\/pro\">PC Matic Pro<\/a> is able to offer a <strong>lightweight agent<\/strong> that pales in comparison to its competition.  <\/p>\n\n\n\n<p>Beyond the above, PC Matic Pro offers a dual approach.  For organizations looking to replace their existing security solution, they can use PC Matic Pro to cover all of their cybersecurity needs.  However, there are other organizations that simply want to layer an application whitelisting agent <a href=\"https:\/\/www.pcmatic.com\/blog\/2021\/06\/16\/adding-layer-security-stack\/\">on top of their existing security stack<\/a>.  PC Matic Pro can do that as well, as it is able to work along side other cybersecurity solutions without causing conflict.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Do I have to?<\/h2>\n\n\n\n<p>For many organizations, no, they do not have to take the steps outlined as best practice.  However, <strong>ethically, they should<\/strong>.  Think about this from a consumer, client, employee, or student perspective.  They are trusting organizations to keep their data safe.  Whether it is personally identifiable information, or a user name and password; customers are trusting companies to keep that information secure.  If organizations are not taking the steps to proactively secure it, they are doing a disservice to those who support their company.  <\/p>\n\n\n\n<p>Now, as mentioned, a majority of organizations do not have formal cybersecurity regulations to abide by.  Although, there are some regulations that fall into place for healthcare facilities.  For instance, if a breach occurs and patient data is breached, they are required to notify those individuals.  For organizations that work with government entities, they have formal regulations they are expected to follow as well. <\/p>\n\n\n\n<p>Overall, regulations for cybersecurity are lacking.  We can preach from the rooftops best practices, but that doesn&#8217;t mean they will be followed.  Here are five easy to deploy and maintain best practices that PC Matic encourages every organization to have in place: <\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Include application whitelisting into your security stack<\/li><li>Backup your information daily, quite possibly even hourly depending on the size of your organization <\/li><li>Update operating systems and third-party applications within 48 hours of the update being released<\/li><li>Change passwords every six months <\/li><li>Enable multi-factor authentication on the applications and software that already have it included<\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"<p>If you were looking, cyber threats have been in the news for years. However, they&#8217;ve been shoved into the limelight over the last few months, between the ransomware attack on the water treatment plant in Florida, Colonial Pipeline, and now Kaseya. The news has left the world wondering what to do to stay cyber secure. [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":63948,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6217],"tags":[4354],"class_list":["post-63947","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-security","tag-whitelisting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Keeping Your Organization Cyber Secure Amidst Global Threats<\/title>\n<meta name=\"description\" content=\"With the increased awareness to today&#039;s cyber threats, organizations across America are wondering what they can do to stay cyber secure...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keeping Your Organization Cyber Secure Amidst Global Threats\" \/>\n<meta property=\"og:description\" content=\"With the increased awareness to today&#039;s cyber threats, organizations across America are wondering what they can do to stay cyber secure...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-07T17:01:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T17:02:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_109000309_adobespark.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/staying-cyber-secure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/staying-cyber-secure\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Keeping Your Organization Cyber Secure Amidst Global Threats\",\"datePublished\":\"2021-07-07T17:01:59+00:00\",\"dateModified\":\"2021-07-07T17:02:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/staying-cyber-secure\\\/\"},\"wordCount\":700,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/staying-cyber-secure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_109000309_adobespark.jpg\",\"keywords\":[\"whitelisting\"],\"articleSection\":[\"Business Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/staying-cyber-secure\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/staying-cyber-secure\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/staying-cyber-secure\\\/\",\"name\":\"Keeping Your Organization Cyber Secure Amidst Global Threats\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/staying-cyber-secure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/staying-cyber-secure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_109000309_adobespark.jpg\",\"datePublished\":\"2021-07-07T17:01:59+00:00\",\"dateModified\":\"2021-07-07T17:02:05+00:00\",\"description\":\"With the increased awareness to today's cyber threats, organizations across America are wondering what they can do to stay cyber secure...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/staying-cyber-secure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/staying-cyber-secure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/staying-cyber-secure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_109000309_adobespark.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_109000309_adobespark.jpg\",\"width\":500,\"height\":334,\"caption\":\"Keeping American businesses secure from cyber threats.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/staying-cyber-secure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Keeping Your Organization Cyber Secure Amidst Global Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Keeping Your Organization Cyber Secure Amidst Global Threats","description":"With the increased awareness to today's cyber threats, organizations across America are wondering what they can do to stay cyber secure...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/","og_locale":"en_US","og_type":"article","og_title":"Keeping Your Organization Cyber Secure Amidst Global Threats","og_description":"With the increased awareness to today's cyber threats, organizations across America are wondering what they can do to stay cyber secure...","og_url":"https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2021-07-07T17:01:59+00:00","article_modified_time":"2021-07-07T17:02:05+00:00","og_image":[{"width":500,"height":334,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_109000309_adobespark.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Keeping Your Organization Cyber Secure Amidst Global Threats","datePublished":"2021-07-07T17:01:59+00:00","dateModified":"2021-07-07T17:02:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/"},"wordCount":700,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_109000309_adobespark.jpg","keywords":["whitelisting"],"articleSection":["Business Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/","url":"https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/","name":"Keeping Your Organization Cyber Secure Amidst Global Threats","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_109000309_adobespark.jpg","datePublished":"2021-07-07T17:01:59+00:00","dateModified":"2021-07-07T17:02:05+00:00","description":"With the increased awareness to today's cyber threats, organizations across America are wondering what they can do to stay cyber secure...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_109000309_adobespark.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_109000309_adobespark.jpg","width":500,"height":334,"caption":"Keeping American businesses secure from cyber threats."},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/staying-cyber-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Keeping Your Organization Cyber Secure Amidst Global Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/63947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=63947"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/63947\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/63948"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=63947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=63947"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=63947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}