{"id":63968,"date":"2021-07-13T08:55:00","date_gmt":"2021-07-13T13:55:00","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=63968"},"modified":"2021-07-12T13:34:07","modified_gmt":"2021-07-12T18:34:07","slug":"colonial-pipeline-restores-backups","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/","title":{"rendered":"Colonial Pipeline &#8211; The Perfect Example of Why Not to Pay"},"content":{"rendered":"\n<p>You&#8217;ve heard about it.  The pipeline that was hit with ransomware, causing a major fuel shortage across the east coast.  You also likely heard they paid the hacker&#8217;s demands.  However, did you hear the rest of the Colonial Pipeline story? <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The End of the Colonial Pipeline Story<\/h2>\n\n\n\n<p>Colonial Pipeline paid the ransom demands, after publicly saying they would not.  They sent the hackers $5 million and received a decryption key.  However, the restoration process using the $5 million decryption key was painfully slow.  So much, in fact, that it was faster to restore their network using company backups.  So, they did.  I&#8217;ll give you a second to let that sink in.  <\/p>\n\n\n\n<p>Yes, they paid millions of dollars to get a decryption key to restore the files that the ransomware infection corrupted, only to restore them using their own backups because the hacker&#8217;s restoration methods were too slow.  Wow. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why You Shouldn&#8217;t Pay<\/h2>\n\n\n\n<p>We have been preaching for years, <a href=\"https:\/\/www.pcmatic.com\/blog\/2016\/04\/09\/ransomware-to-pay-or-not-to-pay\/\">not to pay ransom demands<\/a>.  There are many reasons not to pay.  First, they are cyber criminals, and there are no promises that they will deliver on their end of the bargain.  Second, by paying once they believe you will pay again.  Therefore, you now have a larger target on your back.  Third, the restoration process using a decryption key can be quite slow.  <\/p>\n\n\n\n<p>If your organization has updated backups that have not been compromised, it is in your best interest to restore using those files.  Understandably, there is no quick fix when it comes to restoring networks after a cyber attack.  It will take time, and the process should not be expedited.  It is incredibly important to be concise and through during the entire process.  There really wouldn&#8217;t be anything worse than rushing through the reconnection process just to get servers and endpoints online too quickly and have traces of the ransomware still installed on the devices.  <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Threat Prevention Tips<\/h2>\n\n\n\n<p>Cyber criminals are sending phishing emails daily, hoping for a few careless clicks to infiltrate their victims.  With over <a href=\"https:\/\/www.techradar.com\/news\/90-percent-of-data-breaches-are-caused-by-human-error\">90% of cyber attacks occurring as a result of human error,<\/a> it is key organizations use a zero-trust methodology to keep their networks secure.  By using this approach, higher levels of controls are implemented, including application whitelisting.  Application whitelisting allows only tested and proven safe applications to run on the network.  Therefore, no matter how many times employees mistakenly click on a malicious link, attachment, or download &#8212; it will not run because it is not tested and shown as secure.  <\/p>\n\n\n\n<p>We can&#8217;t always control the human element of cybersecurity; but, by implementing enhanced security measures like zero-trust, we can substantially reduce the risk.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>You&#8217;ve heard about it. The pipeline that was hit with ransomware, causing a major fuel shortage across the east coast. You also likely heard they paid the hacker&#8217;s demands. However, did you hear the rest of the Colonial Pipeline story? The End of the Colonial Pipeline Story Colonial Pipeline paid the ransom demands, after publicly [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":63969,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4949],"tags":[5989,4363],"class_list":["post-63968","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","tag-colonial-pipeline","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Colonial Pipeline - The Perfect Example of Why Not to Pay<\/title>\n<meta name=\"description\" content=\"There are several reasons why you shouldn&#039;t pay a hacker. Unfortunately, Colonial Pipeline learned the hard way. After sending $5M...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Colonial Pipeline - The Perfect Example of Why Not to Pay\" \/>\n<meta property=\"og:description\" content=\"There are several reasons why you shouldn&#039;t pay a hacker. Unfortunately, Colonial Pipeline learned the hard way. After sending $5M...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-13T13:55:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_164905337_adobespark.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"361\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/colonial-pipeline-restores-backups\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/colonial-pipeline-restores-backups\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Colonial Pipeline &#8211; The Perfect Example of Why Not to Pay\",\"datePublished\":\"2021-07-13T13:55:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/colonial-pipeline-restores-backups\\\/\"},\"wordCount\":457,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/colonial-pipeline-restores-backups\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_164905337_adobespark.jpg\",\"keywords\":[\"colonial pipeline\",\"ransomware\"],\"articleSection\":[\"Ransomware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/colonial-pipeline-restores-backups\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/colonial-pipeline-restores-backups\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/colonial-pipeline-restores-backups\\\/\",\"name\":\"Colonial Pipeline - The Perfect Example of Why Not to Pay\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/colonial-pipeline-restores-backups\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/colonial-pipeline-restores-backups\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_164905337_adobespark.jpg\",\"datePublished\":\"2021-07-13T13:55:00+00:00\",\"description\":\"There are several reasons why you shouldn't pay a hacker. Unfortunately, Colonial Pipeline learned the hard way. After sending $5M...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/colonial-pipeline-restores-backups\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/colonial-pipeline-restores-backups\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/colonial-pipeline-restores-backups\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_164905337_adobespark.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_164905337_adobespark.jpg\",\"width\":500,\"height\":361,\"caption\":\"After paying $5M to hackers, Colonial Pipeline opts to restore using their backups.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/colonial-pipeline-restores-backups\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Colonial Pipeline &#8211; The Perfect Example of Why Not to Pay\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Colonial Pipeline - The Perfect Example of Why Not to Pay","description":"There are several reasons why you shouldn't pay a hacker. Unfortunately, Colonial Pipeline learned the hard way. After sending $5M...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/","og_locale":"en_US","og_type":"article","og_title":"Colonial Pipeline - The Perfect Example of Why Not to Pay","og_description":"There are several reasons why you shouldn't pay a hacker. Unfortunately, Colonial Pipeline learned the hard way. After sending $5M...","og_url":"https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2021-07-13T13:55:00+00:00","og_image":[{"width":500,"height":361,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_164905337_adobespark.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Colonial Pipeline &#8211; The Perfect Example of Why Not to Pay","datePublished":"2021-07-13T13:55:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/"},"wordCount":457,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_164905337_adobespark.jpg","keywords":["colonial pipeline","ransomware"],"articleSection":["Ransomware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/","url":"https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/","name":"Colonial Pipeline - The Perfect Example of Why Not to Pay","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_164905337_adobespark.jpg","datePublished":"2021-07-13T13:55:00+00:00","description":"There are several reasons why you shouldn't pay a hacker. Unfortunately, Colonial Pipeline learned the hard way. After sending $5M...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_164905337_adobespark.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_164905337_adobespark.jpg","width":500,"height":361,"caption":"After paying $5M to hackers, Colonial Pipeline opts to restore using their backups."},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/colonial-pipeline-restores-backups\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Colonial Pipeline &#8211; The Perfect Example of Why Not to Pay"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/63968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=63968"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/63968\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/63969"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=63968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=63968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=63968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}