{"id":64022,"date":"2021-07-20T10:13:19","date_gmt":"2021-07-20T15:13:19","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=64022"},"modified":"2022-02-15T22:20:45","modified_gmt":"2022-02-16T04:20:45","slug":"cybersecurity-costs","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/","title":{"rendered":"Cybersecurity &#8211; Does it need to cost millions?"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">I saw this meme on LinkedIn the other day, and I had to laugh.  Not because it is funny, but because of how accurate it is.  With high profile cases of ransomware becoming public like <a href=\"https:\/\/www.cbsnews.com\/news\/jbs-ransom-11-million\/\">JBS<\/a>, <a href=\"https:\/\/www.pcmatic.com\/blog\/2021\/07\/06\/kaseya-ransomware-attack\/\">Kaseya<\/a>, and <a href=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/\">Colonial Pipeline<\/a>, many organizations are jumping at the bit to get the best of the best cybersecurity solutions.  <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"504\" height=\"489\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/image-3.png\" alt=\"\" class=\"wp-image-64024\"\/><figcaption>Photo from The Cyber Security Hub via LinkedIn<\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"has-medium-font-size\">First, let me tell you \u2013 throwing a plethora of money at the problem does not solve said problem.&nbsp; The issue America is facing, and possibly the rest of the world, is the mentality of cybersecurity.&nbsp; There is this MYTH that ransomware can\u2019t be stopped, so why even try?&nbsp; Instead of focusing on prevention, organizations place a higher emphasis on the remediation post-infection.&nbsp; Both play a key role in the digital infrastructure of an organization.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"proactive-cybersecurity\">Proactive Cybersecurity<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Using <em>both<\/em> prevention and reaction-based approaches are the best way to set your organization up for success.&nbsp; As mentioned above, the idea that cyber threats \u2013 including ransomware can\u2019t be stopped, is a myth.&nbsp; The reality is, the right solution was never in place to block the threat to begin with.&nbsp; In order to properly block modern cyber threats, a <a title=\"Whitelisting Applications with Default-Deny\" href=\"http:\/\/www.pcmatic.com\/whitelist\/\">Application Whitelist Default-Deny Approach<\/a> is key.&nbsp; Only allowing trusted applications to run on the network is the best way to stop unknown threats, like new malware variants, from worming their way onto the network.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"reaction-based-approaches\">Reaction-Based Approaches<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">This is not a dig at endpoint detection and response, artificial intelligence, or behavioral heuristics.&nbsp; Those are important pieces to the cybersecurity stack as well.&nbsp; How quickly an attack, once in the network, is identified will significantly impact just how far that infection goes.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Coupling prevention with reactive approaches covers all the bases.&nbsp; And what\u2019s even better is, you don\u2019t need to throw millions of dollars at the problem, hoping for a quick solution.&nbsp; Alternatively, by adding a layer of prevention to your existing security stack, organizations will cover all their bases and increase the integrity of their digital infrastructure by a factor of ten. Read more about <a title=\"Application Whitelisting Endpoint Security\" href=\"https:\/\/www.pcmatic.com\/whitelist\/\">application whitelisting endpoint security<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I saw this meme on LinkedIn the other day, and I had to laugh. Not because it is funny, but because of how accurate it is. With high profile cases of ransomware becoming public like JBS, Kaseya, and Colonial Pipeline, many organizations are jumping at the bit to get the best of the best cybersecurity [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":53050,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4959],"tags":[4141,4354],"class_list":["post-64022","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-whitelisting","tag-cyber-threats","tag-whitelisting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity - Does it need to cost millions?<\/title>\n<meta name=\"description\" content=\"Cyber threats are continuing to grow, leaving organizations to wonder how they can stay protected. Cybersecurity should not cost your...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity - Does it need to cost millions?\" \/>\n<meta property=\"og:description\" content=\"Cyber threats are continuing to grow, leaving organizations to wonder how they can stay protected. Cybersecurity should not cost your...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-20T15:13:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-16T04:20:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_money.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"278\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-costs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-costs\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Cybersecurity &#8211; Does it need to cost millions?\",\"datePublished\":\"2021-07-20T15:13:19+00:00\",\"dateModified\":\"2022-02-16T04:20:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-costs\\\/\"},\"wordCount\":373,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-costs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/rsz_money.jpg\",\"keywords\":[\"cyber threats\",\"whitelisting\"],\"articleSection\":[\"Whitelisting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-costs\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-costs\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-costs\\\/\",\"name\":\"Cybersecurity - Does it need to cost millions?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-costs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-costs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/rsz_money.jpg\",\"datePublished\":\"2021-07-20T15:13:19+00:00\",\"dateModified\":\"2022-02-16T04:20:45+00:00\",\"description\":\"Cyber threats are continuing to grow, leaving organizations to wonder how they can stay protected. Cybersecurity should not cost your...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-costs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-costs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-costs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/rsz_money.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/rsz_money.jpg\",\"width\":500,\"height\":278,\"caption\":\"Does cybersecurity need to cost companies millions?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-costs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity &#8211; Does it need to cost millions?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity - Does it need to cost millions?","description":"Cyber threats are continuing to grow, leaving organizations to wonder how they can stay protected. Cybersecurity should not cost your...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity - Does it need to cost millions?","og_description":"Cyber threats are continuing to grow, leaving organizations to wonder how they can stay protected. Cybersecurity should not cost your...","og_url":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2021-07-20T15:13:19+00:00","article_modified_time":"2022-02-16T04:20:45+00:00","og_image":[{"width":500,"height":278,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_money.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Cybersecurity &#8211; Does it need to cost millions?","datePublished":"2021-07-20T15:13:19+00:00","dateModified":"2022-02-16T04:20:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/"},"wordCount":373,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_money.jpg","keywords":["cyber threats","whitelisting"],"articleSection":["Whitelisting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/","url":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/","name":"Cybersecurity - Does it need to cost millions?","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_money.jpg","datePublished":"2021-07-20T15:13:19+00:00","dateModified":"2022-02-16T04:20:45+00:00","description":"Cyber threats are continuing to grow, leaving organizations to wonder how they can stay protected. Cybersecurity should not cost your...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_money.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/rsz_money.jpg","width":500,"height":278,"caption":"Does cybersecurity need to cost companies millions?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-costs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity &#8211; Does it need to cost millions?"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/64022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=64022"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/64022\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/53050"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=64022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=64022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=64022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}