{"id":64080,"date":"2021-07-30T13:10:56","date_gmt":"2021-07-30T18:10:56","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=64080"},"modified":"2022-01-27T18:51:14","modified_gmt":"2022-01-28T00:51:14","slug":"cybersecurity-prevention","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/","title":{"rendered":"Cybersecurity Prevention &#8211; Is the World Making the Shift?"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">Fifteen days ago, I wrote about an <a href=\"https:\/\/www.pcmatic.com\/blog\/2021\/07\/15\/eric-cole-prevention-application-whitelisting\/\">interview<\/a> PC Matic Vice President, Corey Munson, had with the CEO of Secure Anchor Consulting, Dr. Eric Cole discussing cybersecurity prevention and application whitelisting.&nbsp; As you may recall, one of Dr. Cole\u2019s biggest concerns, was the threat of extortion upon becoming a victim of ransomware.&nbsp; For those who don\u2019t remember, or perhaps are unaware, here\u2019s the deal.&nbsp; Ransomware threats have evolved beyond the basic level of data encryption hoping for a payday.&nbsp; Upon becoming infected with ransomware, many cyber criminals are also stealing the encrypted data.  They then threaten to expose the data on the dark web, in an effort to solidify their payday.  Now, based on recent reports, it appears <strong>they are standing behind their threats.&nbsp;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Reaction Is No Longer Feasible<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">KnowBe4 has <a href=\"https:\/\/blog.knowbe4.com\/over-700-ransomware-victim-organizations-are-named-on-data-leak-sites-in-q2?utm_content=174622234&amp;utm_medium=social&amp;utm_source=linkedin&amp;hss_channel=lis-TEZp_Z6yIE\">confirmed over 700 organizations who fell victim to ransomware, had their data exposed <\/a>in the second quarter of 2021 alone.&nbsp; This is a 47% increase quarter over quarter for 2021.  The cause for the spike is quite clear, organizations are not paying.  What we don&#8217;t know is, did they not pay the first time, or did they refuse to pay for a second, third, or fourth time?  As discussed with Dr. Cole, cyber criminals have now created a residual income model by stealing organization&#8217;s data.  If the company doesn&#8217;t pay initially, or on a reoccurring basis, the hackers will expose the organization&#8217;s client, patient, or customer data.  <\/p>\n\n\n\n<p class=\"has-medium-font-size\">With the growing threats of ransomware, and the looming dangers post infection, the time has never been more critical than now, for Americans to focus on prevention.&nbsp;<a title=\"Application Whitelisting Cybersecurity\" href=\"https:\/\/www.pcmatic.com\/\">PC Matic<\/a> develops cybersecurity software solutions that prevent malware and ransomware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Shifting to Cybersecurity Prevention<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Late last week, <a href=\"https:\/\/www.pcmatic.com\/blog\/2021\/07\/22\/nist-nccoe\/\">PC Matic joined the collaboration with NIST\u2019s NCCoE<\/a> to develop a practice guide for zero-trust technologies.&nbsp; By deploying zero-trust technologies, organizations are becoming more stringent on who has access to what. They are more careful about what is allowed to run within the organization\u2019s network.&nbsp; It is because of PC Matic\u2019s <a title=\"Application Whitelisting\" href=\"https:\/\/www.pcmatic.com\/whitelist\/\">application whitelisting<\/a> technology, that they were selected to collaborate with the NCCoE.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Prevention is key, and application whitelisting has been identified as the gold standard through several federal organizations. Explore <a href=\"https:\/\/www.pcmatic.com\/pro\/whitelisting.asp\" title=\"Application Whitelisting for Ransomware\">Application Whitelisting for Ransomware<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Layered Approach<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Understandably, many organizations already have their security stack in place.&nbsp; Unfortunately, this security stack, often times, does not include a zero-trust approach.&nbsp; Ripping the existing security solutions out of every endpoint and server is daunting.&nbsp; Fortunately, a layered approach works just as well.&nbsp; By adding application whitelisting to the existing <a title=\"Best Computer Security Software Comparison\" href=\"https:\/\/www.pcmatic.com\/pro\/compare-security-software.asp\">security software<\/a>, the two are able to run cohesively together.  Therefore, significantly enhancing the integrity of the digital infrastructure, effectively closing the security gaps cyber-criminals exploit.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Endpoint detection and response is no longer an all-inclusive option when it comes to thwarting cyber threats.  Cybersecurity prevention utilizing zero-trust infrastructures will be key.  <\/h4>\n\n\n\n<p class=\"has-medium-font-size\">PC Matic offers the best <a title=\"Best Endpoint Protection Software\" href=\"https:\/\/www.pcmatic.com\/pro\/endpoint-security.asp\">Endpoint Security Solutions<\/a> including our <a title=\"Best Endpoint Security Software for Business\" href=\"https:\/\/www.pcmatic.com\/pro\/endpoint-protection-suite.asp\">Endpoint Protection Suite<\/a> and the <a title=\"Top Network Application Whitelisting Solution\" href=\"https:\/\/www.pcmatic.com\/pro\/network-security.asp\">Top Network Application Whitelisting Solution<\/a>. Read more about how Anti-Ransomware from PC Matic can help <a title=\"Ransomware Protection with Application Whitelisting\" href=\"https:\/\/www.pcmatic.com\/ransomware-protection.asp\">prevent ransomware attacks<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fifteen days ago, I wrote about an interview PC Matic Vice President, Corey Munson, had with the CEO of Secure Anchor Consulting, Dr. Eric Cole discussing cybersecurity prevention and application whitelisting.&nbsp; As you may recall, one of Dr. Cole\u2019s biggest concerns, was the threat of extortion upon becoming a victim of ransomware.&nbsp; For those who [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":64081,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4949],"tags":[6155,5550],"class_list":["post-64080","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","tag-data-leak","tag-extortion"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Prevention - Is the World Making the Shift?<\/title>\n<meta name=\"description\" content=\"Cybersecurity prevention measures have jumped to the top of organization&#039;s to-do lists with the new emphasis being placed by various...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Prevention - Is the World Making the Shift?\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity prevention measures have jumped to the top of organization&#039;s to-do lists with the new emphasis being placed by various...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-30T18:10:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-28T00:51:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_126975410_adobespark.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-prevention\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-prevention\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Cybersecurity Prevention &#8211; Is the World Making the Shift?\",\"datePublished\":\"2021-07-30T18:10:56+00:00\",\"dateModified\":\"2022-01-28T00:51:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-prevention\\\/\"},\"wordCount\":535,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-prevention\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_126975410_adobespark.jpg\",\"keywords\":[\"data leak\",\"extortion\"],\"articleSection\":[\"Ransomware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-prevention\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-prevention\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-prevention\\\/\",\"name\":\"Cybersecurity Prevention - Is the World Making the Shift?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-prevention\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-prevention\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_126975410_adobespark.jpg\",\"datePublished\":\"2021-07-30T18:10:56+00:00\",\"dateModified\":\"2022-01-28T00:51:14+00:00\",\"description\":\"Cybersecurity prevention measures have jumped to the top of organization's to-do lists with the new emphasis being placed by various...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-prevention\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-prevention\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-prevention\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_126975410_adobespark.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_126975410_adobespark.jpg\",\"width\":500,\"height\":333,\"caption\":\"A recent study confirmed over 700 ransomware victims had their data leaked on the dark web.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybersecurity-prevention\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Prevention &#8211; Is the World Making the Shift?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Prevention - Is the World Making the Shift?","description":"Cybersecurity prevention measures have jumped to the top of organization's to-do lists with the new emphasis being placed by various...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Prevention - Is the World Making the Shift?","og_description":"Cybersecurity prevention measures have jumped to the top of organization's to-do lists with the new emphasis being placed by various...","og_url":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2021-07-30T18:10:56+00:00","article_modified_time":"2022-01-28T00:51:14+00:00","og_image":[{"width":500,"height":333,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_126975410_adobespark.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Cybersecurity Prevention &#8211; Is the World Making the Shift?","datePublished":"2021-07-30T18:10:56+00:00","dateModified":"2022-01-28T00:51:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/"},"wordCount":535,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_126975410_adobespark.jpg","keywords":["data leak","extortion"],"articleSection":["Ransomware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/","url":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/","name":"Cybersecurity Prevention - Is the World Making the Shift?","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_126975410_adobespark.jpg","datePublished":"2021-07-30T18:10:56+00:00","dateModified":"2022-01-28T00:51:14+00:00","description":"Cybersecurity prevention measures have jumped to the top of organization's to-do lists with the new emphasis being placed by various...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_126975410_adobespark.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_126975410_adobespark.jpg","width":500,"height":333,"caption":"A recent study confirmed over 700 ransomware victims had their data leaked on the dark web."},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/cybersecurity-prevention\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Prevention &#8211; Is the World Making the Shift?"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/64080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=64080"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/64080\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/64081"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=64080"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=64080"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=64080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}