{"id":64089,"date":"2021-08-04T07:15:00","date_gmt":"2021-08-04T12:15:00","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=64089"},"modified":"2022-05-26T20:21:17","modified_gmt":"2022-05-27T01:21:17","slug":"idg-whitelisting-zero-trust","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/","title":{"rendered":"IDG Confirms Application Whitelisting is Underutilized"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">A recent survey by IDG confirms, application whitelisting is by far the most underutilized component of zero-trust technologies.  <\/h3>\n\n\n\n<h2 class=\"wp-block-heading\">What is Application Whitelisting?<\/h2>\n\n\n\n<p>Application whitelisting only allows known trusted, and proven secure applications to run on the network.  This is an effective means to cyber threat mitigation because no matter how many times malware evolves, it will never be a known trusted program.  Therefore, it would be unable to execute on a network that is using <a href=\"htps:\/\/www.pcmatic.com\/whitelist\/\" title=\"Top Application Whitelisting Solutions\">application whitelisting<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Does It Fit Into Zero-Trust?<\/h2>\n\n\n\n<p>The idea of zero-trust architectures are just that; zero-trust.  Until something or someone has been proven to be trusted, it will not be granted access.  This may mean placing controls on applications, like <a href=\"https:\/\/www.pcmatic.com\/whitelist\/application-whitelisting.asp\" title=\"Application Whitelisting\">application whitelisting<\/a>, or deploying multi-factor authentication to authorize personnel access.  Unfortunately the IDG survey confirmed <a href=\"https:\/\/www.csoonline.com\/article\/3626938\/zero-trust-s-missing-link-application-whitelisting.html\">application whitelisting has only been adopted by 32%  of surveyed respondents<\/a>.   <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Looming Threat &amp; Resistance to Prevention<\/h2>\n\n\n\n<p>With 62% of individuals believing their organizations will be hit with a cyber attack in the next twelve months, the question is, what will they do to prevent it?  The reality is, many organizations are looking to zero-trust architectures to help bolster the integrity of their digital infrastructures. When zero-trust access features are combined with whitelisting, secure RDP, device authentication, driver updates, and security patch updates, endpoints and networks are better protected. <\/p>\n\n\n\n<p>PC Matic offers <a href=\"https:\/\/www.pcmatic.com\/pro\/endpoint-protection-suite.asp\" title=\"Endpoint Security Solutions\">Endpoint Security<\/a>, Ransomware Protection,<a href=\"https:\/\/www.pcmatic.com\/pro\/server-security.asp\" title=\"Server and Network Security Solutions\"> Network and Server Security<\/a> solutions. Special <a href=\"https:\/\/www.pcmatic.com\/pro\/ransomware-protection.asp\" title=\"Ransomware Protection Software for Business\">business protection against ransomware<\/a> can also be found in the <a title=\"Small Business Cyber Security\" href=\"https:\/\/www.pcmatic.com\/pro\/smb\/\">Small Business Cyber Security<\/a> solutions and <a title=\"Business Cyber Security Solutions\" href=\"https:\/\/www.pcmatic.com\/pro\/\">Business Security Software with Application Whitelisting<\/a>. <\/p>\n\n\n\n<p>With application whitelisting being adopted by less than a third of respondents, the question is &#8212; what is the resistance?  If application whitelisting is indeed the gold standard, as set by the National Institute of Standards and Technology (NIST), FBI, and Department of Homeland Security, why isn&#8217;t there a higher adoption rate? Some of the reason may lie in that many IT professionals are more familiar with <a title=\"Application Whitelisting vs Application Control\" href=\"https:\/\/www.pcmatic.com\/pro\/application-whitelisting-vs-application-control.asp\">Application Control vs Application Whitelisting<\/a>. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">AWL is Recommended by NIST<\/h4>\n\n\n\n<p>AWL Security Software is a recommended practice by the NIST together with zero trust access. PC Matic offers a global whitelist that makes it easy for IT administrators to set up their network to work quickly with whitelist protection. Working with <a href=\"https:\/\/www.pcmatic.com\/whitelist\/application-whitelisting-best-practices.asp\" title=\"Application Whitelisting Best Practices\">whitelisting best practices<\/a> ensures only programs that an administrator trusts can run. Any other script or process will not gain access to run on the system.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">PC Matic&#8217;s Mission with NCCoE<\/h2>\n\n\n\n<p>The lack of adoption why PC Matic applied to collaborate with the NIST National Cybersecurity Center of Excellence.  By<a href=\"https:\/\/www.pcmatic.com\/blog\/2021\/07\/22\/nist-nccoe\/\"> joining NCCoE<\/a>, PC Matic will be working hand-in-hand with this organization, as well as several other vendors, to develop a practice guide to deploying all aspects of zero-trust architectures, including the <a href=\"https:\/\/www.pcmatic.com\/blog\/2021\/07\/15\/eric-cole-prevention-application-whitelisting\/\">adoption of application whitelisting<\/a>.  <\/p>\n\n\n\n<p>This is a big step for <a href=\"http:\/\/www.pcmatic.com\" title=\"PC Matic Cybersecurity Software\">PC Matic<\/a>, and their drive for prevention.  Great things are soon to come!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A recent survey by IDG confirms, application whitelisting is by far the most underutilized component of zero-trust technologies. What is Application Whitelisting? Application whitelisting only allows known trusted, and proven secure applications to run on the network. This is an effective means to cyber threat mitigation because no matter how many times malware evolves, it [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":64090,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[109],"tags":[4989,4970,5902,4363],"class_list":["post-64089","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pc-matic-blog","tag-application-whitelisting","tag-idg","tag-nist","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IDG Confirms Application Whitelisting is Underutilized<\/title>\n<meta name=\"description\" content=\"An IDG survey recently confirmed less than one-third of respondents are utilizing application whitelisting in their zero-trust framework.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IDG Confirms Application Whitelisting is Underutilized\" \/>\n<meta property=\"og:description\" content=\"An IDG survey recently confirmed less than one-third of respondents are utilizing application whitelisting in their zero-trust framework.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-04T12:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-27T01:21:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_381073373_adobespark.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"PC Matic Cybersecurity\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PC Matic Cybersecurity\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/idg-whitelisting-zero-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/idg-whitelisting-zero-trust\\\/\"},\"author\":{\"name\":\"PC Matic Cybersecurity\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3dbbae19394008342629ce8d970445f\"},\"headline\":\"IDG Confirms Application Whitelisting is Underutilized\",\"datePublished\":\"2021-08-04T12:15:00+00:00\",\"dateModified\":\"2022-05-27T01:21:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/idg-whitelisting-zero-trust\\\/\"},\"wordCount\":484,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/idg-whitelisting-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_381073373_adobespark.jpg\",\"keywords\":[\"application whitelisting\",\"IDG\",\"nist\",\"ransomware\"],\"articleSection\":[\"PC Matic Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/idg-whitelisting-zero-trust\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/idg-whitelisting-zero-trust\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/idg-whitelisting-zero-trust\\\/\",\"name\":\"IDG Confirms Application Whitelisting is Underutilized\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/idg-whitelisting-zero-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/idg-whitelisting-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_381073373_adobespark.jpg\",\"datePublished\":\"2021-08-04T12:15:00+00:00\",\"dateModified\":\"2022-05-27T01:21:17+00:00\",\"description\":\"An IDG survey recently confirmed less than one-third of respondents are utilizing application whitelisting in their zero-trust framework.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/idg-whitelisting-zero-trust\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/idg-whitelisting-zero-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/idg-whitelisting-zero-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_381073373_adobespark.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_381073373_adobespark.jpg\",\"width\":500,\"height\":333,\"caption\":\"Application whitelisting is the most underutilized link to zero-trust frameworks.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/idg-whitelisting-zero-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IDG Confirms Application Whitelisting is Underutilized\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3dbbae19394008342629ce8d970445f\",\"name\":\"PC Matic Cybersecurity\",\"description\":\"PC Matic Cyber Security is America's Top Antivirus Software and our team is committed to providing you with the information you need to keep your computer, mobile device and network safe and running like new.\",\"sameAs\":[\"https:\\\/\\\/techtalk.pcpitstop.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/pcpitstop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IDG Confirms Application Whitelisting is Underutilized","description":"An IDG survey recently confirmed less than one-third of respondents are utilizing application whitelisting in their zero-trust framework.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/","og_locale":"en_US","og_type":"article","og_title":"IDG Confirms Application Whitelisting is Underutilized","og_description":"An IDG survey recently confirmed less than one-third of respondents are utilizing application whitelisting in their zero-trust framework.","og_url":"https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2021-08-04T12:15:00+00:00","article_modified_time":"2022-05-27T01:21:17+00:00","og_image":[{"width":500,"height":333,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_381073373_adobespark.jpg","type":"image\/jpeg"}],"author":"PC Matic Cybersecurity","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"PC Matic Cybersecurity","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/"},"author":{"name":"PC Matic Cybersecurity","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f3dbbae19394008342629ce8d970445f"},"headline":"IDG Confirms Application Whitelisting is Underutilized","datePublished":"2021-08-04T12:15:00+00:00","dateModified":"2022-05-27T01:21:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/"},"wordCount":484,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_381073373_adobespark.jpg","keywords":["application whitelisting","IDG","nist","ransomware"],"articleSection":["PC Matic Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/","url":"https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/","name":"IDG Confirms Application Whitelisting is Underutilized","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_381073373_adobespark.jpg","datePublished":"2021-08-04T12:15:00+00:00","dateModified":"2022-05-27T01:21:17+00:00","description":"An IDG survey recently confirmed less than one-third of respondents are utilizing application whitelisting in their zero-trust framework.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_381073373_adobespark.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_381073373_adobespark.jpg","width":500,"height":333,"caption":"Application whitelisting is the most underutilized link to zero-trust frameworks."},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/idg-whitelisting-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IDG Confirms Application Whitelisting is Underutilized"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f3dbbae19394008342629ce8d970445f","name":"PC Matic Cybersecurity","description":"PC Matic Cyber Security is America's Top Antivirus Software and our team is committed to providing you with the information you need to keep your computer, mobile device and network safe and running like new.","sameAs":["https:\/\/techtalk.pcpitstop.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/pcpitstop\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/64089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=64089"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/64089\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/64090"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=64089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=64089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=64089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}