{"id":64097,"date":"2021-08-04T09:53:52","date_gmt":"2021-08-04T14:53:52","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=64097"},"modified":"2021-08-04T09:53:56","modified_gmt":"2021-08-04T14:53:56","slug":"federal-cybersecurity-audit","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/","title":{"rendered":"Cybersecurity Audit Exposed Poor Practices by Federal Agencies"},"content":{"rendered":"\n<p>Upon evaluating the state of eight federal agencies&#8217; digital infrastructures through a cybersecurity audit, it was confirmed, four agencies nearly failed.  Had this been the first cybersecurity audit of those agencies, the scores may not be as alarming.  However, in 2018 a similar audit was conducted exposing many of the same cybersecurity risks.  The reality is, very little progress has been made.  <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cybersecurity Audit Results<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"302\" height=\"196\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/audit-scores.png\" alt=\"\" class=\"wp-image-64099\"\/><figcaption>Image from Ars Technica<\/figcaption><\/figure><\/div>\n\n\n\n<p>The scores, reported by <a href=\"https:\/\/arstechnica.com\/information-technology\/2021\/08\/the-state-department-and-3-other-us-agencies-earn-a-d-for-cybersecurity\/\">Ars Technica<\/a>, do not compare those to the audit of 2018; however it is clear little progress has been made in at least four of these agencies.  The audit confirmed many of the departments using legacy Microsoft operating systems that are no longer supported.  This means, they are not using Windows 10.  All other versions of the Windows operating systems, (XP, Vista, 7, and 8) are no longer supported.  Additionally, the audit revealed thousands of accounts remaining active, some for over 150 days, after an employee left, retired or was fired from the agency.  <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Moving Forward<\/h3>\n\n\n\n<p>Most certainly the auditors provided next steps for the agencies, in order to achieve a better score and increase their levels of compliance to best practices.  However, it can also be assumed those same, or very similar, recommendations were provided in 2018.  PC Matic founder and CEO, Rob Cheng states, <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>&#8220;The American government has placed a heavy emphasis on finding the responsible parties for the high-profile attacks that have taken place recently.  Alternatively, it is suggested they focus on closing the security holes within our federal agencies to reduce the risk of attack.  The audit clearly reports there are security holes from outdated operating systems, to improper access.   I&#8217;m certain if they dug deeper, they would find holes in the cybersecurity software as well.  It is imperative to close these holes to reduce the threat landscape.&#8221; <\/p><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Closing the Holes<\/h3>\n\n\n\n<p>To close these holes, federal agencies need to update their operating systems to the latest version of Windows 10.  It is also equally important to update any other outdated third-party applications.  Additionally, it is important organizations follow the proper termination of employment policies.  This may include, but is not limited to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Turning off employee access to the building<\/li><li>Removing access to company networks <ul><li>VPNs<\/li><li>RDP access <\/li><\/ul><ul><li>Email accounts <\/li><li>Social media <\/li><\/ul><\/li><\/ul>\n\n\n\n<p>Removing employee access from the network should be rather simple, if proper records are being kept.  For each employee, there should be documentation stating what they have access to.  This enables the access removal process to be expedited.  Additionally, when email access is removed, those emails should be forwarded to the individual&#8217;s supervisor.  This will ensure minimal correspondence falls to the wayside after the employee is no longer with the agency.  <\/p>\n\n\n\n<p>Additionally, w<mark>hen it comes to cybersecurity solutions, it is just as important to ensure only trusted applications are allowed to run within the network.<\/mark> <mark>Federal agencies can achieve this by following their own advice, and implement a layer of application whitelisting within the existing cybersecurity stack.<\/mark><\/p>\n\n\n\n<p>Given the recent threats the private and public sectors have faced, it is imperative that each of these organizations heeds the advice of this audit. Cyber threats are growing. It is no longer a minor virus that may worm its way into the network. It is data breaches, ransomware, and in some cases, a combination of the two. The American government must do more to <a href=\"https:\/\/www.pcmatic.com\/blog\/2021\/07\/22\/identifying-security-holes\/\">close its security holes <\/a>instead of trying to track down the origin of the attack.  <\/p>\n\n\n\n<p>It&#8217;s imperative in order to secure the nation&#8217;s secrets, and the data of its citizens.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Upon evaluating the state of eight federal agencies&#8217; digital infrastructures through a cybersecurity audit, it was confirmed, four agencies nearly failed. Had this been the first cybersecurity audit of those agencies, the scores may not be as alarming. However, in 2018 a similar audit was conducted exposing many of the same cybersecurity risks. The reality [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":64098,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6219],"tags":[5334],"class_list":["post-64097","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybernews","tag-federal-agencies"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Audit Exposed Poor Practices by Federal Agencies<\/title>\n<meta name=\"description\" content=\"In a repeat cybersecurity audit of eight federal agencies, it was confirmed, little progress has been made to secure these federal departments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Audit Exposed Poor Practices by Federal Agencies\" \/>\n<meta property=\"og:description\" content=\"In a repeat cybersecurity audit of eight federal agencies, it was confirmed, little progress has been made to secure these federal departments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-04T14:53:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-04T14:53:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_208889674_adobespark.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-cybersecurity-audit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-cybersecurity-audit\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Cybersecurity Audit Exposed Poor Practices by Federal Agencies\",\"datePublished\":\"2021-08-04T14:53:52+00:00\",\"dateModified\":\"2021-08-04T14:53:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-cybersecurity-audit\\\/\"},\"wordCount\":594,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-cybersecurity-audit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_208889674_adobespark.jpg\",\"keywords\":[\"federal agencies\"],\"articleSection\":[\"CyberNews\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-cybersecurity-audit\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-cybersecurity-audit\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-cybersecurity-audit\\\/\",\"name\":\"Cybersecurity Audit Exposed Poor Practices by Federal Agencies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-cybersecurity-audit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-cybersecurity-audit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_208889674_adobespark.jpg\",\"datePublished\":\"2021-08-04T14:53:52+00:00\",\"dateModified\":\"2021-08-04T14:53:56+00:00\",\"description\":\"In a repeat cybersecurity audit of eight federal agencies, it was confirmed, little progress has been made to secure these federal departments.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-cybersecurity-audit\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-cybersecurity-audit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-cybersecurity-audit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_208889674_adobespark.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/AdobeStock_208889674_adobespark.jpg\",\"width\":500,\"height\":333,\"caption\":\"Cybersecurity audit confirms little progress has been made since 2018.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/federal-cybersecurity-audit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Audit Exposed Poor Practices by Federal Agencies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Audit Exposed Poor Practices by Federal Agencies","description":"In a repeat cybersecurity audit of eight federal agencies, it was confirmed, little progress has been made to secure these federal departments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Audit Exposed Poor Practices by Federal Agencies","og_description":"In a repeat cybersecurity audit of eight federal agencies, it was confirmed, little progress has been made to secure these federal departments.","og_url":"https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2021-08-04T14:53:52+00:00","article_modified_time":"2021-08-04T14:53:56+00:00","og_image":[{"width":500,"height":333,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_208889674_adobespark.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Cybersecurity Audit Exposed Poor Practices by Federal Agencies","datePublished":"2021-08-04T14:53:52+00:00","dateModified":"2021-08-04T14:53:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/"},"wordCount":594,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_208889674_adobespark.jpg","keywords":["federal agencies"],"articleSection":["CyberNews"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/","url":"https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/","name":"Cybersecurity Audit Exposed Poor Practices by Federal Agencies","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_208889674_adobespark.jpg","datePublished":"2021-08-04T14:53:52+00:00","dateModified":"2021-08-04T14:53:56+00:00","description":"In a repeat cybersecurity audit of eight federal agencies, it was confirmed, little progress has been made to secure these federal departments.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_208889674_adobespark.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/AdobeStock_208889674_adobespark.jpg","width":500,"height":333,"caption":"Cybersecurity audit confirms little progress has been made since 2018."},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/federal-cybersecurity-audit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Audit Exposed Poor Practices by Federal Agencies"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/64097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=64097"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/64097\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/64098"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=64097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=64097"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=64097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}