{"id":64340,"date":"2021-10-21T09:44:39","date_gmt":"2021-10-21T14:44:39","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=64340"},"modified":"2021-10-21T09:44:44","modified_gmt":"2021-10-21T14:44:44","slug":"insider-threats-rising","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/","title":{"rendered":"Insider Threats Are on the Rise &#8211; How Can Businesses Remain Protected?"},"content":{"rendered":"\n<p>From 2018 to 2020 insider threats have increased 47% leading to a 31% increase in insider threat costs.\u00a0 In 2020, the total cost of insider threats was just under $11.5 million.\u00a0 Today, those numbers are increasing as cyber criminals are offering employees a hefty payday if they infect their corporate networks with ransomware.\u00a0\u00a0<\/p>\n\n\n\n<p>In August an email security company intercepted electronic correspondence that offered employees $1 million to infect their organization\u2019s networks.&nbsp; In another event, again in August, a Tesla employee was offered $1 million dollars to deploy ransomware on their networks as well.&nbsp; So far, no one has taken a bite.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Unfortunately, that is not to say they won\u2019t.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">If You&#8217;re Faced with Insider Threats, What Can You Do?\u00a0<\/h3>\n\n\n\n<p>If, or when, a disgruntled employee chooses to take part in these activities, there will be little that the organization can do to stop it.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Many of the cybersecurity tools available do not account for an employee deploying malicious software.\u00a0 For instance, multifactor authentication, which requires two or more verification methods to grant access to a program, file, or application, is designed to keep outside threats at bay.\u00a0 Given the threats are coming from within, those individuals will have full access and ability to grant the authentication, regardless of what verification methods are needed.  Therefore, multifactor authentication essentially becomes useless.\u00a0\u00a0<\/p>\n\n\n\n<p>The barriers for an insider to execute the threats are far less, than for a hacker to try to install the malware.&nbsp; This in itself makes it worth the payout to the rogue employee.&nbsp; They can infect more businesses in a more efficient manner.&nbsp; The only work they have to do is find a willing culprit.&nbsp;&nbsp;<\/p>\n\n\n\n<p>One may think that it takes a cyber genius to install malware, specifically ransomware, on a device.\u00a0 You couldn\u2019t be further from the truth.\u00a0 Human error accounts for over 95% of all cyber incidents.\u00a0 Which is also why it would be incredibly easy, from an employee perspective, to get away with it.\u00a0 All they would have to claim was that it was a careless click.\u00a0\u00a0<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Sounding Hopeless&#8230;<\/h5>\n\n\n\n<p>That is unless the organization is using a <a href=\"http:\/\/www.pcmatic.com\/pro\">malware prevention tool like application whitelisting<\/a>.\u00a0\u00a0<\/p>\n\n\n\n<p>Application whitelisting is a method of proactive security that only allows known, trusted programs to run.&nbsp; As the direct alternative to traditional blacklisting that allows unknown files to run, application whitelisting actively stops anything from running that has not already been vetted and proven safe and secure.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Consider this technology when discussing insider threats.\u00a0 What if the insider downloads the malware as directed by the cyber criminal?\u00a0 The rogue employee can click on, and even try downloading the malicious file.  However, it will not be allowed propagate throughout the network because it has not been tested and proven safe.\u00a0 The application whitelisting solution would effectively block this threat.\u00a0<\/p>\n\n\n\n<p>Given the grim outlook of insider threats increasing, the cyber threat landscape widening, and a majority of cybersecurity tools failing, leading to a <a href=\"https:\/\/www.msspalert.com\/cybersecurity-research\/fortinet-report-ransomware-attacks-up-1070-year-over-year\/#:~:text=Ransomware%20attacks%20increased%201%2C070%20percent,attack%20than%20other%20cyber%20threats.&amp;text=67%20percent%20said%20they%20have%20been%20targeted%20during%20ransomware%20attacks.\">1070% increase in ransomware attacks<\/a>, there are few risks one should be willing to take when it comes to cybersecurity.\u00a0 <\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Choose wisely.\u00a0\u00a0<\/h5>\n","protected":false},"excerpt":{"rendered":"<p>From 2018 to 2020 insider threats have increased 47% leading to a 31% increase in insider threat costs.\u00a0 In 2020, the total cost of insider threats was just under $11.5 million.\u00a0 Today, those numbers are increasing as cyber criminals are offering employees a hefty payday if they infect their corporate networks with ransomware.\u00a0\u00a0 In August [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":63217,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6217],"tags":[4989,6162,6163],"class_list":["post-64340","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-security","tag-application-whitelisting","tag-insider-threats","tag-multifactor-authentication"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Insider Threats Are on the Rise - How Can Businesses Remain Protected?<\/title>\n<meta name=\"description\" content=\"With insider threats continuing to grow, and the threat of hackers using them to spread ransomware through the network, what organizations...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insider Threats Are on the Rise - How Can Businesses Remain Protected?\" \/>\n<meta property=\"og:description\" content=\"With insider threats continuing to grow, and the threat of hackers using them to spread ransomware through the network, what organizations...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-21T14:44:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-21T14:44:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/960x0_740x414-e1634827396318.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/insider-threats-rising\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/insider-threats-rising\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Insider Threats Are on the Rise &#8211; How Can Businesses Remain Protected?\",\"datePublished\":\"2021-10-21T14:44:39+00:00\",\"dateModified\":\"2021-10-21T14:44:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/insider-threats-rising\\\/\"},\"wordCount\":530,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/insider-threats-rising\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/960x0_740x414-e1634827396318.jpg\",\"keywords\":[\"application whitelisting\",\"insider threats\",\"multifactor authentication\"],\"articleSection\":[\"Business Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/insider-threats-rising\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/insider-threats-rising\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/insider-threats-rising\\\/\",\"name\":\"Insider Threats Are on the Rise - How Can Businesses Remain Protected?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/insider-threats-rising\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/insider-threats-rising\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/960x0_740x414-e1634827396318.jpg\",\"datePublished\":\"2021-10-21T14:44:39+00:00\",\"dateModified\":\"2021-10-21T14:44:44+00:00\",\"description\":\"With insider threats continuing to grow, and the threat of hackers using them to spread ransomware through the network, what organizations...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/insider-threats-rising\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/insider-threats-rising\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/insider-threats-rising\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/960x0_740x414-e1634827396318.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/960x0_740x414-e1634827396318.jpg\",\"width\":500,\"height\":280,\"caption\":\"How can an organization possibly block an attack from within? Multifactor authentication surely won't stop it.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/insider-threats-rising\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insider Threats Are on the Rise &#8211; How Can Businesses Remain Protected?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Insider Threats Are on the Rise - How Can Businesses Remain Protected?","description":"With insider threats continuing to grow, and the threat of hackers using them to spread ransomware through the network, what organizations...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/","og_locale":"en_US","og_type":"article","og_title":"Insider Threats Are on the Rise - How Can Businesses Remain Protected?","og_description":"With insider threats continuing to grow, and the threat of hackers using them to spread ransomware through the network, what organizations...","og_url":"https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2021-10-21T14:44:39+00:00","article_modified_time":"2021-10-21T14:44:44+00:00","og_image":[{"width":500,"height":280,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/960x0_740x414-e1634827396318.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Insider Threats Are on the Rise &#8211; How Can Businesses Remain Protected?","datePublished":"2021-10-21T14:44:39+00:00","dateModified":"2021-10-21T14:44:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/"},"wordCount":530,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/960x0_740x414-e1634827396318.jpg","keywords":["application whitelisting","insider threats","multifactor authentication"],"articleSection":["Business Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/","url":"https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/","name":"Insider Threats Are on the Rise - How Can Businesses Remain Protected?","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/960x0_740x414-e1634827396318.jpg","datePublished":"2021-10-21T14:44:39+00:00","dateModified":"2021-10-21T14:44:44+00:00","description":"With insider threats continuing to grow, and the threat of hackers using them to spread ransomware through the network, what organizations...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/960x0_740x414-e1634827396318.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/960x0_740x414-e1634827396318.jpg","width":500,"height":280,"caption":"How can an organization possibly block an attack from within? Multifactor authentication surely won't stop it."},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/insider-threats-rising\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Insider Threats Are on the Rise &#8211; How Can Businesses Remain Protected?"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/64340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=64340"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/64340\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/63217"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=64340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=64340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=64340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}