{"id":67808,"date":"2025-02-21T12:14:06","date_gmt":"2025-02-21T18:14:06","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=67808"},"modified":"2025-02-21T12:14:07","modified_gmt":"2025-02-21T18:14:07","slug":"preventing-cyberattacks-with-application-allowlisting","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/","title":{"rendered":"Preventing Cyberattacks with Application Allowlisting"},"content":{"rendered":"\n<p>Cyberattacks continue to threaten businesses worldwide, targeting vulnerabilities in IT infrastructure to steal data, deploy ransomware, or disrupt operations. The recent breach at Raymond Limited, a well-known textile and clothing company, highlights the importance of proactive cybersecurity strategies\u2014particularly application allowlisting\u2014as a key defense mechanism.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">Understanding the Raymond Limited Cyberattack<\/h1>\n\n\n\n<p>Raymond Limited recently reported a cybersecurity incident affecting parts of its IT infrastructure. Threat actors breached the company\u2019s peripheral systems, prompting immediate containment measures. While details on the attack\u2019s scope remain under investigation, Raymond\u2019s response followed the National Institute of Standards and Technology (NIST) Cybersecurity Framework, focusing on containment, eradication, and recovery.<\/p>\n\n\n\n<p>Key elements of their response included:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Containment<\/strong>: Disabling compromised credentials and enforcing multi-factor authentication (MFA) across privileged accounts.<\/li>\n\n\n\n<li><strong>Eradication<\/strong>: Patching a vulnerable API endpoint and deploying behavioral analytics to detect ongoing threats.<\/li>\n\n\n\n<li><strong>Recovery<\/strong>: Restoring isolated systems from offline backups after sanitizing infected workloads.<\/li>\n<\/ul>\n\n\n\n<p>Notably, the attackers attempted to deploy <strong>fileless malware<\/strong> using PowerShell scripts\u2014a technique commonly associated with ransomware campaigns. However, Raymond Limited had implemented <strong>application allowlisting<\/strong>, which effectively blocked the execution of unauthorized scripts, preventing further damage.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">What is Application Allowlisting?<\/h1>\n\n\n\n<p>Application allowlisting is a cybersecurity strategy that permits only approved applications to run on a system, blocking all others by default. This approach is a powerful defense against malware, ransomware, and unauthorized software executions.<\/p>\n\n\n\n<p>Unlike traditional antivirus solutions that rely on detecting and reacting to known threats, allowlisting proactively prevents unauthorized programs from running. This method significantly reduces the attack surface and mitigates risks associated with zero-day threats, malicious scripts, and unauthorized software installations.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">How PC Matic Pro Enhances Cybersecurity with Application Allowlisting<\/h1>\n\n\n\n<p><a href=\"https:\/\/www.pcmatic.com\/pro\/\">PC Matic Pro\u2019s <strong>Application Allowlisting Solution<\/strong><\/a> provides businesses with a robust security framework designed to prevent unauthorized code execution. Here\u2019s how it strengthens an organization\u2019s cybersecurity posture:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Proactive Threat Prevention<\/strong>: Instead of reacting to cyber threats after an attack has occurred, PC Matic Pro blocks unauthorized applications before they can execute, significantly reducing the risk of infection.<\/li>\n\n\n\n<li><strong>Zero Trust Execution<\/strong>: The allowlisting model follows a zero-trust approach, ensuring that only vetted, known-good applications are allowed to run.<\/li>\n\n\n\n<li><strong>Protection Against Fileless Malware<\/strong>: Fileless malware leverages trusted tools like PowerShell to execute malicious code. Application allowlisting blocks unauthorized scripts, neutralizing these threats.<\/li>\n\n\n\n<li><strong>Simplified Management<\/strong>: PC Matic Pro automates the allowlisting process, providing IT teams with an easy-to-manage security solution without constant manual intervention.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">Lessons from the Raymond Limited Cyberattack<\/h1>\n\n\n\n<p>The breach at Raymond Limited serves as a critical reminder that traditional security measures alone are not enough. Businesses must adopt proactive defenses like <strong>application allowlisting<\/strong> to block unauthorized threats before they can execute. Key takeaways from this incident include:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Invest in Application Allowlisting<\/strong>: As demonstrated in Raymond\u2019s case, allowlisting stopped malicious scripts from executing, preventing further damage.<\/li>\n\n\n\n<li><strong>Strengthen Access Controls<\/strong>: Implementing MFA and disabling compromised credentials are essential steps in containing breaches.<\/li>\n\n\n\n<li><strong>Regularly Patch and Update Systems<\/strong>: The attackers exploited a vulnerability in a legacy API interface, emphasizing the need for continuous patch management.<\/li>\n\n\n\n<li><strong>Monitor Network Traffic<\/strong>: The breach was detected through routine traffic analysis, reinforcing the value of proactive monitoring.<\/li>\n\n\n\n<li><strong>Implement Network Segmentation<\/strong>: By quarantining compromised systems, Raymond Limited prevented lateral movement into critical databases.<\/li>\n<\/ol>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">Secure Your Business with PC Matic Pro<\/h1>\n\n\n\n<p>The increasing sophistication of cyber threats demands advanced security measures. <a href=\"https:\/\/www.pcmatic.com\/pro\/\">PC Matic Pro\u2019s <strong>Application Allowlisting Solution<\/strong><\/a> empowers businesses to take a proactive stance against cyber threats, ensuring only trusted applications run in their environments.<\/p>\n\n\n\n<p>By implementing application allowlisting, companies can significantly reduce their exposure to cyber risks and prevent costly breaches. Don\u2019t wait for an attack\u2014fortify your defenses today with <a href=\"https:\/\/www.pcmatic.com\/pro\/\">PC Matic Pro<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberattacks continue to threaten businesses worldwide, targeting vulnerabilities in IT infrastructure to steal data, deploy ransomware, or disrupt operations. The recent breach at Raymond Limited, a well-known textile and clothing company, highlights the importance of proactive cybersecurity strategies\u2014particularly application allowlisting\u2014as a key defense mechanism. Understanding the Raymond Limited Cyberattack Raymond Limited recently reported a cybersecurity [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":67811,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[6217],"tags":[],"class_list":["post-67808","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Preventing Cyberattacks with Application Allowlisting<\/title>\n<meta name=\"description\" content=\"Cyberattacks continue to threaten businesses worldwide, targeting vulnerabilities in IT infrastructure to steal data, deploy ransomware, or disrupt\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Preventing Cyberattacks with Application Allowlisting\" \/>\n<meta property=\"og:description\" content=\"Cyberattacks continue to threaten businesses worldwide, targeting vulnerabilities in IT infrastructure to steal data, deploy ransomware, or disrupt\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-21T18:14:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-21T18:14:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Molden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Molden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-cyberattacks-with-application-allowlisting\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-cyberattacks-with-application-allowlisting\\\/\"},\"author\":{\"name\":\"Jessica Molden\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\"},\"headline\":\"Preventing Cyberattacks with Application Allowlisting\",\"datePublished\":\"2025-02-21T18:14:06+00:00\",\"dateModified\":\"2025-02-21T18:14:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-cyberattacks-with-application-allowlisting\\\/\"},\"wordCount\":608,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-cyberattacks-with-application-allowlisting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-1-2.jpg\",\"articleSection\":[\"Business Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-cyberattacks-with-application-allowlisting\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-cyberattacks-with-application-allowlisting\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-cyberattacks-with-application-allowlisting\\\/\",\"name\":\"Preventing Cyberattacks with Application Allowlisting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-cyberattacks-with-application-allowlisting\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-cyberattacks-with-application-allowlisting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-1-2.jpg\",\"datePublished\":\"2025-02-21T18:14:06+00:00\",\"dateModified\":\"2025-02-21T18:14:07+00:00\",\"description\":\"Cyberattacks continue to threaten businesses worldwide, targeting vulnerabilities in IT infrastructure to steal data, deploy ransomware, or disrupt\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-cyberattacks-with-application-allowlisting\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-cyberattacks-with-application-allowlisting\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-cyberattacks-with-application-allowlisting\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-1-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-1-2.jpg\",\"width\":2240,\"height\":1260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/preventing-cyberattacks-with-application-allowlisting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Preventing Cyberattacks with Application Allowlisting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\",\"name\":\"Jessica Molden\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/jmolden\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Preventing Cyberattacks with Application Allowlisting","description":"Cyberattacks continue to threaten businesses worldwide, targeting vulnerabilities in IT infrastructure to steal data, deploy ransomware, or disrupt","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/","og_locale":"en_US","og_type":"article","og_title":"Preventing Cyberattacks with Application Allowlisting","og_description":"Cyberattacks continue to threaten businesses worldwide, targeting vulnerabilities in IT infrastructure to steal data, deploy ransomware, or disrupt","og_url":"https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2025-02-21T18:14:06+00:00","article_modified_time":"2025-02-21T18:14:07+00:00","og_image":[{"width":2240,"height":1260,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-2.jpg","type":"image\/jpeg"}],"author":"Jessica Molden","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Jessica Molden","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/"},"author":{"name":"Jessica Molden","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700"},"headline":"Preventing Cyberattacks with Application Allowlisting","datePublished":"2025-02-21T18:14:06+00:00","dateModified":"2025-02-21T18:14:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/"},"wordCount":608,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-2.jpg","articleSection":["Business Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/","url":"https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/","name":"Preventing Cyberattacks with Application Allowlisting","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-2.jpg","datePublished":"2025-02-21T18:14:06+00:00","dateModified":"2025-02-21T18:14:07+00:00","description":"Cyberattacks continue to threaten businesses worldwide, targeting vulnerabilities in IT infrastructure to steal data, deploy ransomware, or disrupt","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-2.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-1-2.jpg","width":2240,"height":1260},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/preventing-cyberattacks-with-application-allowlisting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Preventing Cyberattacks with Application Allowlisting"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700","name":"Jessica Molden","url":"https:\/\/www.pcmatic.com\/blog\/author\/jmolden\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=67808"}],"version-history":[{"count":1,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67808\/revisions"}],"predecessor-version":[{"id":67810,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67808\/revisions\/67810"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/67811"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=67808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=67808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=67808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}