{"id":68243,"date":"2025-10-21T14:42:39","date_gmt":"2025-10-21T19:42:39","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=68243"},"modified":"2025-10-21T14:42:40","modified_gmt":"2025-10-21T19:42:40","slug":"why-visibility-and-control-matter-in-k-12-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/","title":{"rendered":"Why Visibility and Control Matter in K-12 Cybersecurity"},"content":{"rendered":"\n<p>Every major cybersecurity framework shares one simple truth: you can\u2019t protect what you can\u2019t see, and you can\u2019t trust what you don\u2019t control.<br>For K-12 schools facing rising ransomware attacks, limited IT staff, and strict compliance demands, that truth has never been more urgent.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The Visibility Gap in Schools<\/h2>\n\n\n\n<p>Across the country, schools struggle to maintain awareness of what software runs in their environment. Teachers and students often download unapproved apps that create unmonitored risks. Meanwhile, small IT teams can\u2019t possibly review every executable manually, leaving gaps that attackers exploit through zero-day vulnerabilities and ransomware.<\/p>\n\n\n\n<p>Compliance adds more pressure. Regulations like FERPA, state privacy laws, and insurance requirements demand proof of control, yet traditional security tools only detect threats <em>after<\/em> they execute.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The Frameworks Agree: Control Starts With Visibility<\/h2>\n\n\n\n<p>Industry standards emphasize this proactive approach:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>NIST CSF 2.0 (Identify + Protect)<\/strong> \u2013 Begin with asset visibility, then enforce control at execution.<\/li>\n\n\n\n<li><strong>CIS Control 2<\/strong> \u2013 Allow only authorized software to be installed and run.<\/li>\n\n\n\n<li><strong>CIS Control 8<\/strong> \u2013 Prevent malicious code from executing.<\/li>\n\n\n\n<li><strong>K12 SIX &amp; CISA<\/strong> \u2013 Recommend <em>application allowlisting<\/em> as a safeguard against ransomware.<\/li>\n<\/ul>\n\n\n\n<p>Each of these frameworks points to the same solution: <em>visibility<\/em> and <em>default-deny control.<\/em><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How Default Deny Works<\/h2>\n\n\n\n<p>With default-deny execution\u2014also called allowlisting\u2014only trusted, approved applications run.<br>Everything else\u2014ransomware, zero-days, or unvetted tools\u2014simply doesn\u2019t.<br>It\u2019s a proactive, prevention-first defense rather than the reactive \u201cdetect and respond\u201d model most schools rely on today.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How PC Matic Pro Makes It Practical<\/h2>\n\n\n\n<p><a href=\"http:\/\/pcmatic.com\/pro\">PC Matic Pro <\/a>helps K-12 IT teams turn CIS Controls 2 and 8 into action without extra workload:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Fingerprint Dashboard<\/strong> \u2013 Inventories every executable, flags unknowns, and produces audit-ready reports for compliance.<\/li>\n\n\n\n<li><strong>Default Deny Allowlisting<\/strong> \u2013 Ensures only trusted software runs, blocking ransomware and zero-days before they ever execute.<\/li>\n\n\n\n<li><strong>Automated Global Trust Catalog<\/strong> \u2013 A database of over 22 billion known-good files reduces manual approvals.<\/li>\n\n\n\n<li><strong>Cross-Platform &amp; Always-On<\/strong> \u2013 Enforces policy consistently across Windows, macOS, Linux, and even off-network devices.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Works With, Not Against, Existing Tools<\/h2>\n\n\n\n<p>PC Matic Pro isn\u2019t a replacement for your EDR, XDR, or antivirus\u2014it complements them.<br>Those tools detect and respond; <a href=\"http:\/\/pcmatic.com\/pro\">PC Matic Pro<\/a> adds the missing execution control to make sure unknown code <em>never<\/em> runs in the first place.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The Bottom Line<\/h2>\n\n\n\n<p>Visibility reveals what\u2019s in your environment.<br>Default-deny control ensures only what you trust can run.<br>Together, they deliver the proactive defense every K-12 cybersecurity framework calls for\u2014helping schools stay compliant, resilient, and ready for whatever threat comes next.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" style=\"margin-top:var(--wp--preset--spacing--80);margin-bottom:var(--wp--preset--spacing--80)\"\/>\n\n\n\n<p><strong>Learn more:<\/strong> <a href=\"https:\/\/www.pcmatic.com\/pro\">pcmatic.com\/pro<\/a><br><strong>Contact:<\/strong> <a>SLED@pcmatic.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every major cybersecurity framework shares one simple truth: you can\u2019t protect what you can\u2019t see, and you can\u2019t trust what you don\u2019t control.For K-12 schools facing rising ransomware attacks, limited IT staff, and strict compliance demands, that truth has never been more urgent. The Visibility Gap in Schools Across the country, schools struggle to maintain [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":68244,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6217],"tags":[],"class_list":["post-68243","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why Visibility and Control Matter in K-12 Cybersecurity<\/title>\n<meta name=\"description\" content=\"Every major cybersecurity framework shares one simple truth: you can\u2019t protect what you can\u2019t see, and you can\u2019t trust what you don\u2019t control.For K-12\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Visibility and Control Matter in K-12 Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Every major cybersecurity framework shares one simple truth: you can\u2019t protect what you can\u2019t see, and you can\u2019t trust what you don\u2019t control.For K-12\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-21T19:42:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-21T19:42:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-3-5.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Molden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Molden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-visibility-and-control-matter-in-k-12-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-visibility-and-control-matter-in-k-12-cybersecurity\\\/\"},\"author\":{\"name\":\"Jessica Molden\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\"},\"headline\":\"Why Visibility and Control Matter in K-12 Cybersecurity\",\"datePublished\":\"2025-10-21T19:42:39+00:00\",\"dateModified\":\"2025-10-21T19:42:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-visibility-and-control-matter-in-k-12-cybersecurity\\\/\"},\"wordCount\":426,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-visibility-and-control-matter-in-k-12-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-3-5.jpg\",\"articleSection\":[\"Business Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-visibility-and-control-matter-in-k-12-cybersecurity\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-visibility-and-control-matter-in-k-12-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-visibility-and-control-matter-in-k-12-cybersecurity\\\/\",\"name\":\"Why Visibility and Control Matter in K-12 Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-visibility-and-control-matter-in-k-12-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-visibility-and-control-matter-in-k-12-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-3-5.jpg\",\"datePublished\":\"2025-10-21T19:42:39+00:00\",\"dateModified\":\"2025-10-21T19:42:40+00:00\",\"description\":\"Every major cybersecurity framework shares one simple truth: you can\u2019t protect what you can\u2019t see, and you can\u2019t trust what you don\u2019t control.For K-12\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-visibility-and-control-matter-in-k-12-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-visibility-and-control-matter-in-k-12-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-visibility-and-control-matter-in-k-12-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-3-5.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-3-5.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-visibility-and-control-matter-in-k-12-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Visibility and Control Matter in K-12 Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\",\"name\":\"Jessica Molden\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/jmolden\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Visibility and Control Matter in K-12 Cybersecurity","description":"Every major cybersecurity framework shares one simple truth: you can\u2019t protect what you can\u2019t see, and you can\u2019t trust what you don\u2019t control.For K-12","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Why Visibility and Control Matter in K-12 Cybersecurity","og_description":"Every major cybersecurity framework shares one simple truth: you can\u2019t protect what you can\u2019t see, and you can\u2019t trust what you don\u2019t control.For K-12","og_url":"https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2025-10-21T19:42:39+00:00","article_modified_time":"2025-10-21T19:42:40+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-3-5.jpg","type":"image\/jpeg"}],"author":"Jessica Molden","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Jessica Molden","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/"},"author":{"name":"Jessica Molden","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700"},"headline":"Why Visibility and Control Matter in K-12 Cybersecurity","datePublished":"2025-10-21T19:42:39+00:00","dateModified":"2025-10-21T19:42:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/"},"wordCount":426,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-3-5.jpg","articleSection":["Business Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/","url":"https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/","name":"Why Visibility and Control Matter in K-12 Cybersecurity","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-3-5.jpg","datePublished":"2025-10-21T19:42:39+00:00","dateModified":"2025-10-21T19:42:40+00:00","description":"Every major cybersecurity framework shares one simple truth: you can\u2019t protect what you can\u2019t see, and you can\u2019t trust what you don\u2019t control.For K-12","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-3-5.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-3-5.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/why-visibility-and-control-matter-in-k-12-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why Visibility and Control Matter in K-12 Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700","name":"Jessica Molden","url":"https:\/\/www.pcmatic.com\/blog\/author\/jmolden\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=68243"}],"version-history":[{"count":1,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68243\/revisions"}],"predecessor-version":[{"id":68245,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68243\/revisions\/68245"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/68244"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=68243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=68243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=68243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}