{"id":68442,"date":"2026-04-13T14:04:07","date_gmt":"2026-04-13T19:04:07","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=68442"},"modified":"2026-04-13T14:04:08","modified_gmt":"2026-04-13T19:04:08","slug":"is-your-third-party-support-platform-a-security-backdoor","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/","title":{"rendered":"Is Your Third-Party Support Platform a Security Backdoor?"},"content":{"rendered":"\n<p>In the world of cybersecurity, we often talk about &#8220;hardening the perimeter.&#8221; We invest in firewalls, secure our primary databases, and encrypt our core applications. But as the recent <a target=\"_blank\" rel=\"noreferrer noopener\" href=\"https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/hims-breach-exposes-sensitive-phi\">Hims &amp; Hers Health (Hims) breach<\/a> demonstrates, the most sophisticated front door in the world doesn&#8217;t matter if a threat actor can simply walk through the service entrance.<\/p>\n\n\n\n<p>Recently, unauthorized actors\u2014allegedly linked to the <a href=\"https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/hims-breach-exposes-sensitive-phi\" target=\"_blank\" rel=\"noreferrer noopener\">ShinyHunters<\/a> group\u2014gained access to a third-party customer support platform used by Hims. The result? A &#8220;limited set&#8221; of customers had their names, email addresses, and highly sensitive medical information exposed.<\/p>\n\n\n\n<p>For businesses, this isn&#8217;t just a headline; it\u2019s a masterclass in modern risk management.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The &#8220;Support Ticket&#8221; Goldmine<\/h2>\n\n\n\n<p>Most companies view customer support as a cost center, but hackers view it as a goldmine. Support tickets often contain raw, unencrypted <strong>Personally Identifiable Information (PII)<\/strong> and <strong>Protected Health Information (PHI)<\/strong>.<\/p>\n\n\n\n<p>When a customer reaches out for help, they are in a &#8220;moment of trust.&#8221; They provide details they might never post on a public profile. By targeting the third-party support &#8220;stack&#8221; rather than the main medical database, attackers found the path of least resistance to the most sensitive data.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The Real Cost: Fragmentation and Stigma<\/h2>\n\n\n\n<p>The <a target=\"_blank\" rel=\"noreferrer noopener\" href=\"https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/hims-breach-exposes-sensitive-phi\">Hims<\/a> incident highlights two critical business failures:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>System Fragmentation:<\/strong> As noted in the reporting, customer data is often scattered across a patchwork of disconnected systems\u2014recordings, transcripts, and workflows. This fragmentation is where risk lives.<\/li>\n\n\n\n<li><strong>Reputational Toxicity:<\/strong> Because Hims treats stigmatized conditions like hair loss and mental health, the breach isn&#8217;t just about identity theft\u2014it\u2019s about the potential for blackmail and extortion.<\/li>\n<\/ol>\n\n\n\n<p>When you lose a customer&#8217;s credit card number, you lose their money. When you lose their medical secrets, you lose their loyalty forever.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Securing the &#8220;Backdoor&#8221; with PC Matic Pro<\/h2>\n\n\n\n<p>The Hims breach proves that you are only as secure as your weakest third-party vendor. To protect your business from lateral movement and supply chain vulnerabilities, a &#8220;detect and react&#8221; mindset is no longer enough. You need a <strong>Zero Trust<\/strong> foundation.<\/p>\n\n\n\n<p><strong><a target=\"_blank\" rel=\"noreferrer noopener\" href=\"https:\/\/www.pcmatic.com\/pro\/\">PC Matic Pro<\/a><\/strong> offers the specialized tools needed to close these gaps:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Application Allowlisting:<\/strong> While traditional antivirus tries to keep up with a list of &#8220;bad&#8221; files, <a href=\"https:\/\/www.pcmatic.com\/pro\/\" target=\"_blank\" rel=\"noreferrer noopener\">PC Matic Pro<\/a> only allows known, trusted applications to run. If a threat actor attempts to execute malicious scripts via a support platform or remote tool, they are blocked by default.<\/li>\n\n\n\n<li><strong>Vulnerability Management:<\/strong> Hackers often exploit unpatched &#8220;patchwork&#8221; systems. <a href=\"https:\/\/www.pcmatic.com\/pro\/\" target=\"_blank\" rel=\"noreferrer noopener\">PC Matic Pro<\/a> automates the patching of third-party applications, ensuring your support stack isn&#8217;t the reason for your next board-level crisis.<\/li>\n\n\n\n<li><strong>Zero Trust Architecture:<\/strong> By assuming that no user or application is inherently safe, <a href=\"https:\/\/www.pcmatic.com\/pro\/\" target=\"_blank\" rel=\"noreferrer noopener\">PC Matic Pro<\/a> helps contain breaches before they can spread from a support ticket to your core infrastructure.<\/li>\n<\/ul>\n\n\n\n<p><strong>The Lesson for 2026:<\/strong> Don&#8217;t let your customer service platform become your greatest liability. Security isn&#8217;t just a &#8220;feature&#8221; of the customer experience\u2014it&#8217;s the only thing that keeps that experience trustworthy.<\/p>\n\n\n\n<p><strong>Stop being the next headline.<\/strong> <a href=\"https:\/\/www.pcmatic.com\/pro\/\" target=\"_blank\" rel=\"noreferrer noopener\">Learn how PC Matic Pro can secure your business today.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the world of cybersecurity, we often talk about &#8220;hardening the perimeter.&#8221; We invest in firewalls, secure our primary databases, and encrypt our core applications. But as the recent Hims &amp; Hers Health (Hims) breach demonstrates, the most sophisticated front door in the world doesn&#8217;t matter if a threat actor can simply walk through the [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":67919,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6217],"tags":[],"class_list":["post-68442","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Is Your Third-Party Support Platform a Security Backdoor?<\/title>\n<meta name=\"description\" content=\"In the world of cybersecurity, we often talk about &quot;hardening the perimeter.&quot; We invest in firewalls, secure our primary databases, and encrypt our core\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is Your Third-Party Support Platform a Security Backdoor?\" \/>\n<meta property=\"og:description\" content=\"In the world of cybersecurity, we often talk about &quot;hardening the perimeter.&quot; We invest in firewalls, secure our primary databases, and encrypt our core\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-13T19:04:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T19:04:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-5.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Molden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Molden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/is-your-third-party-support-platform-a-security-backdoor\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/is-your-third-party-support-platform-a-security-backdoor\\\/\"},\"author\":{\"name\":\"Jessica Molden\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\"},\"headline\":\"Is Your Third-Party Support Platform a Security Backdoor?\",\"datePublished\":\"2026-04-13T19:04:07+00:00\",\"dateModified\":\"2026-04-13T19:04:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/is-your-third-party-support-platform-a-security-backdoor\\\/\"},\"wordCount\":516,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/is-your-third-party-support-platform-a-security-backdoor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-5.jpg\",\"articleSection\":[\"Business Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/is-your-third-party-support-platform-a-security-backdoor\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/is-your-third-party-support-platform-a-security-backdoor\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/is-your-third-party-support-platform-a-security-backdoor\\\/\",\"name\":\"Is Your Third-Party Support Platform a Security Backdoor?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/is-your-third-party-support-platform-a-security-backdoor\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/is-your-third-party-support-platform-a-security-backdoor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-5.jpg\",\"datePublished\":\"2026-04-13T19:04:07+00:00\",\"dateModified\":\"2026-04-13T19:04:08+00:00\",\"description\":\"In the world of cybersecurity, we often talk about \\\"hardening the perimeter.\\\" We invest in firewalls, secure our primary databases, and encrypt our core\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/is-your-third-party-support-platform-a-security-backdoor\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/is-your-third-party-support-platform-a-security-backdoor\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/is-your-third-party-support-platform-a-security-backdoor\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-5.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-5.jpg\",\"width\":2240,\"height\":1260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/is-your-third-party-support-platform-a-security-backdoor\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is Your Third-Party Support Platform a Security Backdoor?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\",\"name\":\"Jessica Molden\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/jmolden\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is Your Third-Party Support Platform a Security Backdoor?","description":"In the world of cybersecurity, we often talk about \"hardening the perimeter.\" We invest in firewalls, secure our primary databases, and encrypt our core","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/","og_locale":"en_US","og_type":"article","og_title":"Is Your Third-Party Support Platform a Security Backdoor?","og_description":"In the world of cybersecurity, we often talk about \"hardening the perimeter.\" We invest in firewalls, secure our primary databases, and encrypt our core","og_url":"https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2026-04-13T19:04:07+00:00","article_modified_time":"2026-04-13T19:04:08+00:00","og_image":[{"width":2240,"height":1260,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-5.jpg","type":"image\/jpeg"}],"author":"Jessica Molden","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Jessica Molden","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/"},"author":{"name":"Jessica Molden","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700"},"headline":"Is Your Third-Party Support Platform a Security Backdoor?","datePublished":"2026-04-13T19:04:07+00:00","dateModified":"2026-04-13T19:04:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/"},"wordCount":516,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-5.jpg","articleSection":["Business Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/","url":"https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/","name":"Is Your Third-Party Support Platform a Security Backdoor?","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-5.jpg","datePublished":"2026-04-13T19:04:07+00:00","dateModified":"2026-04-13T19:04:08+00:00","description":"In the world of cybersecurity, we often talk about \"hardening the perimeter.\" We invest in firewalls, secure our primary databases, and encrypt our core","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-5.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-5.jpg","width":2240,"height":1260},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/is-your-third-party-support-platform-a-security-backdoor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Is Your Third-Party Support Platform a Security Backdoor?"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700","name":"Jessica Molden","url":"https:\/\/www.pcmatic.com\/blog\/author\/jmolden\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=68442"}],"version-history":[{"count":1,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68442\/revisions"}],"predecessor-version":[{"id":68443,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68442\/revisions\/68443"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/67919"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=68442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=68442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=68442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}